You are on page 1of 76

T o u l o u s e K i l l e r G r u p o T i g r e H i z b U t- Tah r i r R e l e n t l e s s P u r s u i t

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter The
August/September 2012

Volume 5 Number 4

The U.S. Citizen, the


Second Amendment,
and the U.N. Small
Arms Treaty

An SSI Publication

August/September 2012
USA/CANADA $5.99
www.thecounterterroristmag.com

The Counter Terrorist ~ August/September 2012 1


2011 Thermo Fisher Scientific Inc. All rights reserved.

Every second matters.

When time and safety are critical, military and civilian first responders
use Thermo Scientific handheld chemical identification instruments to
rapidly identify explosives, precursors, narcotics and other chemical
hazards directly at the point of need.

With more than 5,000 handheld chemical identification instruments


deployed worldwide, we understand what first responders demand of
their equipmentand why every second matters. These insights were
key as we developed FirstDefender RM and FirstDefender RMX, our
next generation Raman instruments, which are even faster and easier
to use than ever before. FirstDefender RMX and FirstDefender RM
Next generation Raman instruments enable rapid
identification of unknown chemicals in the field.
For rapid, accurate analysis of a wide range of potential chemical hazards,
turn to Thermo Scientific handheld instruments, formerly sold under the
Ahura Scientific brand. To schedule a demonstration of our newest solutions,
visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.

Moving science forward

Circle 254 on Reader Service Card


2 The Counter Terrorist ~ August/September 2012
The Counter Terrorist ~ August/September 2012 3
Circle 34013
Circle on on
Reader Service
Reader Card
Service Card
4 The Counter Terrorist ~ August/September 2012 Circle 29 on Reader Service Card
Counter
The Journal for Law Enforcement, Intelligence & Special Operations Professionals
August/September 2012
Volume 5 Number 4

COVER story:

32 The U.S. Citizen, the Second Amendment,


and the U.N. Small Arms Treaty
By Ross Riggs

FEATURES:
contents

32
8 Firsthand:
Grupo TIGRE Paran Raid
By Kevan Gillies

20

Case Study:
Spree Killer in Toulouse, France
By Richard Marquise

48

HIZB UT-TAHRIR CONVENES IN ILLINOIS
By John Andrews
8
58
RELENTLESS PURSUIT: A NEGLECTED COIN
PRINCIPLE?
By Eeben Barlow

departments:
6 From the Editor
Afghanistan the Beautiful
48 46 Book Review
The Eleven: Saudi Guantnamo Veterans Returning to
the Fight

69 Innovative Products
RM M203PI, Propper A-Tacs BDU, Sesolinc Mobile
Reinforced Data Facility

72 Training Review
Mobile Device Seizure and Investigations
58
Cover: To come

The Counter Terrorist ~ August/September 2012 5


From The Editor: Counter The

Afghanistan the Beautiful


By Chris Graham Journal for Law Enforcement, Intelligence
& Special Operations Professionals

A
Volume 5 Number 4
August/September 2012
merican troops have made use of the most advanced technology money could
Editor
buy and performed as they were trained. They have endured...while Chris Graham
tolerating... After the September 11 attacks in 2001, President Bush authorized a
brilliantly agile campaign by CIA officers and Special Forces soldiers leading Afghan Director of Operations
proxies in bold, aggressive combat operations against al Qaeda and the Taliban with Sol Bradman
devastating close-air-support. After some dramatic and well-publicized successes, Big Director of Advertizing
Army, the same organization that seemed hesitant to participate at the outset, jumped in Carmen Arnaes
with both feet. Director of Production
Fast forward a decade to the present, and the U.S. government has sacrificed the Kelli Richardson
lives of thousands of young Americans and hundreds of billions of dollars to to Contributing Editors
what? Decimating and deterring the network that made war against the United States Eeben Barlow
culminating in the 9/11 attacks seems to be a side job. Jennifer Hesterman
U.S. policy in Afghanistan today seems to be motivated by the idea of bringing Richard Marquise
governance to ungoverned regions in order to prevent the rise of future terrorist groups; Tom Nypaver
not a bad idea unless one is aware of the fact that attempting to bring governance to Steve Young
all uncontrolled regions of the earth is a sufficiently large task to bankrupt any nation Graphic Design
participating. And make no mistake, many nations deliberately hinder these efforts at every Morrison Creative Company
opportunity and it is unclear how many locals want this intrusion. Copy Editor
An additional trifling detail is: What form of government should be installed? Should Laura Town
they be given a heavy-handed socialist workers paradise? Should they be given the mob Office Manager
rule of democracy? Should they be given a representative republic like the United States? Lily Valdes
In the case of Afghanistan, coalition troops find themselves propping up a corrupt Islamic
regime. Publisher:
Security Solutions International
Those of us who have spent time in the field in Afghanistan find claims of supporting 13155 SW 134th St. STE 204
the democratic aspirations of noble Afghans to be tragically humorous. My recollection Miami, Florida 33186
of Afghanistan is a land where individual liberty, tolerance of others, and honesty are
often considered ridiculous. I remember a land (regardless of which tribal region) where
a perceived insult to the Koran could result in mob riots and killings but where rampant
ISSN 1941-8639 The Counter Terrorist
pedophilia and bestiality merit nothing more than a shrug of shoulders. Magazine, Journal for Law Enforcement,
American troops have performed as they were trained, enduring an inhospitable Intelligence & Special Operations
environment, facing countless challenges, and tolerating the ridiculous orders of seniors to Professionals is published by Security
practice celibacy and abstain from alcohol for every day of each deployment. Aside from Solutions International LLC, as a service
the previous, they have done well carrying out their orders. to the nations First Responders and
Unfortunately, they have been ordered to carry out a never-ending series of costly, Homeland Security Professionals with
the aim of deepening understanding
inefficient operations without significant benefit. At this point, victory in Afghanistan of issues related to Terrorism. No part
is ill-defined, and the highly publicized schedule for withdrawal of U.S. forces virtually of the publication can be reproduced
precludes the possibility of achieving a real victory even if conducted piecemeal over without permission from the publisher.
decades. The opinions expressed herein are the
If our politicians and generals are permitted to celebrate their successes without being opinions of the authors represented and not
forced to confront their failure of leadership, we can expect the same processes to be necessarily the opinions of the publisher.
Please direct all Editorial correspondence
repeated. It appears that our political commitment is not great enough to achieve victory; related to the magazine to: Security
it is merely sufficient to justify participation and guarantees great expense and unsavory Solutions International SSI, 13155 SW
results for years to come. 134th Street, Suite 204, Miami, Florida.
I would suggest that if a politician doesn't have sufficient support at the outset of a 33186 or info@thecounterterroristmag.com
campaign to honestly and clearly state his objectives and his commitment to victory, The subscription price for 6 issues is $34.99
nothing less, then he does not have sufficient support to wage war. If we permit these and the price of the magazine is $5.99.
(1-866-573-3999) Fax: 1-786-573-2090.
leaders to indulge in a never-ending round of self-congratulations without facing our
strengths and our weaknesses, our accomplishments and our failures, with sobriety rather For article reprints, e-prints, posters and
plaques please contact:
than spin, we will not adapt sufficiently to achieve victory in future conflicts. PARS International Corp.
Web: www.magreprints.com/quickquote.asp
Email: reprints@parsintl.com
Semper Fidelis, Phone: 212-221-9595 Fax: 212-221-9195
Please visit the magazine web site where you can
also contact the editorial staff:
Chris Graham www.thecounterterrroristmag.com
Editor, The Counter Terrorist 2012 Security Solutions International

6 The Counter Terrorist ~ August/September 2012


KNOW BEFORE YOU GO

Before you send your tactical team through the door, throw in the stealthy Recon Scout XT. It can crawl over clothing
and other debris and transmit clear, crisp video that can reveal the location of subjects and the layout of rooms.
The XT weighs just 1.2 lbs, and is exceptionally quiet. Its infrared optical system also allows you to see in complete
darkness. Learn more about its life-saving capabilities and arrange a demo at www.recon-scout.com/XT

TM


W O R L D L E A D E R I N TA C T I C A L M I C R O - R O B O T S Y S T E M S
Contact: Aimee Barmore, 1-866-697-6267 x111
Aimee.Barmore@ReconRobotics.com
Circle 337 on Reader Service Card
Circle 301 on Reader Service Card
The Counter Terrorist ~ August/September 2012 7
Firsthand:

By Kevan Gillies

General purpose police officers make an arrest.


Counter
The

8 The Counter Terrorist ~ August/September 2012


Crime in Brazil is a unique
situation. Large cities such as Rio
de Janeiro, So Paulo, Recife, and
Curitiba (capital of the southern
state of Paran) are flooded with
favelas (shanty towns) where drug
lords rule by fear.

C rime is dominated
by highly struc-
tured criminal organizations such
as Primeiro Comando da Capital
(PCC)First Command of the
bank robberies, armored vehicle
robberies, kidnappings, and drug
dealing. In the northwestern region
of Brazil, there have been many
incidents where heavily armed gangs
The unit is responsible
for investigating all
cases of kidnappings
Capital. Many of these groups are take small towns hostage, neutral-
and hostage rescue
commanded from the prisons in izing the small police force, and operations in the
So Paulo and have chapters or robbing banks, supermarkets, and
branches throughout the country. businesses. These violent and brutal
state of Paran (near
Comando Vermelho (CV)Red criminal organizations are famous the triple frontier of
Command- originated in Rio de for executing rival gang members by
Janeiro and is organized similarly beheading and dismemberment.
Brasil, Paraguay and
to PCC. The majority of individual Argentina) and handles
criminals are affiliated with and Grupo TIGRE an average of seven
pay dues to one organization or the Ttico Integrado de Grupos de
other. Represso Especial (TIGRE, the In-
hostage situations/
Activities practiced by these tegrated Tactical Groups of Special kidnappings per year.
criminal organizations include

The Counter Terrorist ~ August/September 2012 9


The Complete Tactical Suppression) was created in 1989.
The unit is responsible for inves-

Video Tool System! tigating all cases of kidnappings


and hostage rescue operations in
FOR MILITARY & LAW ENFORCEMENT OPERATIONS the state of Paran (near the triple
frontier of Brazil, Paraguay and
Argentina) and handles an average
of seven hostage situations/kidnap-
pings per year. TIGRE also has the
additional responsibility of provid-
ing tactical support for other units
on high risk warrants. The group in-
cludes twenty-six operators and two
delgados (commanding officers).
The unit is credited with a 100%
success rate in its twenty-three-year
history and has been designated the
states counter-terrorism team in
preparation for the World Cup in
2014 and the Olympics in 2016.

Operation
All products are interchangeable and new tools can be added at any time! Mercury
In late November of 2011, I
Night Vision Monocular Pole Camera found myself sitting amongst over
2-20ft Pole Cameras
An array of technology-based four hundred-strong law enforce-
Fiberscopes & Videoscopes
ment officers from three distinct po-
Under Door Cameras
video surveillance tools that
lice forces (the Federal, Military and
Listening Devices allow a team to safely assess any Civil Police) being briefed on what
Thermal Imaging potentially dangerous situation would turn out to be one of the
Robotic Remote Control Cameras most significant inter-departmental
Digital/Analog Wireless Video operations ever conducted in the
southern states of Paran, Santa
Catarina, and Porto Alegre: Opera-
Zistos Corporation tion Mercury. COT (Comando de
Ph 631.434 .1370 Operaes Tticas Tactical Opera-
E-mail: sales@zistos.com tions Command), the Federal Police
Circle 311 on Reader Service Card
Tactical Unit, had flown down
from Brasilia to assist in fulfilling
fifty-three warrants in the three
states. I was sitting in the ranks of
TIGRE, the Civil Police Counter
Terrorism and Hostage Rescue
Team called in to take down one
of the higher-risk targets. The gang
we were about to take out of action
had been involved in kidnappings,

Circle 191 on Reader Service Card


10 The Counter Terrorist ~ August/September 2012
Tacprogear manufacTures a compleTe line of
HigH-speed low-drag TacTical gear & equipmenT
Tacprogear is widely used in global
hot spots where High-speed, low-drag
equipment is required, not optional!

Tacprogears manufacturing capabilities


& network of reliable partners help
us achieve extraordinary results
delivering mission critical equipment
to wherever and whenever duty calls!
sofT armor Tacprogear designs and builds all plaTe carriers
products to not only meet, but exceed
the rigorous demands of our clients.

TACProGEArS BATTlE TESTEd ProduCTS:

Hard Armor Weaponlights


Soft Armor Apparel
Carriers Gloves
Vests Coveralls
Pockets Balaclavas
Hard armor Pouches Footwear pockeTs & poucHes
Packs Weapon Accessories
Flashlights Slings
Safety Equipment Eye Protection
Sleeping Bags PPE

Tacprogear, llc
601 N. CoNGrESS AVE., SuITE 305
dElrAY BEACH, FlorIdA 33445 uSA
TEl: 561-265-4066 FAX: 561-265-4061
sales@Tacprogear.com

HelmeTs weapon accessories

Circle 101 on Reader Service Card The Counter Terrorist ~ August/September 2012 11
Pe n e t r a t i n g
th e N i g h t . . .

I n c .
i e s , s.
r
t
sigh

d u s t e a p o n

I
nd w
n s a
gle
s
g
, go
m ries.com
rs
cula

A d a st ion/
the rma
l Mo
n o

Nigh
tndu
v i s
m si tries.com
d
.a msindu a s
www
s@a
da
72-3
017
sale (310) 4 -1421
t: 5
Wes (540) 81
:
East Circle 245 on Reader Service Card
Circle 29 on Reader Service Card
Circle 282 on Reader Service Card
12 The Counter Terrorist ~ August/September 2012 Circle308
Circle onReader
308on ReaderService
ServiceCard
Card
SAVE 25%
on our Newest
Counterterrorism Books

Pre-order today!

Grupo TIGRE. Photo courtesy of Carlos Frigerio.

drug dealing, assaults on armored The whole investigation had


Third Edition
cars, and bank robberies using originated from a receipt for phone
explosives to open ATMs (the latest credits found in an abandoned
fad amongst Brazilian organized vehicle used in a robbery. It took a
crime). We were taking down an total of two years of investigations
entire gang in one shot. They were a to collect enough evidence and
well trained and organized group of intelligence to bring in the whole
hard core criminals. A month earlier gang. At 06:00 (local) the fifty-
CRC Press is a premier
they had lost a member and killed three warrants would be executed publisher of books on
two police officers in Paraguay dur- simultaneously. counterterrorism.
ing an attempt to take them down
Visit www.crcpress.com to see
by the National Police Force. Less O6:00 Assaulters our complete selection of titles
than a week prior to our operation,
in the FUP and use PROMO CODE FWL14
they had exchanged fire with the to receive a 25% DISCOUNT.
At 05:45 we dropped off the rear
Paran State Highway Patrol, using
perimeter and containment team. FREE standard shipping
covering fire and bounding drills
At 06:00 sharp we were stacked in when you order at
to retreat. They were armed with www.crcpress.com
our FUP (forming up position).
AR-15s and conducted transition
We had rehearsed our movements
drills to Glock 9 mm pistols with
back at TIGREs Operational Base
thirty-round magazines.

Circle 331 on Reader Service Card


The Counter Terrorist ~ August/September 2012 13
and were fired up and ready to go.
On number 15s signal we moved
out. A team of three provided
cover on the front and second floor
whilst swiftly taking care of the
padlock and opening the gate. I
slid in behind my cover men num-
bers 15 and 18 with my linear fire
hose charge already in my hands.
As usual our intelligence was not
the best we could wish for, and
I only knew we had two outside
doors, probably wooden, and did
not know where exactly they would
lead. We had decided to take the
left door, which appeared to be
an entrance to a downstairs living
room. 15 and I scraped between
the wall and a Volkswagon car, and
I slapped the charge on the door.
In what must have been fractions
of a second, I could see that it was
Grupo TIGRE. Photo courtesy of Carlos Frigerio.

14 The Counter Terrorist ~ August/September 2012 Circle 129 on Reader Service Card
070212-Robotex-7.25x4.875-AvatraII.indd 1 7/2/12 2:33 PM
Circle 333 on Reader Service Card

Circle 333 on Reader Service Card The Counter Terrorist ~ August/September 2012 15
Rio de Janeiro - the Armed Forces (CFN) occupy the Complex of the German, in Rio de Janeiro, to ensure safety during the municipal elections.
Photo: Wilson Dias/ABr
a heavy wooden door opening in Before I could finish reeling in the
and felt confident that the charge shock tube, the team had passed
(made up of 15 gram det cord) me and I heard the calls of clear,
would handle it easily. As I started clear, coming out. Still under the
flaking out the shock tube and cover of number 18, I accessed
retreating around hard cover, I felt my second linear hose charge and
the line go taught, I looked back started peeling off the Breachers
and found it had tangled and was Tape and placing the charge. Same
starting to pull the charge off the type of door, only this time open-
door. I managed to make it around ing out. I grabbed 18 by his vests
the corner as my two cover men drag handle and pulled him back
exited the gate. I decided to fire the a couple of meters closer to the
charge from where I was and let it wall whilst accessing the pen-flare
rip. The shock wave reflecting off firing device. A quick look around
the garage wall was manageable. to make sure none of the team was

16 The Counter Terrorist ~ August/September 2012


Instant Access
Introducing the
All New Alpha Series Concealment
Holsters from

The DSG Alpha Series Holsters Feature:


Solid Kydex Construction
Large In-Stock Inventory
Available for Most Popular Handguns
Models for Surefire and Streamlight
Weapon Lights
Formed for Close to the Body Fit
Adjustable Cant and Height
Available in black and dark earth
Convertible to Inside the Waistband
Carry

Specialized Gear for Military and Law Enforcement


Weapons & Components Optics Ammo

dsgarms.com 1.800.382.7571
FREE SHIPPING on your first order this month!
Promotion Code: CT0312

GSA: GS-07F-6007R CAGE: 1L0J5


Circle 301 on Reader Service Card Circle 275 on Reader Service CardThe Counter Terrorist ~ August/September 2012 17
Grupo TIGRE explosive wall breach. Photo courtesy of Carlos Frigerio.

exposed to the charge (if you can upon. Zero casualties were taken,
see the charge, the charge can see and their perp was in custody.
you), and I pulled back the firing
pin. The image of the flash going Lessons learned
down the plastic shock tube, the 1) Success comes from long hours
door banging off the jamb and dedicated to realistic tactical training.
falling backwards, lets just say it 2) Good Intelligence is worth gold.
was a beautiful sight. Numbers 18 3) Rehearsals are critical to any
and 15 headed up the stairs to the
The image of the living quarters. Soon after I heard
successful operation.
4) A team must have multiple
flash going down the command of Dominado. It points and methods of entry.
turned out the ground floor was
the plastic shock being turned into a small clothes
5) Explosive Breaching is an essential
tool for any tactical team.
tube, the door shop and was completely empty 6) A clear mission statement and
banging off the except for a few shelves, hangers,
and construction materials.
rules of engagement are essential.
jamb and falling Mission accomplished: two
About the Author
explosive breaches and warrant
backwards, lets executed with two perpetrators in
Mr. Gillies is a British expatriate
resident of Brazil. He is Director of
just say it was a custody. We seized two .40 caliber
the Tactical Explosive Entry School
beautiful sight. pistols, credit cards, and cash. Our
part in the operation was over. Op-
Brazil (www.teesbrazil.com.br) and
serves as a tactical trainer, consultant
eration Mercury was a success and
and explosive breacher for Grupo
fifty of fifty-three warrants were
TIGRE.
fulfilled. Only one team was fired

18 The Counter Terrorist ~ August/September 2012


www.homelandsecurityssi.com

Take your training


Find out more at:

to a higher level...
SSI Elevated Tactics training
Enhance the tactical flexibility of your SWAT or SOP team with elevated training using
specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical
surprise and force protection with additional operational options provided through elevated,
special-use vehicles. In this two-day introduction and awareness training, youll learn:
Vehicle driving and operating techniques in a variety of situations
Global case studies of real-world operations using the specific equipment
Using vehicle platforms for observation, structure multiple entry techniques, and linear assaults
Elevated obstacle negotiation and firing platforms
Emergency evacuations, climbing and descending options

SSI
Distraction and deception techniques
SECURITY
and much more... SOLUTIONS
INTERNATIONAL
Protecting the Homeland Together

Call now for more information.


Elevated Tactics Training provided Phone: 866-573-3999
in partnership with Patriot3. Fax: 866-573-2090
contact@securitysolutionsint.com

Circle 313 on Reader Service Card


TheCard
Circle 311 on Reader Service Counter Terrorist ~Circle
August/September 2012
183 on Reader Service 19
Card
Case Study:

Spree Killer in
Toulouse, France
By Richard Marquise

Aftermath of the 2012 shootings, flags of Capitole de Toulouse are not flying. Photo: PierreSelim
Counter
The

20 The Counter Terrorist ~ August/September 2012


On March 11, 2012, the 8th anniversary of the Madrid train bombings, a
lone gunman killed a French paratrooper near the southwestern French city
of Toulouse. This seemingly isolated attack drew little attention. Four days
later, two more off-duty French soldiers were killed, and another was wound-
ed thirty miles from Toulouse in what appeared to be a drive-by shooting
at a bank ATM.

I nvestigators began to connect the


two attacks. On video later accessed by
police, the gunman shouted, Allahu Ak-
bar, or God is great, as he drove away.
involved in a series of criminal activities
and had a string of convictions for petty
crimes.2 Merah had also spent over a year
in prison for theft and upon release was
While police were working to identify rejected for service in the French Foreign
the shooter in each of these attacks, it Legion. He traveled to the border region
would take a third, more heinous crime of Afghanistan and Pakistan. Media
before he would be fully identified. Four reports provide conflicting information:
days after the second attack, on the morn- some reported it was in 20083 and others
ing of March 19 a lone gunman on a said 20104.
motorcycle drove up to a Jewish school in He trained at militant camps in Wa- Mohamed Merah. Smhur / Wikimedia
Commons / CC-BY-SA-3.0
Toulouse and began firing at anyone he ziristan. He attempted to forge ties with
saw. Before he was through, a rabbi and al Qaeda; however, except for his own
two of his children, aged six and three, statements, it is not clear if he succeeded.
were dead. Another child was gravely It was also alleged he may have fought
wounded. Media reports indicated that the with the Taliban. However, he was appre-
shooter then chased eight-year-old Miriam hended by a military patrol in Afghani-
Monsonego, fatally shooting her in the stan in 2010 and deported to France. Unfortunately, it took
head at point-blank range.1 Although the Merah may have been placed on the three attacks and
gunman initially escaped, French investi- United States Do Not Fly list because
gators linked the three attacks to twenty- of his capture in Afghanistan.5 seven deaths before
three-year-old Mohamed Merah. After Merah returned to France, French authorities were
Merah, a French citizen of Algerian interviewers attempted to determine why
descent, had come to the attention of he had been in Afghanistan. Merah told able to link them to-
French police as a teenager. He had been French personnel in November 2011 he gether and to Merah.

The Counter Terrorist ~ August/September 2012 21


had been there as a tourist and produced of the first to the final attack, but anyone
photographs to support his claim.6 who has lived through a similar series of
Despite the information After the attacks, it was alleged that attacks knows that each day that passes
already in possession the mother of a fifteen-year-old boy twice without a solution can terrorize a com-
complained to police about Merah. She munity. Recall the Washington D.C.
of French authorities stated that Merah had forced her son to sniper case in 2002 when it took police
that included Merahs watch al Qaeda videos of women being twenty-two days and ten deaths in the
shot in the head and men being strangled Washington D.C. area before two men
travel to Afghanistan, to death. He apparently had also made were conclusively linked to those attacks
his actions with regard her son listen to songs that she said were and others around the United States.
calls to go to war.7 There was also a Investigation of the first attack revealed
to the French teenager, report that a Spanish intelligence service the soldier had placed an ad attempt-
and his mothers IP had told the French government that ing to sell a motorcycle. One response
Merah had attended a meeting of Salaf- had come from a computer having an
address linked to the ists in Catalonia in 2007.8 IP (Internet Protocol) address located in
first murdered soldier, it Unfortunately, it took three attacks Merahs mothers home. Unfortunately,
and seven deaths before French authori- there were also five-hundred-seventy-six
took six days to link the ties were able to link them together and other IP addresses that were linked to the
shootings to Merah. to Merah. It is believed that he videoed dead paratrooper. Each had to be inves-
his attacks to upload to the internet. It tigated. After the second attack, French
had only been eight days from the time police as well as domestic security agency,

Homeland Security
CERTIFICATE PROGRAM
Courses for Public Safety Practitioners
Courses include:
Law Enforcement Professionals
Available Now!
Rural Domestic Preparedness Consortium

Fire Service Professionals


Available Now! Enroll in a course today.
Emergency Management No fees! No cost!
Professionals
Coming Soon!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration
Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

22 The Counter Terrorist ~ August/September 2012 Circle 265 on Reader Service Card
Direction Centrale du Renseignement In-
terieur (DCRI), created a list of suspects
that included Merah.
Despite the information already in
possession of French authorities that
included Merahs travel to Afghanistan,
his actions with regard to the French
teenager, and his mothers IP address
linked to the first murdered soldier, it
took six days to link the shootings to
Merah. Police also found evidence of con-
versations between Merah and the first
victim based on an examination of the
soldiers cell phone. A motorcycle dealer
had notified the police that a customer
had come into his shop and asked how
to deactivate the electronic locator chip
installed on a motorcycle. Deactivation
of the device would ostensibly allow the
driver not to be tracked when on the
motorcycle. That customer had been
Merahs brother, Abdelkader, who would
A news camera in the center of Toulouse after the shootings. Photo: PierreSelim later be arrested in connection with the

Halogen, HID, LED, Infrared, Thermal

Permanent, Portable & Handheld Units


Remote Control or Fixed Units
Industry Leading Warranties

308.278.3131
www.golight.com
militarysupport@golight.com
Circle 285 on Reader Service Card The Counter Terrorist ~ August/September 2012 23
Facade of the apartment of Mohammed Merah, in Toulouse, shortly after the battle with French
authorities. Photo: Casablanca1950

attacks. Abdelkader Merah also admitted After Merah was killed, many in
Merah was being present when his brother stole the France began to question whether or
motorcycle that he used in his attacks. not authorities could have done more to
tracked to his This information, once collated, allowed prevent these attacks. In spite of Merah
residence, and police to focus exclusively on Merah, yet having been apprehended in Afghanistan,
allegedly placed on the U.S. Do Not
after a thirty-two he was able to conduct his most heinous
attacks on March 19, when he killed four Fly list, and having been reported for
hour standoff, he people, including the children.9 his attempts to recruit the teen, many

was killed in a Merah was tracked to his residence,


and after a thirty-two hour standoff, he
believed that Merah had been ignored by
French law enforcement and the DCRI.
blaze of gunfire. was killed in a blaze of gunfire. Before he However, the French Defense Minister
died, Merah spoke with negotiators and responded ,I dont think so, unless we
others. He told them about his travels want to turn France into a police state.11
to Pakistan and Afghanistan, claimed to Merahs case is similar to that of a
be a jihadist, and said he belonged to number of young individuals who have
al Qaeda. He said he wanted to avenge either carried out attacks or have been
Palestinian children and take revenge on arrested in the United States as a result
the French Army because of its foreign of their having become radicalized. Some
interventions. He initially said he did believe that Merah may have been radi-
not intend to conduct a suicide mission calized in prison.12
and wanted to live, but shortly before the It is worth asking, Could it happen
standoff ended, he said he wanted to die here? Would a lone gunman attempt to
as a mujahedeen.10 kill soldiers, young children, or other

24 The Counter Terrorist ~ August/September 2012


civilians? Most of the terrorist attacks women or children. However, bin Laden
of the past few years have been directed expressed concern that many jihadi
at military or other government targets. groups may have expanded the applica-
Military and law-enforcement personnel tion of this practice from rare cases and
are easily identifiable, often because of the exception to the norm.13 The report American law
their uniforms. did not contain his thoughts about the enforcement
Other than the shooting of middle- 2004 attack at Beslan, Russia, where at
school student Iran Brown during the least one-hundred-eighty-six children
has interdicted
D.C. sniper attacks in 2002, terrorists were killed. about fifty terrorist
and other criminals have generally not There have been successful terrorist
targeted schools or schoolchildren in the attacks in the United States in the past
events in the past
United States. In fact, a review of some several years. Umar Abdulmutallab and three years.
of the documents taken from Osama bin Faisal Shahzad, the Christmas Day and
Ladens home in Abbottabad, Paki- Times Square bombers, respectively,
stan, indicates that bin Laden himself Nidal Hasan at Ft. Hood, and Carlos
may have rejected such an attack. The Bledsoes murderous attack at a military
documents outline bin Ladens thoughts recruiting station in Little Rock dem-
about tatarrus, which are the special onstrate there is work to be done to
circumstances where it is permissible keep our communities safe. While these
under Islamic law for a military com- attacks represent our failures, many oth-
mander to attack enemy territory even ers have been prevented. American law
if the attack will result in the death of enforcement has interdicted about fifty
noncombatants, including Muslim terrorist events in the past three years.

ProTecT
Your Vehicle BaTTerY uSing 2
SeParaTe Timing DelaYS

T2 ShuT Down Timer


Protect vehicle batteries from over-discharge by
shutting off up to single 30 amp and 20 amp loads at a
preset time after the engine is shut down or when the
battery is discharged to a low voltage level

Manage power loads separately using 2 independent


timing circuits

An emergency switch allows 15 minutes of operation


after the timer shuts down the equipment

The timed sequences can be activated by sensing when


the ignition is turned to, or the alternator goes, off

POWER SPECIALISTS FOR MOBILE COMPUTING

1.800.697.3701 info@lindelectronics.com www.lindelectronics.com

Circle 327 on Reader Service Card The Counter Terrorist ~ August/September 2012 25
This includes a number of individuals prevented attacks by domestic terrorists
who have attempted to provide material whose motivation is fueled by events
support to or attempted to join a ter- taking place solely in the United States.
rorist group overseas as well as conduct On May 1, 2012, a group of anarchists
attacks domestically. wanting to send a message to corpora-
While much of the media focus has tions and the United States government
been on individuals like Merah who are by blowing up a major bridge near Cleve-
considered international terrorists by land, Ohio, were arrested.14
ideology, there have been successful and Significant terrorist plots were stopped
in New York, Illinois, North Carolina,
and Texas in 2009. The last defendant
in a plot described as the most op-
erational since 9/11 was convicted on
May 1, 2012. In that case, three former
high-school classmates had conspired to
conduct suicide attacks on the New York

P
City subway system on the anniversary
of the 9/11 attacks. Other interdicted
plots involved both explosives and weap-

S
ons attacks.

R
More attacks were prevented in 2010
RUBBER TRACK
in Virginia, Maryland, Oregon, Michi-
CONVERSION SYSTEMS 75 MODELS TO CHOOSE FROM gan, and Alaska. Other individuals were

O O arrested as they attempted to travel


abroad to join terrorist groups or while
they were providing funds to support

L
them. During 2010, terrorism investiga-
tors found a number of individuals who

B
traveled (or wanted to travel) to Somalia
in order to join al Shabaab. Two young

V
men from New Jersey were recorded
saying, Well start doing killing here, if I

L cant do it over there (Somalia).15


In 2011, numerous plots, both domes-

E
tic and international, were disrupted in
Mattracks.com the United States including Texas, Wash-

E ington, and the Washington, D. C. area.


Jason Abdo, a young U.A. (unauthorized

D
absence) soldier from Fort Campbell, KY,

M
was arrested in Texas as he planned to at-
tack soldiers at Ft. Hood. He was charged
with attempting to attack a restaurant
that soldiers from Ft. Hood frequented.
In his possession were explosives com-
ponents as well as an article from the
al Qaeda online publication, Inspire,
Karlstad, MN entitled Make a Bomb in the Kitchen of
218-436-7000 110M000D0101 Your Mom.16
Circle 297 on Reader Service Card

26 The Counter Terrorist ~ August/September 2012


toknowledge is critical
deter the threat of terrorism.
Elena Mastors, Ph.D. | Dean, School of Security & Global Studies
Dr. Mastors represents the caliber of AMU scholar-practitioners,
combining in-depth field research with academic rigor. A foremost
expert in political-psychology pertaining to counter-terrorism, she taught
at the U.S. Naval War College and frequently lectures on subjects of
conflict, terrorism, and political leadership. A published author, her
works include, Breaking al-Qaeda: Psychological and Operational Techniques
and The Lesser Jihad: Recruits and the al-Qaida Network.

Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Circle 211 on Reader Service Card The Counter Terrorist ~ August/September 2012 27
In early 2011, a young Saudi student
studying at South Plains College in Lub-
bock, Texas, was arrested as he collected
components to make a bomb. Khalid Al-
dawsari has been charged with attempt-
ing to use weapons of mass destruction
in carrying out a terrorist attack. At
the time of his arrest, he had purchased
lab equipment and a trigger as well as
two of the three chemicals required to
make an explosive device. He had also
done research on possible targets in the
United States.17
In 2012, several attacks have already
been prevented. In addition to the pre-
empted attack in Ohio described above,
another young man was arrested as he
walked toward the U.S. Capitol wearing
a suicide vest and carrying an inoperable
weapon provided by the FBI. He had
also been recorded discussing possible at-
tacks on U.S. soldiers in the Washington
Circle 273 on Reader Service Card
D.C. area.
The above are examples of plots that
have been interdicted in the United
Explosive Countermeasures International, Inc. is States in the past three years. There are
dedicated to eliminating the threat to human life caused any number of young (and old), rich and
by the use and misuse of explosives worldwide. poor, disaffected and not individuals who
for a variety of reasons want to strike
EXPLOSIVE DETECTION CANINE TEAMS.
Americans no matter the costto the
FACILITY HARDNESS REVIEWS, PLANS.
victims or to themselves.
TRAINING SERVICES:
After Merahs murderous attacks, a
Access Control - Control Point Screening.
moderator of an online al Qaeda forum,
Mail Room X-Ray Screening Operations.
Abu Sad al-Amili, wrote, The hero of
Hazardous Mail - Mail Room Operations.
Explosive Device Recognition & the battle of Toulouse will be an ex-
Search Procedures. ample and a role model for whomever
Chemical & Biological WMD is behind him among the Muslim youth
1st Responders Course.
Managing Bomb Threats & Incidents in the West, especially those who have
(Operations/Managers). not joined up with Mujahid groups.
Managing Bomb Threats & Incidents He wrote further that the actions (such
(Law Enforcement).
Advance Anti-Terrorism Course. as Merahs) will make them heroes for
Islam. Al-Amili wrote that many of the
A crisis is not the time to determine your responses and needs. youth (in the west) have no social value,
Will you be ready? no jobs, or faith, but due to the wide
margins of liberty in the West, they will
www.nobombs.net be prevented from becoming downtrod-
Phone: 540-364-6900 den like the Arabs living under tyrannical
3151 Winchester Road, Delaplane, VA 20144

Circle 121 on Reader Service Card


28 The Counter Terrorist ~ August/September 2012
rule in their home countries.
Al-Amili ends his online essay by
stating that Western-born Muslims are
rejecting local governmental attempts to
promote non-violent forms of Islam, and
ultimately the goal will be to produce an
al Qaeda in Western dress with blue eyes
and with a totally Western appearance.18
Most people believe the killing of any
child is reprehensible. Unfortunately,
some like al-Amili only see a jihadist
doing his part to attack the west. The
military, its personnel, and facilities will
continue to be targets of terrorists in the
United States, and attacks such as that
perpetrated by Merah would be an effec-
tive way to carry them out. Whether or
not children will be a target, we only have
to look at the D.C. snipers and at Merah
to realize the continued likelihood of this
type attack.
The responsibility to identify those who
Map of the school, and access map of Merahs residence. Source: Open Street Map may wish to harm us, our institutions, or
our children rests with individual citizens.
Communities working with local law
enforcement have the ability to identify
those who may represent a risk to them.
In turn, local law enforcement working
in partnership with the Joint Terrorism
Task Forces and Fusion Centers around
the United States have been effective in
preventing a number of terrorist attacks.
These relationships are the key to prevent-
ing attacks such as those perpetrated in
Toulouse. It will be our local institu-
tionsfamily, community, and local law
enforcement working in conjunction with
federal and international partners who
constitute our defense network. It will
be up to them to identify the Mohamed
Merahs in their communities.

Location map of Montauban and Toulouse, France. In pink, the area covored by the Scarlet
Vigipirate level. Author: Eric Gaba Wikimedia Commons user: Sting

The Counter Terrorist ~ August/September 2012 29


ABOUT THE AUTHOR Rapheal Ahren, Woman Went to
7

Mr. Marquise is the Director of the Police about Merahs Radicalization Two
Department of Justices, Bureau of Justice Years Ago, The Times of Israel , 21 March
Assistance State and Local Antiterror- 2012, (10 April 2012), http://www.
ism Training (SLATT) program. He is timesofisrael.com/shooting-suspect-said-
a retired FBI senior executive who led to-like-talking-about-cars-bikes-girls-and-
the investigation into the bombing of sport/.
Pan Am Flight 103 and is the author of
8
Simons, A Serial Killer Under Obser-
vation.
It will be our Scotbom: Evidence and the Lockerbie
9
Ibid.
Investigation.
local institutions 10
Laura Smith-Spark, Who is
French Shooting Suspect Mohammed
family, community, End Notes Merah?,CNN.com, 22 March 2012,
and local law Fiona Govan, Toulouse shooting:
1
(10 April 2012), http://articles.cnn.
little girl cornered in school and shot in
enforcement working head, The Telegraph, 03 March 2012, (04
com/2012-03-21/world/world_europe_
france-shooting-suspect-profile_1_qaeda-
in conjunction April 2012), http://www.telegraph.co.uk/
pakistan-s-waziristan-afghanistan?_
news/worldnews/europe/france/9154350/
with federal and Toulouse-shooting-little-girl-cornered-in-
s=PM:EUROPE.
11
Simons, A Serial Killer Under Ob-
international partners school-and-shot-in-head.html.
servation.
2
Sarah Dilorenzo and Johanna De-
who constitute our course, French Shooting Suspect Dead
12
Elaine Ganley, France Looks at
Radicalization in Prisons, Salon, 10 April
defense network. as Toulouse Siege Comes to Violent End,
2012, (09 April 2012), http://www.salon.
The Guardian, 03 March 2012, (10 April
com/2012/04/09/france_takes_new_
2012), http://www.guardian.co.uk/news/
look_at_radicalization_in_prisons.
blog/2012/mar/22/france-shooting-tou- 13
Don Rassler, Gabriel Koehler-
louse-police-suspects-jewish-school-raid.
Derrick, Liam Collins, Muhammad
3
Duncan Gardham, British links to
al-Obaidi, Nelly Lahoud, Letters from
Toulouse Terrorist, The Telegraph, 22
Abbottabad: bin Ladin Sidelined?,
March 2012, (10 April 2012), http://
Countering Terrorism Center at West
www.telegraph.co.uk/news/worldnews/
Point, 5/3/12, http://www.ctc.usma.edu/
europe/france/9163544/British-links-to-
posts/letters-from-abbottabad-bin-ladin-
Toulouse-terrorist.html.
sidelined.
4
Rob Crilly, Toulouse Shooting: 80 14
United Statesv. Douglas L. Wright,
French Nationals Training with Paki-
1:!2-mj-03073-gw (6th Cir. 2012).
stani Taliban, The Telegraph, 21 March 15
United States v. Mohamed Alessa, 10-
2012, (10 April 2012), http://www.
mj-8109 (3rd Cir. 2010); United States
telegraph.co.uk/news/worldnews/europe/
v. Carlos E. Almonte, 10-cr-594 (3rd Cir.
france/9158336/Toulouse-shooting-80-
2010).
French-nationals-training-with-Pakistan- 16
United States v. Naser Jason Abdo,
Taliban.html.
w-11-cr-182 (5th Cir. 2011).
5
Stefan Simons, A Serial Killer Under 17
United States v. Khalid Ali-M Al-
Observation, Spiegal Online Interna-
dawsari, 11-mag-2617 (5th Cir. 2011).
tional, 22 March 2012, (10 April 2012), 18
Jihadis New Toulouse Inspiration,
http://www.spiegel.de/international/
The Investigative Project on Terrorism, 18
europe/secret-services-had-monitored-
April 2012, (22 April 2012), http://www.
french-serial-killer-a-823200.html.
investigativeproject.org/3540/ipt-exclu-
6
Ibid.
sive-jihadis-new-toulouse-inspiration.

30 The Counter Terrorist ~ August/September 2012


Circle 131 on Reader Service Card The Counter Terrorist ~ August/September 2012 31
The U.S. Citizen, the
Second Amendment,
and the U.N. Small
Arms Treaty

New Orleans Police officer at a crime scene, Central City, New Orleans.
Counter
The
Photo: Derek Bridges

32 The Counter Terrorist ~ August/September 2012


By Ross Riggs

Despite the well-known motto to


protect and serve, police officers
cannot prevent crime from being
initiated. A crime is reported or
observed and they respond to
it, after the fact, and try to limit
damage. But prevent crime?

O

nly in the big scheme of
things, such as with a highly
visible patrol presence, a substantial
percentage of convictions, and strict
responsible for any individuals safety is
that individual. So from where does the
misleading phrase, Protect and Serve
originate?
sentencing is crime prevented by From 1950 to 1966, Chief William
deterring irrational actors, most of whom Parker led the Los Angeles Police
would not have done anything illegal in Department through an amazing period
the first place. of re-birth. Chief Parker was one of
When crime happens in your the first to believe that cops could be An unrealistic
neighborhood, in your family, on your trained, equipped, led, and respected
front porch, there is only one person as professionals.1 In the early 1960s, expectation has
responsible for stopping that criminal Chief Parker enlisted the help of then been created as
before he commits the crime he intends Inspector Daryl Gates. Together they
to commit. Many criminals attempt created the countrys first SWAT team, to what the police
crimes regardless of how many patrol cars began developing the concept of field in any community
are out or how high the risk of jail time training officers, and increased basic and
might be. The only person who can be in-service training standards, to name can do.

Constitution of the United States Photo: U.S. National Archives and Records Administration

The Counter Terrorist ~ August/September 2012 33


Department Motto - To Protect and to Serve, along with the Los Angeles city seal is located on both front doors of every black & white LAPD
patrol vehicle. - Jeff Costlow 2004. Photo: Skyfox11

but a few innovations. community experiences when police make the desired difference is so painful.
Officer Joseph Dorobek2 created the incompetence is perceived when really The criminal always gets the first move
motto Protect and Serve for the LAPD bad things happen is exponentially and once the first move is played, the
Training Academy in 1955. The motto greater on the police themselves. They are responder can only react to what the
was adopted by the Los Angeles City individually and collectively frustrated. criminal has already done. Even when
Council as the department motto in 1963 Cops receive pressure from seniors and the police try to anticipate the next move
and has graced the patrol cars of that peers, are lampooned by the media, and of a criminal, such as a serial killer, they
agency ever since. Through good times are sometimes even hated by the members have to first respond to the crimes already
and bad, Protect and Serve was the of the public they have sworn to protect. committed. The resulting friction plays
bottom line for what law enforcement It has been said, "We did not become the out in increased distrust of the police by
was all about. But with that motto have men that we are because we were soldiers the public, and of officers denigrating the
come some unintended consequences. or cops, but became soldiers and cops citizens they joined the force to serve.
An unrealistic expectation has because of the men we are."3 In as much as most crime is not
been created as to what the police in This quote explains the mindset of perpetrated by a criminal in the lobby
any community can do. The stress a most cops, and also why such inability to of police headquarters at shift change,

34 The Counter Terrorist ~ August/September 2012


Mobility, Deployment,
Maintenance, Sustainment
And Operations Systems

Deployable Command Centers


Enhanced Command and Control
Secure Communications
Video Conferencing
Increased Protection for Sensitive Equipment
Increased Mission Flexibility
Multiple System Configurations
Deployable via Military and Commercial Vehicles
Air-Transportable and Sling-Loadable

Deployable Data Security


360 High
Data Container HVAC Weather and Fire-proof
Density
Insulation HVAC Condenser/
Maximum Flexibility Venting ISO Compatible Enclosure Evaporator Chilled H2O

Completely Customized
to Client Requirements

Fire Detection Un-Interruptable Power Distribution


Racks
and Suppression Power Supply (UPS) Unit (PDU)

Phone (866) 312-6226 (571) 259-2817 THE


Fax (800) 862-9489 Email info@sesolinc.com SESOLINC
GROUP
www.sesolinc.com
Circle 239 on Reader Service Card

The Counter Terrorist ~ August/September 2012 35


the vast majority of crime in the individual to whom the crime is about
United States and elsewhere will not to happen. The phrase victim of crime
be prevented. This premise, of course, has been used universally when perhaps a
recognizes that society cannot quantify more constructive perspective is victim
However, if every how much crime has been prevented of their own refusal (or inability) to take
individual took since it never occurred. However, the action necessary to stop the criminal
based on available crime statistics, it from completing their crime. The term
responsibility to stop is reasonable to conclude that the vast inability is appropriate because there are
criminals before majority of crimes that are committed individuals who are incapable of acting
are not preventable by local police. If that in their own best interests, whether they
they committed an is true, why do police agencies and their are unborn babies, infants, or the infirm.
act against them, communities continue to hold on to that Some others, too, could not have foreseen
paradigm? Why are billions of dollars the situation in which they found
criminals would not poured into such a losing proposition? themselves, nor in any way could they
be so brazen. Finally, why is the inevitable fulfillment have avoided the event.
of the obvious outcome allowed to create If they did whatever they had to do
such stress? to remain alive, they are winners, not
There is only one person in all the victims. If they did all that they could
world who can be responsible for possibly do to survive but did not, they
preventing crime, and that person is the are heroes. Individuals, must, however,

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areas
where no power or communication lines exist.
Motion activated trigger as fast as 1/10th of a second. Completely weatherproof housing designed for
1080P High Definition color images by day, NoGlowTM Covert extreme duty usage.
Infrared illumination by night. General surveillance and license plate capture
Compact size (5.5 x 4.5 x 3) aids in concealment. models available.
On-board memory and power with a battery life of up to one Made in the U.S.A. No
Glow
year or 40,000 images. Covert
Infrared

Visit www.reconyx.com for more information.


36 The Counter Terrorist ~ August/September 2012 Circle 303 on Reader Service Card
Video training from leading
law enforcement experts.
Anytime, anywhere.

With more than 500 high-definition videos covering dozens of critical training topics, the
PoliceOne Academy gives you instant, cost-effective access to training that will improve your
teams performance and help keep them safe on the streets.

The PoliceOne Academy Offers


No overtime, travel, or downtime costs associated with training

A wide variety of topics from Defensive Tactics to Leadership

Ideal for in service/roll call training

An easy-to-use video navigation and management system

Objective lesson plans and knowledge check quizzes

Tracking and reporting features

An advanced-delivery system that ensures the highest possible


quality of streaming available based on your internet connection
Access from your mobile device

Available to departments for an affordable annual subscription


based on agency size

Contact us today at
(800)323-0037
for your FREE department preview!
Circle 335 on Reader Service Card

is a Praetorian Group Company


Circle 180 on Reader Service Card www.PoliceOneAcademy.com The Counter Terrorist ~ August/September 2012 37
understand their responsibility to avoid and disarmed him, holding him for the would-be criminal, crime rates would
becoming a victim of crime and realize police. The pastors grandson, according plummet. The significance of lone wolf
their own capability to prevent crime. to some of the reports, was licensed to terrorists would be negligible.
The first rule of risk mitigation is carry a concealed firearm and used his The infiltration of Americas city
to avoid the risk.4 The numbers of weapon to hold the subject for police. streets by gangs, many now affiliated
options for preventing a criminal act are They made a choice to be responsible for with Mexican drug cartels, have brought
too numerous to catalog here. Suffice their own safety. Mexicos drug war into U.S. homes.
it to say, the responsibility does not Americans have traditionally stood Initially it was border towns that were at
lie with the local gendarme, a father, up for themselves. Admiral Yamamotos risk. Many political leaders turned their
a brother, or even the generous soul not wanting to accept the risk of an heads, and now it is well beyond the
performing Neighborhood Watch down invasion by his Japanese Imperial Fleet border and the violence of drug cartels is
the street. It can, and must, only reside on Americas West Coast following Pearl visible in daily newspapers across the U.S.
with the individual. Harbor is well known. According to There is no current plan that is
In the spring of 2012 a small church legend, he reasoned that there would consistently applied across the law
in Spartanburg, South Carolina, was the be a rifle behind every blade of grass. enforcement field to combat this
scene of an attempted mass shooting 6
However, if every individual took incursion. The case study, Los Zetas
incident.5 When the congregants saw a responsibility to stop criminals before Cartel: Ambush in Houston, articulated
man with a gun approaching the church, they committed an act against them, the problem very clearly. Our
they took action. First, they barred the criminals would not be so brazen. If population (CONUS) is insufficiently
door. When the shooter broke through there were the probability of a rifle in the informed of the threat, and will be
the door, the congregants jumped him hands of a well-trained patriot awaiting caught unprepared in the crossfire in

38 The Counter Terrorist ~ August/September 2012 Circle 175 on Reader Service Card
their neighborhoods.7 Citizens who Amendment. U.S. Attorney General Eric The law abiding
are insufficiently informed are not Holder is on record as stating in 1995
able to effectively avoid risk. Crime that he wanted to brainwash people into citizen would be left
prevention in the U.S. must focus thinking about guns in a vastly different dependent solely on
on not only encouraging citizens to way.8
avoid risk, but also on more accurately Currently, health insurance companies the police to protect
communicating the risks to the public require physicians to ask, in their him and his family
so they can avoid or ameliorate a risk screening process, if patients keep any
when possible, and confront the risk guns in their homes, regardless of the
and that is clearly not
when that is their only option. reason for the doctor visit. They also a reasonable option.
The public cannot adequately require the insured to grant access to
prepare to protect themselves by all medical records by the insurance
becoming better informed of the risks, company at any time. Now, if medical
learning strategies on how to avoid, insurance were provided by a government
ameliorate and confront risks, and entity administered by an individual
teach these methods to their families lacking commitment to the Constitution,
if, at the same time, they must tolerate one can imagine the potential for abuse.
attempts to undermine the Second As another concern, Secretary of State
The Counter Terrorist ~ August/September 2012 39
Hillary Rodham Clinton, Secretary of State, met Katsuya Okada, Minister for Foreign Affairs,
and Stephen Smith, Minister for Foreign Affairs, at the Waldorf-Astoria Hotel in New York
City, New York State on September 21, 2009. Photo: State Dept Image by Michael Gross
Hillary Clinton reportedly announced Small Arms Treaty Summary contains
that President Obama would seek to these details:
pass through Congress approval of the (55) The World Report on Violence
United Nations Small Arms Treaty.9 The Against Children indicated that violence in
phrase the devil is in the details may the community could take on frightening
fit here. The summary document posted proportions where weapons were in wide
by the U.N. on the issue of a small arms circulation. The report recommended that
treaty and proliferation of guns leading States develop a comprehensive prevention
to violence has the respectable stated goal policy to reduce demand for and access
of stopping international illegal trade. to weapons as a key action to reduce
Among others, the text of the U.N. environmental factors that contribute to

Circle 343 on Reader Service Card

40 The Counter Terrorist ~ August/September 2012


U.S. Attorney
General Eric Holder
is on record as
stating in 1995
that he wanted to
brainwash people
into thinking about BP-2C

Official portrait of United States Attorney


guns in a vastly
General Eric Holder. Photo: United different way.
States Department of Justice

violence against children in the community. achieved buzzword status at some


(56) Just as there is no single cause to armed U.S. think tanks. In recognition of
violence, there is no single solution. Armed the potential for chaos to be created
violence reduction programmes must take by acts of terrorism, spill-over narco
a wide range of risk and resilience factors insurgency, financial breakdown, and
into account and involve all stakeholders. other disasters, citizen resilience has
The current efforts to reduce and contain re-emerged as a point of interest. One
armed violence are generally carried out by must ask: Does a nave understanding of
military and policing institutions, public police protection improve or degrade
health and education agencies [emphasis individual resilience? Does inhibiting BP-2
added] or civil society organizations that individuals desire and ability to defend
focus on conflict prevention, peacebuilding, themselves and their property improve or
transitional justice, and community degrade citizen resilience?
development10 Of course, if the point is crime
This is but one excerpt of the summary reduction and risk amelioration, limiting
of the U.N. agreement but additional access to small arms will only adversely
treaty passages reveal the desire to affect law-abiding citizens. Criminals,
require every weapon everywhere by definition, are willing to break the
and, when possible, all ammunition law and will obviously still use guns. Just
to be traceable by governments. U.N. as the 18th Amendment did not stop
personnel have publicly expressed drinking, even an amendment to reverse
indifference to individual gun ownership the Second Amendment would not
and self-defense needs. It is easy to prevent criminals from obtaining guns.
see the potential for damage to the The law abiding citizen would be left
Constitution by being overly cooperative dependent solely on the police to protect
with various U.N. initiatives. him and his family and that is clearly not BANgstick
Resilience is a word that recently a reasonable option. WWW.FLASHBANGPOLE.COM

Circle 155 on Reader Service Card


Circle 339 on Reader Service Card The Counter Terrorist ~ August/September 2012 41
Circle 79 on Reader Service Card

Protective
security equiPment
At ICOR, we understand that the outcome of your mission
depends on the performance of our products. Thats why we
design rugged, high-quality, competitively priced EOD / SWAT
equipment, backed by our unlimited technical support.
CALIBER Robot
Hook & Line Kits
Search Mirrors
EOD Hand Tools
Search Kits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3
Tel: 613.745.3600 I Fax: 613.745.3590 I Email: sales@icortechnology.com
Toll Free: 1.877.483.7978 www.icortechnology.com

42 The Counter Terrorist ~ August/September 2012 Circle 81 on Reader Service Card


In th

Nas
e He
art o

h
f Do

ville
wnt
10 M own
inut
es f
rom
the
PRESENTS Airp
ort

2012 POLICE & MILITARY WORKING DOG


CONFERENCE AND VENDOR SHOW
Registration/Icebreaker Social: September 30 - Conference: October 1,2,3
Sheraton Hotel Downtown - Nashville, TN
Register Now! Only $275 per person $350 after August 15
Attendees will receive a certificate for 24 Hours
Continuing Law Enforcement K-9 Education

270.534.0500 info@k9copmagazine.com www.k9copmagazine.com

K9COP
ribu
is t

te
d
Wo
rl
dwide

M A G A Z I N E TM
For Police and Military Working dog Handlers
The largest and most read
Police and Military
K-9 magazine in the world
SUBSCRIPTIONS
available to EVERYONE
ONLY $29.95
1 year (6 issues)
Follow us on Scan code with
[[

your smartphone
to subscribe today!

www.k9copmagazine.com (270) 534-0500 info@k9copmagazine.com

Circle 277 on Reader Service Card The Counter Terrorist ~ August/September 2012 43
Hillary Rodham Clinton, Secretary of State, met Katsuya Okada, Minister for Foreign Affairs, and Stephen Smith, Minister for Foreign Af-
fairs, at the Waldorf-Astoria Hotel in New York City, New York State on September 21, 2009. Photo: State Dept Image by Michael Gross

ABOUT THE AUTHOR 2012, http://www.lapdonline.org/ Yamamoto accessed June 11, 2012
Dr. Riggs retired Louisville, history_of_the_lapd/content_basic_ 7
Jennifer Hesterman, Los Zetas
Ohio Chief of Police, a 38-year law view/. Cartel Ambush in Houston, The
enforcement veteran and a graduate
3
Ross L. Riggs, Truth, Justice, CounterTerrorist, April-May 2012, 26.
and the American Way, Magazine of 8
Eric Holder Brainwash People

K9 COP AD #1
of the FBI National Academy. He is
the president of Security Consulting the FBI National Academy Associates, About Guns, YouTube, (18
Investigations, LLC (www.security- June 21, 2011, http://issuu.com/fbi_ March 2012), accessed May 27,
consulting.us). His blogs are available nationalacademyassociate/docs/fbi_mar- 2012, http://www.youtube.com/
at: www.homelandsecuritynet.com/ apr2012_flipbk. watch?v=0nM0asnCXD0.http://www.
HSN/?s=PoliceBlotter and he is working
4
Ross L. Riggs. In Times of Crisis: youtube.com/watch?v=0nM0asnCXD0.
on his first book: To Protect and Serve A Plan for Creating Contingency 9
Rand Paul, Stop the U.N. Gun Ban,
(projected 2013 release). Management Teams for Missionary National Association for Gun Rights,
Sending Churches and Agencies. Library of accessed June 1, 2012, www.nagr.org/
Congress TXu1-687-474, April 28, 2009. UN_lp_survey2.aspx.
End Notes 5
Derek Dellinger and Casey Vaughn, 10
Ban Ki-moon, Small Arms: Report
1
Alisa Sarah Kramer, William H.
Churchgoers Subdue Gunman at of the Secretary-General, United
Parker and the thin blue line: Politics,
Spartanburg Church, accessed March Nations Security Council, (05 April
public relations and policing in postwar
25, 2012, http://www.foxcarolina.com/ 2011), accessed April 2, 2012, http://
Los Angeles, American University 2007.
story/17251517/churchgoers-subdue- www.un.org/ga/search/view_doc.
2
History of the LAPD, Los Angeles
gunman-at-spartanburg-church. asp?symbol=S/2011/255.
Police Department, accessed June 11, 6
http://en.wikiquote.org/wiki/Isoroku_

44 The Counter Terrorist ~ August/September 2012


New and improved

( portable vehicle barrier )


When Law Enforcement in Dallas wanted a product
to protect the greatest sporting event in the US they
chose SSIs PVB.
The reason the PVB is used by agencies and
militaries across the globe is that it transfers the
momentum of the threatening vehicle upwards and
stops it in its tracks. Two adults can deploy the
barrier in minutes, and there is no need for electricity
whatsoever.
The Portable Vehicle Barrier comes with several
customized configurations:
You can put wheels on it so that it acts as a swing
barrier and easily opens a road
You can toughen the line by adding anchoring
cables or place the PVBs in one single row or
even three rows to stop anything
Additional safety features can be added
PVBs can be folded down quickly moved and stored
with ease the PVB is reusable and durable.
Best of all NO maintenance is required.
Made in the USA means jobs in the USA and
supporting our national economy. Ordering is quick
and easy allowing us to make the PVB available to
your agencies immediately. Besides being the most
cost effective barrier in the business today, the PVB
is a VBIED killer. CALL NOW.

Call now for more information. Pricing dependent on quantity

SSI
and delivery location. Call: (305) 401-6906
SECURITY
or email info@homelandsecurityssi.com SOLUTIONS
INTERNATIONAL
Or visit our website: www.SSIPVB.com Protecting the Homeland Together
Circle 308 on Reader Service Card TheCard
Circle 226 on Reader Service Counter Terrorist ~ August/September 45 Card
2012Service
Circle 136 on Reader
Book Review

The Eleven: Saudi Guantnamo Veterans


Returning to the Fight
By Evan F. Kohlmann Reviewed by: Chris Graham

S everal years ago in Iraq, I wit-


nessed multiple mass prisoner re-
leases. I felt confident that I would never
the number of American troops killed in
Iraq by terrorists who had already been
in custody and released.
For a number
subject of terrorist recidivism is difficult
to obtain. The Eleven: Saudi Guantnamo
Veterans Returning to the Fight, by Evan F.
see a study commissioned to determine of reasons, accurate information on the Kohlmann (www.nefafoundation.org) is a

GUANTANAMO BAY, Cuba (Dec. 31, 2009) A Soldier stands guard in a tower at Camp Delta at Joint Task Force Guantanamo Bay.
Photo: U.S. Army by Spc. Cody Black/Released.

46 The Counter Terrorist ~ August/September 2012


uniquely valuable work on the subject. before entering Afghanistan and work- "there is also one other final lesson to be
The previous presidential election ing with the Taliban. US officials believe learned from the [Administrative Review
brought the handling of terrorist prison- he trained at al Qaeda's infamous al Board] ARB panel reviews of the eleven
ers to the forefront as one candidate Farouq terrorist camp near Kandahar, Guantnamo veterans currently sought by
promised to close the US military prison Afghanistan. (This same camp produced Saudi authorities: the danger of blindly
in Guantnamo Bay Cuba (Gitmo). at least seven of the 9/11 hijackers.) He taking anyone at their word that they are
Once elected, President Obama issued was captured in Afghanistan and sent to not, in fact, enemy combatants. Argu-
several executive orders on the subject of Gitmo. Kohlmann states that his case file ably, the most dangerous of the eleven
doing so, and then reversed himself in said, the detainee stated he considers all Saudi Gitmo veterans currently on the
practice by keeping the facility open to Americans his enemy. The Detainee has runSaeed Al Shehri and Mohammed
this day. Despite the prisons being kept decided that he hates all Americans be- Al-Harbi were cooperative, non-confron-
open, about 600 prisoners have been cause they attack his religion, Islam. Since tational, and even charming during their
released.1 The Eleven profiles some of Americans are the detainees enemy he interactions with ARB panel members in
those prisoners. will continue to fight them until he dies." Guantanamo Bay.
The title of the work comes from the Yusuf Al Shehri was nonetheless released The NEFA foundation posted a Direc-
fact that, at the time of publication, by the US military from detention on tor of National Intelligence document
eleven alleged terrorists wanted by the November 9, 2007, to the Saudis. In a called Summary of the Reengagement of
Saudi Arabian government were known quote repeated throughout this docu- Detainees Formerly held at Guantnamo
to have been held at Gitmo and released ment, Kohlmann states, "it is not known Bay, Cuba (2012).2 This document con-
to Saudi Arabia. Obviously, it would be when, how or why Shehri was able to firms that released prisoners are returning
likely that the total number of recidivist escape his Saudi captors." to jihad, albeit at a reportedly improving
terrorists from Gitmo would be higher Jabir Bin Ali Bin Jubran al-Faify rate, to this day. Terrorist recidivism is a
than could be proven. claimed he was "influenced to join jihad complex issue. Kohlmanns The Eleven:
The first man profiled is Saeed Ali Jabir after studying various verses in the Koran Saudi Guantnamo Veterans Returning
al-Kathim al-Shehri. Al-Shehri traveled to dealing with jihad." Al-Faify was a drug to the Fight provides much information
Iran and served as an "al Qaeda facilitator user and saw jihad as an opportunity relevant to the challenges we face with
. . . For youth traveling to Afghanistan." to make things right. It is believed that todays series of inconsistent systems
Al-Shehri admitted to later traveling to he attended the al Farouq camp. He was for terrorist interdiction, apprehension,
Afghanistan before being wounded and picked up in Pakistan after fleeing Tora detention, and release.
taken into custody. Kohlmann states, Bora, Afghanistan, in 2002. The military
"On November 9, 2007, Saeed al-Shehri review board said, "the detainee stated End Notes
was quietly transferred by the US govern- that he now thinks what he did was 1
Summary of the Reengagement of
ment from his cell in Guantanamo Bay mistake." Al-Faify was released to Saudi Detainees Formerly Held at Guanta-
to a locally-run detention facility in Arabia in 2006 and subsequently escaped. namo Bay, Cuba, Director of National
Saudi Arabia. Less than a year later, Al Kohlmann states, "it is not known when, Intelligence, accessed June 2, 2012, www.
-Shehri managed to escape the grip of how or why al-Faify was able to escape his nefafoundation.org
Saudi security forces and fled with other Saudi captors."
2
Ibid.
high-profile Saudi al Qaeda operatives Attacking guards, expressing joining
to neighboring Yemen. Al-Shehri later the jihad to die, and hatred for Ameri-
turned up in a video using the title, Sec- cans and all non-believers was reported
retary General of the Al Qaeda organiza- from other Gitmo releasees. Some were
tion Saudi Arabia." released after the review panel unani-
Yusuf Muhammad Mubarak al-Jebairy mously decided that the subject contin-
al-Shehri had travelled to Syria and Iran ues to be a threat. Kohlmann concludes,

The Counter Terrorist ~ August/September 2012 47


HIZB UT-TAHRIR CONVENES
IN ILLINOIS
By John Andrews

Hizb ut-Tahrir is working for the establishment of an islamic state ("Ummah") lead by one true leader ("khilafah"/caliph).
Counter
The

48 The Counter Terrorist ~ August/September 2012


Hizb ut-Tahrir (HuT), or the Islamic
Party of Liberation, is a little-known
organization that has successfully
merged orthodox Islamist ideology
with Leninist strategy and techniques.

I t was founded in 1952 by Sheikh


Taqiuddin an-Nabhani al Falestini. It
is a political party based on Islam. Islam
in this context is not only a religion, but
him. It also states, Allah (swt) says: And
never will Allah grant to the unbelievers
a way over the believers. [4-141]2 HuT
members hold that all other forms of
There are
approximately
10,000 hard core
an all encompassing ideology and way government contradict human nature and
of life that has an answer for all mans bring nothing but misery to mankind. members operating
problems, whether economic, cultural, This is especially true of democracy, which
social, or political. states that sovereignty belongs to the
in over 40 countries
HuT holds that one can only truly live people and not to Allah. with a significant
as a Muslim if he lives under a government
controlled by Muslims. Followers believe
The goal of this organization, as spelled
out in its website, is seizing the reins
presence in London.
that only under such a system can human of power through the Ummah [muslim
nature thrive and experience tranquility.1 community] in order to implement the
The official website of Hizb ut-Tahrir ideology in a comprehensive manner,
states, Another condition of Jihad is that because it is forbidden to seize partial
the ruler must be Muslim, be he righteous power. Hence, the arrival at the ruling
or dissolute (Fajir); the term Fajir does must be total and the implementation of
not include the Kafir (infidel) because the Islam must be comprehensive.3
Kafir cannot be Emir over the Muslim According to an-Nabhani, such a
and the Muslim is not obliged to obey government would be led by a Caliph,

The Counter Terrorist ~ August/September 2012 49


Sheikh Issam Amira (an islamic scholar) talking in a conference organized by Hizb ut-Tahrir in Ramallah.

who is a substitute for Mohammed, a two-year period of study supervised by a


a political, as well as religious, leader. party member. After their indoctrination
He would declare jihad and wage war is complete, they would become a cell
against all non-believers and would member along with five to eight other
not recognize existing national, tribal, members. Only the commander of the cell
or clan differences. The Caliph would knows the next level of the leadership.
be appointed by a group of prominent 2) Convince the Ummah to adopt
men and remain a Caliph as long as he the ideology of the party and follow the
followed Islamic law. He would not be established vanguard. They will do this
accountable to the people.4 by attacking the West as colonial powers
HuT states that they intend to achieve that control the intellectual, political,
the Caliphate by way of a three-pronged economic, and military apparatus of the
approach: Islamic countries through the corrupt
1) Establish a vanguard of loyal cell regimes of the current Muslim leaders who
members. These members would undergo do not follow the rules of Islam.

50 The Counter Terrorist ~ August/September 2012


PLATESMARTS LPR TECHNOLOGY IS THE MOST IMPORTANT
PRODUCT NOW AVAILABLE TO U.S. SECURITY AGENCIES TO FIGHT
DOMESTIC AND INTERNATIONAL TERRORISM ON AMERICAN SOIL.
BORDER CONTROL
HIGHWAY MONITORING
LAW
ENFORCEMENT

ANTI-TERRORISM

SITE SECURITY

PlateSmartS SOFTWARE-ONLY LICENSE PLATE RECOGNITION (LPR) technology can be used to identify
vehicles with license plates of interest at BORDER CROSSINGS, ON ROADWAYS, AND FOR SITE SECURITY (SUCH AS AT
GOVERNMENT FACILITIES, AIRPORTS, NUCLEAR POWER PLANTS, AND OTHER SITES OF INTEREST), ALL EFFORTLESSLY
AND WITHOUT HUMAN INTERACTION.
PlateSmart is the ONLY LPR TECHNOLOGY CAPABLE OF READING A LICENSE PLATES STATE JURISDICTIONAL DATA
AND ALPHANUMERIC CHARACTER STRING WITH THE HIGHEST ACCURACY RATES IN THE INDUSTRY, AS INDEPENDENTLY
VERIFIED BY LPR INDUSTRY EXPERT LEE J. NELSON.
PlateSmartS LPR technology is the most versatile Anti-Terrorism tool currently available to U.S. security agencies
due to its TOTALLY COVERT NATURE, FUNCTIONALITY IN ALL LIGHTING AND WEATHER CONDITIONS, AFFORDABILITY,
INTEGRABILITY WITH THIRD-PARTY TECHNOLOGIES, and ability to be utilized with PRE-EXISTING OR NEWLY INSTALLED
LEGACY, STATE-OF-THE-ART, OFF-THE-SHELF, OR PROPRIETARY VIDEO AND COMPUTER EQUIPMENT.
PlateSmartS LPR software is THE MOST AFFORDABLE LPR TECHNOLOGY AVAILABLE ON THE MARKET. ITS COST IS A
FRACTION OF THAT OF COMPETITORS SYSTEMS, AND IT IS TOTALLY SCALABLE, ALLOWING A RANGE OF INSTALLS FROM
SINGLE SYSTEMS TO HUNDREDS. THIS CAPABILITY IN TURN ALLOWS AGENCIES TO SCAN HUNDREDS, THOUSANDS, OR
EVEN MILLIONS OF VEHICLES PER YEAR.
PlateSmartS NEW DATABASE CONTROL CENTER offers the user the ability to monitor or to manipulate its LPR
systems from a central location. The data collected by the system is stored and can be data mined to find BOLOs
in real-time or to track a vehicles movement over days, weeks, months, or even years. Data is available with GPS
coordinates, date- and time-stamps, and map overlays, all invaluable tools to help officers track movement patterns
of suspect vehicles.
PlateSmart can be utilized as EITHER A STAND-ALONE OR ENTERPRISE SOLUTION IN EITHER FIXED OR MOBILE
APPLICATIONS (SUCH AS UAVs).
PlateSmart instantly checks all BOLOs in highly sensitive databases from Federal (NCIC) to State (SUCH AS
FLORIDAS FDLE) and local databases as well as other unnamed Federal BOLO lists at the same time and returns
a hit within milliseconds of the plate entering the cameras viewfinder. SEVERAL MILLION BOLOs CAN INSTANTLY BE
CHECKED IN THESE DATABASES.

PLATESMARTS VERSATILITY, AFFORDABILITY, ROBUSTNESS, AND EASE OF USE


ALLOW FOR MASS DEPLOYMENT TO A DEGREE PREVIOUSLY UNATTAINABLE.
PLATESMART DELIVERS THE HIGHEST ROI IN THE LPR INDUSTRY.

For More Information


www.platesmart.com Copyright 2012 Cyclops Technologies, Inc., d/b/a PlateSmart.
All Rights Reserved. Call (813) 749-0892
Circle 125 on Reader Service Card The Counter Terrorist ~ August/September 2012 51
Counter Terrorist Ad.indd 1 7/2/12 4:05 PM
The organization 3) The party (through the Ummah and means that it is imperative for the Ummah
led by the vanguard) would seize the reins to appoint an Emir.5
appears to have of power and establish the Caliphate. They There are approximately 10,000 hard
two philosophies state that they then intend to appoint an core members operating in over 40
emir or military leader, who would declare countries with a significant presence in
depending upon jihad against all non-believers, expel all London. Their sources of financing are
their audience. A Western citizens and shred all diplomatic largely unknown.6 HuT is, however, active
agreements with Western governments. in the United States.
spokesman for the HuTs website states, The Emir is a They have recently been conducting
group, Mohammad military leader who leads the Muslims open forums in the U.S. including in
in Jihad against the Infidels. The Imam the Chicago area. On July 19, 2009,
Malkawi, stated to is but a shield behind which one fights approximately 500 people attended a
reporters present at and protects himself. It goes on to say: conference sponsored by the Hizb ut-

the conference in Oak Jihad is obligatory upon you with every


Emir, be it righteous or dissolute. The
Tahrir captioned, The Fall of Capitalism
and the Rise of Islam, in Oak Lawn,
Lawn, Illinois, that Hizb actions and the sayings of the Messenger of Illinois. Another conference sponsored
ut-Tahrir condemns Allah demonstrate that the Muslims must by Hizb ut-Tahrir scheduled for June 17,
appoint an Emir from amongst them and 2012 captioned, Khilafah Conference
terrorism and has never it is this Emir who organises the matter 2012; Liberation by Revelation to be held
indulged in recruiting of Jihad. The reality of Jihad is that Allah in Rolling Meadows, Illinois.7
(swt) has decreed it upon the Muslims as The organization appears to have
jihadists. whole while they had an Emir; thus Jihad two philosophies depending upon their
is a collective duty and with the Emir. This audience. A spokesman for the group,

The Jersey Cuff


The Next Generation in Disposable Restraints

Actual Size
7.5 inches
0.7 grams

Patented Jersey Cuff is the lightest, smallest,


safest and most versatile disposable cuff in the world
Fits in a pocket, a molle strap or in an operational
carry pouch
Tac-Pac - (pictured right) holds 4 Jersey Cuffs and
a safety cutter
Made in the U.S.A. G-Pac - gas mask pouch, holds 20 Jersey Cuffs
Sold exclusively by Combined Systems, Inc.
and attaches via drop style, molle system or D-rings
388 Kinsman Road
Jamestown, PA 16134 and sling
(888) 989-7800 Evac-Pac - for riot control or jail evacuations, the
www.combinedsystems.com Evac-Pac holds 96 Jersey Cuffs

The Counter
52CT_Jersey Terrorist ~ August/September 2012 Circle 252 on Reader Service Card Circle 319 on Reader Service Card
Cuff Ad.indd 1 2/28/12 9:05 AM
Circle 301 on Reader Service Card Circle 275 on Reader Service Card The Counter Terrorist ~ August/September 2012 53
Mohammad Malkawi, stated to reporters responsibility toward the world, as a
present at the conference in Oak Lawn, result of their ideological weakness and
Illinois, that Hizb ut-Tahrir condemns their lack of understanding of the laws of
terrorism and has never indulged in the Sharia of the Prophet Muhammad.
recruiting jihadists. He stated, We do not In principle, Jihad is an offensive Jihad,
train them for violence or for jihad. Our which was instated in order to spread
objective is to create an Islamic state of Islam throughout the world.9 Salah
Khalifah in the Muslim world. However, Al-Din Adhadhda, member of the press
intelligence sources have indicated that bureau of Hizb al-Tahrir, stated, the Jihad
Khalid Sheikh Mohammed, the master of a nation over 1.5 billion strong has been
mind of 9/11, and abu Musab Al-Zarqawi, reduced to the killing of an American in
the former leader of al-Qaeda in Iraq, are Iraq, a Briton in Afghanistan, a Jew in
both alumni members.8 Palestine, or a Russian in Chechnya. . . .
Compare what Malkawi says to the U.S. true celebration should only occur with
Khalid Shaikh Mohammed, upon press with what Muhammad Ibrahim, the conquest of the capitals of the world
capture. Photo: U.S. forces member of the advisory council of Hizb by the message of Islam10
ut-Tahrir in Lebanon, stated: Some Hizb ut-Tahrir has been recruiting
people tried to interpret jihad to mean members in the U.S. by utilizing new
nothing more than self-defense. Thus, media to market its ideology, such as hip
the Muslims abandoned the pinnacle hop fashion boutiques and bands along
of their glory, and relinquished their with online social networks and chat

Border
2nd
Annual

We are not the Best because we are the oldest Management


We are the oldest because we ARE the Best!
Conference &
Technology Expo
UAS Focus Day:
October 15th, 2012
Americas Top EP Training School Main Conference & Free Exhibition:
October 16th - 17th, 2012
Judson F William
Featuring the world renowned 7-Day Convention Center
El Paso, TX
Providing Executive Protection Program
REGISTER TODAY TO SAVE!
Established in 1978 by Dr. Richard W. Kobetz
Over 100 hours with 20 plus instructors Information,
Integration, and
5-Day LEO Dignitary Protection Program Rapid Response

Other Specialized and Custom Hear from over


Training Courses 30 high profile speakers
addressing the hottest issues
in border management and
Perfect for Military, Government, Police and
gain exclusive access to the
Private Security Protective Services latest technology needed
to secure U.S. land, air
www.personalprotection.com and maritime borders.
16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 info@personalprotection.com WWW.BORDERTECHEXPO.COM

54 The Counter Terrorist ~ August/September 2012 Circle 281 on Reader Service Card Circle 115 on Reader Service Card
Four motorcycles of Copenhagen Police Department during an demonstration by Hizb ut-Tahrir in Copenhagen the intersection Nrre
Farimagsgade/Frederiksborggade is blocked.

rooms. They have also been recruiting Jizyah with willing submission, and feel
well educated professionals who are themselves subdued.[9-29] and states:
influential in their communities, such as O ye who believe! Fight the unbelievers
doctors, lawyers, business owners, and who gird you about, and let them find
university professors.11 firmness in you: and know that Allah is
Hizb ut-Tarhrirs website has a with those who fear Him. [9-123] So
separate section devoted to Jihad and the fight against the friends of Satan: feeble
establishment of a caliphate to rule over indeed is the cunning.12
all, Muslim and non-Muslim. Allah (swt) Islamic supremacists tell us their goals.
says: Fight against those who believe not It is not only in the Islamic countries that
In Allah, nor in the Last day, nor forbid some want to re-establish their Caliphate,
that which has been forbidden by Allah but in all the capitals of the world. We
and his Messenger and those who accept only have to pay attention and listen to
not the Deen of Truth from among the themnot what they tell the U.S. media
people of the book, until they pay the but what they tell their own followers.

The Counter Terrorist ~ August/September 2012 55


Additionally, we must recognize that, as hizb-ut-tahrir-an-emerging-threat-to-
important as preventing and deterring us-interests-in-central-asia.
individual acts of terrorism is, defeating 5
Hizb ut Tahrir website, accessed June 5,
the objectives of islamists is far more 1012, http://english.hizbuttahrir.org.
important than defeating any single 6
Ariel Cohen, Hizb ut-Tahrir: An
attack. As tragic as the possible loss of life Emerging Threat to U.S Interest in
from another suicide bomber or active Central Asia, The Heritage Foundation:
shooter might be, what would that mean Leadership for America, accessed June 5,
to the future of the country? On the 2012, http://www.heritage.org/research/
other hand, if this ideology is not exposed reports/2003/05/hizb-ut-tahrir-an-
and resisted, what will that mean for the emerging-threat-to-us-interests-in-central-
practice of individual liberty around the asia..
world and at home? 7
Revolution: Liberation by Revelation,
Muslims Marching Toward Victory flyer.
About the Author 8
Protesters Gather outside Islamic
Mr. Andrews is a retired FBI Special Conference near Chicago, Fox News,
Agent with 23 years of experience, July 20, 2009, http://www.foxnews.com/
Abu Musab al-Zarqawi Photo: unknown including 20 years investigating story/0,2933,533880,00.html.
international and domestic terrorist
9
MEMRI, August 12, 2009, www.
organizations. Since retiring, he has memri.org.
served as a consultant and recently
10
Ibid.
finished a year-long contract with the
11
Madeleine Gruen, Hizb-ut-Tahrir's
FBI in the Counter Terrorism Division. Activities in the United States, Jamestown
He is currently developing an intelligence Foundation Terrorism Monitor 5, no.
program for Florida State University. 16 (August 16, 2007), http://www.
jamestown.org/programs/gta/single/?tx_
End Notes ttnews%5Btt_news%5D=4377&tx_
1
Ariel Cohen, Hizb ut-Tahrir: An ttnews%5BbackPid%5D=182&no_
Emerging Threat to U.S Interest in cache=1.
Central Asia, The Heritage Foundation:
12
Bismillah-ir-Rahman-ir-Raheem, The
Leadership for America, accessed June 5, Necessity of Political Thought in the Life
2012, http://www.heritage.org/research/ of the Muslims, Hizb ut Tahrir website,
reports/2003/05/hizb-ut-tahrir-an- accessed June 5, 2012, http://english.
emerging-threat-to-us-interests-in-central- hizbuttahrir.org http/index.php/culture/
asia. thoughts/181-the-necessity-of-political-
2
About Us, Hizb ut Tahrir, accessed thought-in-the-life-of-the-muslims.
June 5, 2012, http://english.hizbuttahrir.
org/index.php/about-us.
3
Ibid.
4
Ariel Cohen, Hizb ut-Tahrir:
An Emerging Threat to U.S Interest
in Central Asia, The Heritage
Foundation: Leadership for America,
accessed June 5, 2012, http://www.
heritage.org/research/reports/2003/05/

56 The Counter Terrorist ~ August/September 2012


Circle 323 on Reader Service Card The Counter Terrorist ~ August/September 2012 57
The author leading a pursuit team. Photo courtesy Eeben Barlow.

RELENTLESS PURSUIT:
A NEGLECTED COIN
PRINCIPLE?
Counter
The

58 The Counter Terrorist ~ August/September 2012


An insurgency is, in essence, a political
conflict that manifests itself with a host of
grievances expressed by the populace
in the form of non-violent and violent
demonstrations and protests.

By Eeben Barlow

L eft unchecked, these actions can


result in an escalation of violence,
attacks on government installations and
ultimately an armed insurgency where the
planned insurgency. It is this intelligence
that poses a threat to the national
interests (NI) of the government and that
ought to guide national policy.
Once the insurgency
reaches its tipping
point, the armed
aggrieved mobilize the populace to take up As the threat is internal against NI, the
arms. Their goal is to force the government function of countering the potential of forces are tasked
to take heed of their dissatisfaction and a real or perceived insurgency lies with
to take control and
govern for the people, and ultimately to law enforcement agencies. Acting on
depose of the government and install their intelligence, the law enforcement agencies counter the armed
own government. must identify and neutralize the pending insurgency.
Identifying the potential for an uprising. These actions can take the form of
insurgency and an armed insurrection is crowd control, riot control, and eventually
the function of the intelligence services. even armed actions against the insurgents.
They ought to utilize all sources and The failure of government to take
agents at their disposal to gain insight heed of the intelligence product and
into the planning and organization of any address the grievances of the populace,

The Counter Terrorist ~ August/September 2012 59


support to sustain their movement as
well as purchase weapons, ammunition,
and other equipment to continue their
armed struggle.
Once the insurgency reaches its tipping
point, the armed forces are tasked to
take control and counter the armed
insurgency. This mission, however,
indicates a failure at the political level,
and thus the armed forces find themselves
in a war that is neither of their own doing
nor their choosing.
In developing a counter insurgency
(COIN) strategy and the subsequent
COIN campaign, the most important
aims are to:
Deny the insurgent freedom and space
in which to maneuver
Regain the lost confidence of the
populace
Create a safe environment for the
populace to live and work without fear
Negate the insurgents principles for an
insurgency
Deny the insurgent access to funding
Many military forces seem to have
found themselves in a mental quandary
as far as counter insurgency (COIN)
operations are concerned. New terms
and buzzwords are created to explain
an age-old phenomenon and papers
are written trying to intellectualize the
insurgent and his ideals. This has given
rise to a host of different arguments on
the conduct of COIN operations. Indeed,
books are written explaining in detail
U.S. Marines make a comm. shot. how insurgencies start and the different
as well as the failure of the law approaches that should be adopted in
enforcement agencies to take appropriate countering the insurgent forces.
pre-emptive actions, will result in the Whereas understanding and debate
insurgency gaining momentum. As ought to be welcomed, it appears as
the insurgency develops, armed forces though we may have forgotten that we
may be used to act in support of law ought to win a war before we try to
enforcement agencies. The insurgents intellectualize it.
will, in turn, seek to galvanize national However, there are three basic
and international support. Additionally, approaches to modern counter
the insurgents will seek to gain financial insurgency1:

60 The Counter Terrorist ~ August/September 2012


For more information, visit: http://ntoa.org/site/tactical-conference/

Circle 222 on Reader Service Card

Circle 257 on Reader Service Card The Counter Terrorist ~ August/September 2012 61
A map showing the insurgent forces progress (in red) as well as blocking forces ahead (in Weapons hidden in a WWII baby carriage.
blue). This pursuit took place over a distance of more than 700 km. Photo: EB Photo: Shpritz

1. Enemy-centric 2. Population-centric
approach: approach:
This approach views COIN as an This approach views COIN as an
extension of conventional warfare and attempt to mobilize the population
therefore centres primarily on defeating and gain support to act against the
the insurgent. The belief is that the enemy government. In essence, the population
must be located and destroyed and, in so becomes the water the fish must swim
doing, the problem will be solved. The in. Remove the water and the fish
enemy is viewed as an organized enemy cannot survive. This requires securing
that follows typical tactics, techniques, the population, realigning their loyalty
and procedures (TTPs) related to towards the government, and denying the
movement. Within this approach, insurgent access to the population. This is
numerous strategies can be formulated to considered by many to be the foundation
achieve the aim. of the hearts-and-minds policy.

62 The Counter Terrorist ~ August/September 2012


Iranian Girls Gift Their Money boxes as symbolic for supplying logistic Iranian Forces. Photo: sajed.ir

3. Fund-centric Whereas no two insurgencies are


approach: identical in nature, all insurgencies
This approach views the driving force contain elements of all three
of the insurgency as a need to gain approaches. To counteract the
and use financial assets and benefits. insurgent on a wide front, a planned,
In the early stages of the insurgency, coordinated and controlled integration
the movement requires financial assets of political, civilian, law enforcement
with which to purchase weapons, and military counter-actions needs to
ammunition, and equipment, as well be applied. These counter-actions must
as to sustain the movement. To achieve be cognizant of the political, security,
this, the movement may form foreign economic, social, tribal, religious, and
alliances or even resort to crime to fund cultural environments in which they
their activities. will be implemented.

The Counter Terrorist ~ August/September 2012 63


The use of
helicopters to
deploy substitute
troops after a
few hours of
pursuit enhances
the principle of
relentless pursuit.

U.S. Marines insert via fast-rope.

64 The Counter Terrorist ~ August/September 2012


These three approaches give rise to a operate according to tactics, techniques
trinity of gravity in COIN operations as and procedures. The TTPs are, in turn,
opposed to a single centre of gravity as derived from the principles of COIN as
expounded by Clausewitz. It is a critical well as from the lessons learned that are
factor in neutralizing and destroying an particular to the campaign being fought.
insurgent force. If two of these pillars of This does, however, not reduce the
the trinity are collapsed, the insurgency frustration of the soldier in the field.
will collapse. The frustration is increased when
The population-centric approach it appears that the insurgent has the
is and will remain a function of good initiativewhich indeed he has at
governance. The fund-centric approach timesas he can choose his place, time,
is and will remain an intelligence and and method of attack. These attacks
law enforcement matter. The enemy- are usually of short duration but are
centric approach involves the soldier on aimed at killing, wounding, disrupting,
the ground. In most instances, he wants demoralizing or delaying their opponents.
to find, fix, and destroy the enemy, The insurgents also aim to get maximum
and he has scant interest in the two publicity for their actions and their cause.
remaining approaches. Civilian casualties are both a means to an
Fighting an apparently elusive enemy end and a method of intimidation aimed
during COIN operations can be very at forcing support or demonstrating the
frustrating for the man in the field, weakness of the government.
especially when he is expected to conduct When the insurgent believes he has
population-centric operations on behalf the initiative, he becomes bolder and
of a failed government. Indeed, had more daring. When we believe that he
the government competently governed, has the initiative, it places us in a reactive
the intelligence agencies gathered the state-of-mind, thus reaffirming and
requisite intelligence, and the law strengthening the insurgents belief in his
enforcement agencies exercised the law position.
in a manner regarded as legitimate by the Wresting the initiative from the
population, the insurgency could, in all insurgent is not as easy as it sounds,
likelihood, have been nipped in the bud. but it is not impossible. We need
As with all military operations, to place the enemy in a position of
strategies are devised, operational plans continual disadvantage and then exploit
made, and deployments then take place it with speed, aggression, and targeted
according to the numerous principles firepower. The tactical principles of
that have over time been proven to be COIN, correctly applied to the terrain
relevant. COIN is no exception, as it, in which the campaign takes place,
tooas an action aimed at defeating enable us to do this, but one principle
an enemyhas both strategic and that appears to receive little attention is
tactical principles that have, over time, relentless pursuit.
manifested themselves to be relevant Relentless pursuit implies the enemy
to the type of campaign that is being is pursued with speed and aggression,
planned and fought. without stopping, pushing him past the
As with conventional operations, limits of his endurance while continually
soldiers engaged in COIN operations substituting the men doing the pursuit

Circle 349 on Reader Service Card

The Counter Terrorist ~ August/September 2012 65


Pursuit must continue frogged ahead of the teams on the tracks and enemy. Once the trackers have analyzed
relieve them. A good guideline is to deploy the age of the tracks to within an hour
after dark and a pursuit team for four to five hours before or less, it is possible to determine the
through the night. relieving it with a fresh team. The pursuit distance the insurgents are ahead of
teams must have the ability to operate by the pursuit force. Helicopters can then
Equipment such as both day and night in order to give the be used to deploy troops into blocking
night vision goggles insurgents no respite. Once contact has been positions, as well as deliver troops
made with the insurgent force, aggressive onto tactically advantageous ground.
and illumination focussed application of fire, and manoeuvre Alternatively, troops can be deployed to
flares must be used must be applied. seal off villages and temporarily prevent
In applying relentless pursuit, the their use by the insurgents.
to the optimal. ability to track humans is an essential The use of dummy-drops using
prerequisite. Good visual trackers can tell helicopters can be executed to the
the age of a track as well as indicate if the flanks of the moving insurgent forces
with fresh troops. This forces the enemy is carrying heavy loads, how fast to channel them into a specific area.
enemy into a state of exhaustion as he he is moving, the types of weapons he has The dummy-drops must be sufficiently
has no time to eat, rest or sleep. It also (this is identified when locating enemy realistic for the enemy to believe that
degrades his morale, leads to panic, and resting places), what he is eating, what troops are indeed being inserted to their
subsequently leads him to make mistakes. counter-tracking measures he is taking, flanks. These dummy-drops must be
When the enemy is tired and hungry, and so forth. Good trackers are also able close enough for the enemy to either hear
he becomes weak and slow in his to identify disturbances in the soil or or even observe them but far enough
movements, disorientated, and prone to tripwires indicating a possible landmine away to prevent the enemy from using
making poor decisions. It is these mistakes or IED as well as indications of an small arms on the helicopter.
we need to identify and exploit to ambush ahead of the pursuit force. Implementing relentless pursuit
aggressively seize the initiative. Therefore, Supporting the combat trackers are requires, amongst others, that troops:
every possibility must be exploited to troops that are lightly equipped but well- Can eat while on the move
hunt down the insurgents and either force armed and ready to conduct immediate Can track an enemy at speed
a surrender or destroy them. offensive actions when required. The size Are able to leap-frog ahead of the
To effectively close with and destroy the of these teams will depend on the size of enemy by means of helicopters
enemy, the training and organisation of the the insurgent force being pursued, as well or vehicles
units conducting the campaign need to be as its past actions. Have outstanding communications
reassessed. Combat tracker teams supported The use of helicopters to deploy Are aggressive
by correctly trained and lightly equipped substitute troops after a few hours Are adept at night operations
troops must be deployed and conduct an of pursuit enhances the principle of Must outgun the enemy with
aggressive pursuit policy. To enable the relentless pursuit. Tired troops can be superior skill and weaponry
pursuit forces to maintain their speed on the replaced with fresh troops to maintain Have a rapid reaction force on standby
insurgents tracks, fresh teams must be leap- momentum and keep pressure on the Troops need to be conditioned to eat

66 The Counter Terrorist ~ August/September 2012


The Advanced Global

Israel
SSI Security Workshop in

SECURITY
SOLUTIONS
INTERNATIONAL
The experts on training in:

the Homeland Security professionals best resource

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their


Since 2005, SSI has taken own territory, along Israel's northern border.
nearly 500 First Responders
to Israel and shown them the Hostage Rescue - Discover how they go wrong.
basics of the Israel security
concept. Hospital Response - Find out how Israel's critical response hospitals
Thanks in part to that handle surge and multi-casualty incidents.
program, we are better able
to defend ourselves in the Israel Counter Terrorism units - Learn how they operate.
United States. In response to
Israel National Police - National Academy; See how they train?
demand, we are now
offering a once-in-a-lifetime Sensitive Installations - Participate in a day-long exercise and training
experience covering the program in how to set up a complete security system.
following advanced subjects:
Secret Israel Homeland Security Simulator - See how this works at a base
south of Tel Aviv.
NOVEMBER Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites!
9-16, 2012 Register now if you are US Military, a Homeland Security Professional, a
Security Professional, an EMS, or an EMT.

LEARN MORE at: www.homelandsecurityssi.com


SSI
CallCard
Circle 215 on Reader Service now for more information.
SECURITY
Phone: 866-573-3999 SOLUTIONS
Fax: 866-573-2090 INTERNATIONAL
info@homelandsecurityssi.com Protecting the Homeland Together
The Counter Terrorist ~ August/September 2012 67

Circle 215 on Reader Service Card


while on the move. During relentless them. Aggressive pursuit is aimed at weapon (PAW), 60mm patrol mortars,
pursuit, troops cannot stop to prepare initiating and maintaining contact with man portable rockets, and so forth can
meals, as this will give the enemy time the enemy. This aspect is closely allied force the enemy to slow his progress and
to make his escape. Apart from their to the principle of aggressive, focused take cover, thus slowing his escape.
weapons and ammunition, dry rations application of force. When the enemy scatters (bombshells),
and water are all these troops need to Pursuit must continue after dark and at least one set of tracks should be taken
carry with them, especially since they will through the night. Equipment such as to ensure a successful pursuit, as it is
only be moving for a few hours before night vision goggles and illumination likely that even a minimally skilled enemy
being relieved by fresh troops. flares must be used to the optimal. will regroup at an emergency rally point.
Good communication is essential to Battlefield illumination, when closing A quick reaction force, equipped
ensure that pursuit forces do not engage with the enemy, is useful in slowing an to enter the fire-fight immediately on
in so-called friendly-fire incidents. enemys progress or forcing him to show arriving on the ground, must be kept
Communication is also essential to enable himself prematurely. on standby. This force can comprise
calling for air support, fresh troops, or The enemy must be engaged at resting pursuit force men who have
the quick reaction force. By frequently maximum range, terrain depending, been replaced with fresh troops and are
reporting the pursuit forces coordinates, to force him to deploy tactically. Long available for immediate air-lift.
operations officers will be able to plot distance engagements may not cause To apply relentless pursuit, the troops
and even predict the enemys intended enemy casualties but it will slow his need to be fit, mentally alert, and ready to
direction of movement. progress and allow friendly forces to begin immediately take offensive action. Failure
Troops need to develop their aggression offensive tactical maneuvers. Weapons to apply the principle of relentless pursuit
level to such a point that the enemy fears such as the 20mm personal assault will continue to give the enemy options
and advantages, often at our own peril.
About the Author
Mr. Barlow is a former special
operations officer and intelligence officer
of the South African Defence Force. He
was the founder of the private military
company, Executive Outcomes, author of
the book Executive Outcomes and www.
eebenbarlowsmilitaryandsecurityblog.
blogspot.com. He is currently writing
a book on the conduct of land-based
operations in Africa.

End Notes
1
An extract from the authors upcoming
book on land forces operations in Africa.
2
This approach was developed by the
author in Angola to bleed an insurgency
into bankruptcy.
3
An extract from the authors
upcoming book on land forces operations
in Africa.

Circle 207 on Reader Service Card


68 The Counter Terrorist ~ August/September 2012
Innovative Products

sesolinc mobile
reinforced data facility
The SESOLINC Mobile Reinforced Data Facility (SMRF)
RM M203PI
is designed as a scalable, deployable data protection solution
The RM M203PI (NSN 1010-01-393-0656)
that can be built and configured to mission-specific
operates in three modes from a single 40mm
requirements. There are multiple configurations available.
grenade launcher module. Rifle-mounted,
It is self-contained, with generator power, environmental
shoulder-fired standalone and hand-held solutions
controls/monitoring, interior/exterior video surveillance,
can easily and quickly be configured by the user
and radio communications. It can be configured and
without tools. The M203PI fits any military rifle
deployed as a command center with IT equipment, Radio
with or without a lower rail. RM offers many
Communications, Video Situational Awareness system,
unique 40mm launching solutions and accessories.
surveillance, and personnel workspace areas.
www.rm-equipment.com
www.sesolinc.com

Propper a-tacs bdu


In 2005, the U.S. Army began fielding a new uniform that blends into both
wooded and desert environments equally poorly. Not to be out done, the U.S. Air
Force released a blue tiger-striped uniform, and in the ultimate act of one-ups-
manship, the U.S. Navy introduced an even more bizarre blue digital camouflage
outfit.Unsurprisingly, special operations troops and grunts have demanded more
functional camouflage. One of the best performing is Proppers Advanced Tactical
Concealment System (A-TACS) Battle Dress Uniform. This pattern consistently
outperforms the Department of Defenses flamboyant fashion statements.
www.propper.com

The Counter Terrorist ~ August/September 2012 69


advertiser index Counter The
august/september 2012
Volume 5 Number 4

Journal for Law Enforcement, Intelligence & Special Operations Professionals

To request detailed product information, circle the appropriate reader service number (RSN) on the attached Reader Service
Card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising
opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp
Individual advertisers websites are also provided below for your convenience.

Page Ad/Company website and/or email........................................................................................................ RSN Number

2 Ahura Scientific www.thermoscientific.com/mil-chemid........................................................................................ 254


3 Lenco Industries Inc. www.swattrucks.com....................................................................................................... 13
4 Tex Shield Inc info@tex-shield.com................................................................................................................. 29
7 Recon Robotics www.reconrobotics.com/throwbotXTDemo.............................................................................. 337
10 PoliceTraining.net www.policetraining.net..................................................................................................... 191
10 Zistos Corp www.zistos.com........................................................................................................................... 311
11 Tactical Products Group Inc. www.tacprogear.com....................................................................................... 101
12 Adams Industries www.adamsindustries.com................................................................................................. 308
13 CRC Press www.crcpress.com.......................................................................................................................... 331
14 Robotex www.robotex.com............................................................................................................................. 129
15 Paratech www.paratech-tactical.com............................................................................................................... 333
17 Defense Solutions Group - DSG Arms www.dsgarms.com.......................................................................... 275
19 SSI Elevated Tactics Training www.homelandsecurityssi.com......................................................................... 313
22 Center for Rural Development www.preventivestrategies.net........................................................................ 265
23 Golight Inc www.golight.com.......................................................................................................................... 285
25 Lind Electronics Inc. www.lindelectronics.com................................................................................................ 327
26 Mattracks www.mattracks.com....................................................................................................................... 297
27 American Military University www.amuonline.com/counter-terrorist............................................................. 211
28 Explosives Countermeasures Inc www.nobombs.net................................................................................... 121
28 Defense Group - CoBra Software www.cobrafirstresponder.com................................................................. 273
35 Southeastern Solutions www.sesolinc.com................................................................................................... 239
36 Reconyx www.reconyx.com............................................................................................................................ 303
37 PoliceOne www.policeoneacademy.com.......................................................................................................... 335
38 Heat Armor www.heat-armor.com.................................................................................................................. 175
40 Southern Police Equipment www.sooutherpoliceequipment.com.................................................................... 343
41 J&N www.bangpole.com................................................................................................................................. 155
42 McGard www.manholelocks.com..................................................................................................................... 79
42 Icor Technology www.icortechnology.com...................................................................................................... 81
43 K9 Cop Magazine www.k9copmagazine.com................................................................................................ 277
45 SSI PVBs www.ssipvb.com.............................................................................................................................. 226
51 Platesmart www.platesmart.com.................................................................................................................... 125
52 Combined Systems Inc. www.combinedsystems.com..................................................................................... 319
53 Patriot3 www.patriot3.com............................................................................................................................. 301
54 Border Management Conference & Technology Expo www.bordertechexpo.com.................................... 115
54 Executive Protection Institute www.personalprotection.com.......................................................................... 281
57 Hydrosack www.homelandsecurityssi.com....................................................................................................... 323
61 NTOA www.ntoa.org....................................................................................................................................... 222
65 Sun Badge Company www.sunbadgeco.com................................................................................................ 349
67 SSI Training in Israel www.homelandsecurityssi.com...................................................................................... 215
68 RM Equipment www.m203grip.com............................................................................................................... 207
71 Oshkosh Defense www.oshkosh-tacticalprotector.com..................................................................................... 50
73 Elite K9 www.elitek9.com............................................................................................................................... 279
74 Applied Research Associates, Inc. www.ara.com/robotics.......................................................................... 256
75 Oasys Technology info@oasystechnology.com............................................................................................... 334
76 Energizer www.hardcasetactical.com............................................................................................................... 209
31 Urban Shield 2012 www.urbanshield.org..................................................................................................... 131

70 The Counter Terrorist ~ August/September 2012


get In. get around. gaIn control.
IntroducIng a new standard
In hIgh mobIlIty and maneuverabIlIty.
Tactical Protector Vehicle from Oshkosh Defense creates
TM

a new strategic dimension for special operation missions.


With a new standard in mobility, military-grade protection
and capacity for up to nine officers, it enhances access,
speed and safety in urban, rural and off-road high-risk situations.

find out more:


oshkosh-tacticalprotector.com

CONTACT:
Program Director, Tactical Protector Vehicle
920.235.9150
marketing@defense.oshkoshcorp.com

Financing is available for Tactical Protector


Vehicle through Oshkosh Capital.

The Counter Terrorist ~ August/September 2012 71


2012 Oshkosh Corporation Oshkosh and the Oshkosh logo are registered trademarks and Tactical Protector Vehicle is a trademark of Oshkosh Corporation, Oshkosh, WI, USA
Circle
Circle 50
50 on
on Reader
Reader Service
Service Card
Card
Training Review
Mobile Device Seizure and Investigations

O
By Chris Graham

n a bright Iraqi day, I


surveyed the bodies of some
insurgents. We had responded as a quick-
reaction force to assist Iraqi soldiers who
had been ambushed in the village of
Udaim. The Iraqi soldiers had been over-
run, and most of the survivors had been
executed before we arrived. The high-
intensity combat of the day had waned as
any remaining live insurgents fled.
The insurgent at my feet was wearing
commercially produced body armor with
steel plates that had successfully defeated
two 5.56 x 45 mm hits to the chest. I was
admiring the headshot that had taken
him out when the silly upbeat ringtone
of a cell phone startled me. It was ring-
ing in the grass a few feet away. Several Apple iPhone (left) vs HTC Hero (right). Photo: Marius Rstad/Mobilen.no
callers attempted to get through over the
next few minutes. The surviving insur-
gents seemed to be attempting to rally. from the Palm Beach Sheriffs Office and the device and discussed suspect inter-
Our HUMINT team bagged the phone a State Department Anti-Terrorism As- views designed to establish an individuals
and retained it for exploitation. We sistance Program instructor, served as our relationship to a device. We were encour-
never received any information from that lead instructor. aged to leave devices that are off when
phone, but I continue to hope that it was On the first day of training, we seized off unless exigent circumstances
pushed forward to another operational introduced ourselves to each other and required urgent exploitation. We talked
unit for action. received a lecture on modern manufac- about collecting devices that were on
Cell phones and mobile communica- turers and operating systems. We talked and the preference to keep them on to
tion devices are a universal part of mod- about wireless network generation, GSM, prevent engaging passcodes or encryp-
ern life. Soldiers and police officers who and CDMA networks. We were given tion that might be difficult to defeat and
do not know how to handle these items definitions for digital evidence and digital considerations for inhibiting subjects
to support the maximum acquisition of forensics. We discussed considerations, from remotely dumping data or chang-
information, evidence, and intelligence locations where this information might ing information that might undermine
are detrimental to operations. Unfortu- be collected, and common and uncom- evidentiary value. We talked about the
nately, they are not uncommon. mon evidence to collect. benefits of seizing supporting accessories
In order to improve these skills in the In the afternoon, we were lectured and the need to be able to provide power
law-enforcement world, Epyx Forensics on legal authority, plain view doctrine, to keep the device on.
offers several blocks of mobile train- and exigent circumstances relevant to Day two included discussion of the use
ing. I recently had the opportunity to communication devices. We talked about of cell phones for tracking and eaves-
attend their Mobile Device Seizure and physical evidence possibilities such as dropping and watching some supporting
Investigations Course. Detective Pete fingerprints and DNA. We were given videos. We carried out a practical-appli-
McGovern, a digital forensics investigator a sample report to use for documenting cation exercise plotting location informa-

72 The Counter Terrorist ~ August/September 2012


tion from available cell tower and switch in a power cord (students were provided sector personnel. Additional courses
information. Students were provided a tool bags with common power cords), include digital investigations, forensic
chart depicting data-retention periods and placed the device in an anti-static analysis, computer triage and seizure.
for cellular providers, some investigation bag, a faraday bag, and an evidence bag. www.epyxforensics.com
checklists, useful website addresses, and I filled out a seizure report and submitted
resource guides. it with the device.
We discussed what to submit to foren- Cell phones, tablets, and other elec-
sic examiners, forensic tools such as Cel- tronic communication devices are uni-
lebrite, and logical and physical forensic versally popular. Valuable information,
images. We conducted a practical exercise evidence, and intelligence can be gained
involving a murder scenario with a cell from these devices. Knowledge of what
phone recovered from the crime scene. devices your subject is using and how
On the final day of training, we took a they are using them is useful. The Epyx
written exam, and we individually took Forensics Mobile Device Seizure and In-
practical skills tests. I put on surgical vestigations Course provides insight into
gloves to preserve physical evidence, and I the scope and limitations of information
was provided a cell phone that was turned that can be acquired from electronic com-
off. I chose to leave it off and submit munication devices and trains individuals
it to a forensic examiner. I also obtained to seize devices while maximizing the
a smartphone that was turned on. I put preservation of useful data and evidence.
it in airplane mode, turned Bluetooth off, EPYX Forensics provides digital forensic
logged relevant data that was visible with- services and customized training for law Person with PDA handheld device. Photo:
out opening anything additional, plugged enforcement, government, and private Johannes 'volty' Hemmerlein

Bite Suit Reward Balls with


Helmet Tug Handles
$74.95 3" Ball
$12.95 2.5" Ball
2" Ball
$11.95
$9.95

Hand
Protectors
E-Collar Holsters $39.95 ea Special Operations
$39.95 Harness
available in black, coyote or multicam*
Has cutouts so the buttons
can still be worked while its
Bite Suit with plastic with metal cobra
holstered. Has 2" metal clip $1,189.95 buckles buckles
on back of holster so it can be
worn on a 2" duty belt or clipped
$149.95 $199.95
to a MOLLE tactical vest. *with attachments for MOLLE pouches
and K-9 camera
Muzzles
Follow us on $69.95
[[

Scan our QR
code with your
smart phone
to view our
online catalog. Malinois German Shepherd

YOUVE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT
Circle 279 on Reader Service Card The Counter Terrorist ~ August/September 2012 73
CircleThe
74 256Counter
on ReaderTerrorist ~ August/September 2012
Service Card
Circle 334 on Reader Service Card

The Counter Terrorist ~ August/September 2012 75


Engineered to be virtually indestructible,


Energizer Hard Case Tactical lights
are multi-functional, lightweight and
versatile, with features critical to law
enforcement personnel to combat
terrorism.

Check out the complete product line at


HardCaseTactical.com!

Bravo LE2G21L
A swivel-head light with white,
red, blue, and green LEDs and IR
for night vision compatibility.
romeo LEMOL11L
A compact vest light in white
with red, blue and green filters
Tango LEHL11L for light discipline.

White and blue LEDs and IR and IFF


for night vision compatibility. Includes
helmet and vest mounts.

energizer Ultimate
Lithium aa L91
The worlds longest lasting AA
battery in high tech devices,
Energizer Ultimate Lithium AA
provides 1/3 less weight and
outperforms alkaline AA and
Lithium 123 batteries in
temperature extremes.

TM

www.HardCaseTactical.com
Circle 209 on Reader Service Card

2012 Energizer Energizer and other marks are trademarks of Energizer

76 The Counter Terrorist ~ August/September 2012

You might also like