Terrorist Threat INDICATORS - onPoint Tactical LLC
Terrorist Threat INDICATORS - onPoint Tactical LLC
Terrorist Threat INDICATORS - onPoint Tactical LLC
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Counter<br />
Th e<br />
<strong>Terrorist</strong> <strong>Threat</strong><br />
<strong>INDICATORS</strong><br />
SEPTEMBER/OCTOBER 2008<br />
USA/CANADA $9.95<br />
Offi cial Journal of the Homeland Security Professional<br />
VOLUME 1• NUMBER 3<br />
SEPTEMBER/OCTOBER 2008<br />
An SSI ®<br />
Publication<br />
www.thecounterterroristmag.com<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 1
• Complements FirstDefender to maximize in-the-fi eld<br />
coverage of unidentifi ed chemicals including TICs/TIMs,<br />
chemical weapons, explosives and more<br />
• Ground-breaking design—fi ts in your hand, lightweight,<br />
yet rugged enough for fi eld use<br />
• Fast and easy to use—delivers accurate results in less<br />
than a minute, even for complex mixtures<br />
Made in the USA<br />
TruDefender FT<br />
When every second counts,<br />
reliable results are at your fi ngertips.<br />
From the makers of FirstDefender, the revolutionary<br />
TruDefender FT handheld FTIR system enables<br />
identifi cation of an even broader range of<br />
unknown chemicals—right in the hotzone.<br />
To register for an upcoming seminar:<br />
+1.978.642.1132 or www.ahurascientifi c.com/ct<br />
TruDefender | FT<br />
FTIR<br />
FirstDefender<br />
Raman<br />
Counter<br />
Th e<br />
CONTENTS<br />
COVER STORY:<br />
SEPTEMBER/OCTOBER 2008<br />
VOLUME 1• NUMBER 3<br />
Offi cial Journal of the<br />
Homeland Security Professional<br />
Circle 175 on Reader Service Card<br />
2 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 3<br />
24<br />
18<br />
34<br />
44<br />
24<br />
TERRORIST THREAT <strong>INDICATORS</strong><br />
by Richard Marquise<br />
FEATURES:<br />
6<br />
18<br />
34<br />
44<br />
50<br />
Case Study:<br />
NORD-OST A Mass Hostage Scenario<br />
by John Gidduck<br />
NYCWiN INTEROPERABLE COMMUNICATIONS<br />
by Henry Morgenstern<br />
HOW TERRORISTS EXPLOIT E-COMMERCE<br />
by Jennifer L. Hesterman<br />
JUST 2 SECONDS<br />
Using Time and Space to Defeat Assassins<br />
by Gavin de Becker, Tom Taylor and Jeff Marquart<br />
CIVILIAN STANDBY CT GROUPS (PART 1)<br />
by Mickey Hargaash<br />
DEPARTMENTS:<br />
4 From the Editor<br />
42 Book Review<br />
57 Did You Know?<br />
59 Training Review<br />
Cover Photo: Scott Morrison
FROM THE EDITOR:<br />
The Struggle<br />
Continues<br />
Welcome back to<br />
By Chris Graham<br />
W elcome back to Th e Counter <strong>Terrorist</strong>. In the time that has elapsed<br />
Wproliferation<br />
since our previous issue, the world has witnessed a continued<br />
proliferation of terrorist actions. More bombs have been detonated, more<br />
people have been killed. A range of groups have continued attempts to further<br />
their objectives by deliberately targeting civilians. Belligerent nations cultivate<br />
relationships with like-minded terror groups. In short, the struggle continues.<br />
As you receive this issue, we will also be commemorating the loss of our<br />
countrymen murdered on September 11, 2001. Th e 9/11 hijackings and<br />
attacks on the World Trade Center and pentagon are a watershed event. Th is<br />
event marks the fi rst occasion many Americans realized the extent of their<br />
vulnerability and the fact that people exist both committed to their destruction<br />
and unwilling to compromise. Let us take this moment in time to re-commit<br />
ourselves to hunting down these enemies and preventing circumstances likely to<br />
produce more of them.<br />
Congratulations are due to the intelligence and special operations personnel<br />
of Colombia. On July 2, they successfully rescued 15 hostages from the<br />
Revolutionary Armed Forces of Colombia (FARC) in a historically audacious<br />
operation. Th ree Americans held hostage for more than fi ve years were among<br />
the rescued.<br />
Coalition personnel have also experienced successes. Senior terrorists have<br />
been killed or captured in attempt to disrupt militant activities. Domestically,<br />
eff orts are ongoing. Surveillance of suspected terror group members continues.<br />
fi rst responders continue to train and prepare to prevent and respond to terrorist<br />
acts.<br />
Th e Counter <strong>Terrorist</strong> stands as a forum for communication for counter- and<br />
anti- terrorism professionals. In this issue you will fi nd some useful articles<br />
and products. Our cover story will provide identifi able indicators of terrorist<br />
activity. Not a 20 year old check-list; this piece will provide specifi cally useful<br />
information based on a detailed understanding of recent terrorist events from<br />
the perspective of an experienced CT investigator. Our Case Study will provide<br />
a close look into the degree of complexities faced in a large-scale hostage<br />
scenario undertaken by jihadi terrorists. I am confi dent that you will fi nd<br />
insight throughout the magazine. As always, Th e Counter <strong>Terrorist</strong> is here to<br />
assist in the refi nement of eff ective counter- and anti- terrorism eff orts.<br />
I look forward to hearing from you.<br />
Semper Fidelis,<br />
Chris Graham<br />
Editor of Th e Counter <strong>Terrorist</strong><br />
Counter<br />
Th e<br />
Offi cial Journal of the Homeland Security Professional<br />
VOLUME 1 • NUMBER 3<br />
SEPTEMBER/OCTOBER 2008<br />
Editor<br />
Chris Graham<br />
Director of Operations<br />
Sol Bradman<br />
Director of Advertizing<br />
Carmen Arnaes<br />
Director of Production<br />
Kelli Richardson<br />
Contributing Editors<br />
John Andrews<br />
Jennifer Hesterman<br />
Richard Marquise<br />
Chuck Pfarrer<br />
Graphic Design<br />
Morrison Creative Company<br />
Copy Editor<br />
Th omas Duxbury<br />
Offi ce Manager<br />
Lily Valdes<br />
Publisher:<br />
Security Solutions International<br />
Suite 204<br />
14300 SW 129th Street<br />
Miami, Florida 33140<br />
ISSN 1941-8639 Th e Counter <strong>Terrorist</strong><br />
Magazine, Th e Offi cial Journal of<br />
the Homeland Security Professional,<br />
is published by Security Solutions<br />
International <strong>LLC</strong>, as a service to the<br />
nation’s First Responders and Homeland<br />
Security Professionals with the aim of<br />
deepening understanding of issues related<br />
to Terrorism. No part of the publication<br />
can be reproduced without permission<br />
from the publisher. Th e opinions<br />
expressed herein are the opinions of the<br />
authors represented and not necessarily<br />
the opinions of the publisher. Please<br />
direct all Editorial correspondence related<br />
to the magazine to: Security Solutions<br />
International SSI, 14300 SW 129th<br />
Street, Suite 204, Miami, Florida. 33186<br />
or info@thecounterterroristmag.com Th e<br />
subscription price for 6 issues is $49.00<br />
and the price of the magazine is $9.95.<br />
(1-866-573-3999) Fax: 1-786-573-2090.<br />
For article reprints, e-prints, posters and<br />
plaques please contact:<br />
PARS International Corp.<br />
Web: www.magreprints.com/quickquote.asp<br />
Email: reprints@parsintl.com<br />
Phone: 212-221-9595 • Fax: 212-221-9195<br />
Please visit the magazine web site where you can<br />
also contact the editorial staff :<br />
www.thecounterterrroristmag.com<br />
© 2008 Security Solutions International<br />
3rd annual Gulf Coast<br />
Terrorism Prevention Conference<br />
A FULL WEEK OF COUNTER TERROR TRAINING<br />
Law Enforcement and Security Professionals education on combating terrorism<br />
1. Protecting Schools against terrorism<br />
2. Suicide bomber training<br />
3. Jihad 2.0 From Virtual to Reality<br />
4. Protecting Aviation<br />
5. Mall Safety<br />
6. Technologies against terrorism<br />
7. <strong>Threat</strong> of Radical Extremism in the USA<br />
September 15-19, 2008<br />
Hyatt Sarasota<br />
1000 boulevard of the arts<br />
Sarasota Florida USA<br />
Register at: www.homelandsecurityssi.com<br />
1-866-573-3999<br />
4 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 5<br />
Hosted by:<br />
Sponsored by:<br />
Th e<br />
Counter<br />
SSI<br />
® SECURITY<br />
SOLUTIONS<br />
INTERNATIONAL<br />
Circle 177 on Reader Service Card
Case Study:<br />
NORD-OST<br />
A MASS HOSTAGE SCENARIO<br />
By John Giduck<br />
Photographs for this article are derived from video footage shot by the hostage<br />
takers and provided by Russian Special Forces courtesy of Archangel Group.<br />
Before America confronts the fi rst mass-hostage siege<br />
on her soil she can prepare herself by looking at how a<br />
determined and coordinated enemy plans, prepares and<br />
executes such operations. For years, starting in June<br />
1995–just six months after Usama bin Laden sent ten top<br />
al Qaeda terrorist trainers and planners into Chechnya<br />
to take over the Islamist side of that confl ict–Russia<br />
suffered a long series of these sieges, where the lives of<br />
dozens and even hundreds hung in the balance.<br />
y October 2002 the world<br />
witnessed one of our terrorist<br />
enemy’s most complex<br />
operations for the taking and<br />
holding of innocent people.<br />
At that time, the taking of more than<br />
800 people at the Dubrovka–or Nord-<br />
Ost–Th eater in Moscow was the best plan<br />
yet executed, and we have much to learn<br />
from it. 1 By October 2002 the world<br />
witnessed one of our terrorist<br />
enemy’s most complex<br />
operations for the taking and<br />
holding of innocent people.<br />
At that time, the taking of more than<br />
As Lt. Col. Dave Grossman<br />
frequently lectures, when it comes to our<br />
enemies, “the best predictor of future<br />
behavior is past behavior.” Nor should<br />
it be lost on our nation that bin Laden<br />
himself has promised us that everything<br />
they are doing to Russia now, they will<br />
visit on America many times over. I had<br />
been engaged in a training program with<br />
the Ministry of International Aff airs<br />
(MVD’s) Vityaz Spetsnaz Anti-Terror<br />
Unit on the Balashikha Army Base<br />
approximately 50 km east of Moscow the<br />
week prior to the hostage taking. Vityaz,<br />
known as Krapovoi Bereti, or the Blood<br />
Red Berets, was one of the units tasked<br />
with responding to this crisis and we were<br />
in regular contact with them throughout.<br />
After the siege I was able to pay a visit to<br />
the theater itself.<br />
A spectacular musical, the fi rst ever<br />
all-Russian production of the Nord-<br />
Ost Th eater, had been playing for more<br />
than a year. A tall, modern building,<br />
the theater sits at the intersection of<br />
Dubrovka and Melnikova Streets, wide<br />
and open, tree-lined boulevards in north<br />
Moscow just a few kilometers from the<br />
Kremlin. Playing to a packed house, and<br />
enjoying overwhelming critical acclaim,<br />
the musical’s popularity continued in the<br />
days following its debut. At 9:05 p.m.<br />
on Wednesday, 23 October 2002, during<br />
the beginning of the second act, a masked<br />
man dressed in camoufl age stormed onto<br />
the stage, fi ring an AK-47 assault rifl e<br />
into the air. More Chechen terrorists,<br />
with bombs and automatic weapons,<br />
quickly appeared and took more than<br />
800 theatergoers, dancers, actors and<br />
production personnel, including many<br />
children, hostage. Th e performers were<br />
made to sit with the audience. At fi rst,<br />
many in the audience thought it was part<br />
of the show. Symbolically, the terrorists<br />
had waited until the scene in which<br />
actors, dressed in World War I Russian<br />
Air Force uniforms, were dancing.<br />
Female terrorists, seated in the audience<br />
throughout the performance, quickly<br />
donned black Muslim robes and veils,<br />
strapping explosive suicide belts about<br />
their waists.<br />
Th e terrorists had arrived in three<br />
SUV-type vehicles, which were left<br />
running outside as a fallback in the event<br />
their initial takeover proved unsuccessful.<br />
Strangely, no one who saw the driverless<br />
vehicles idling just outside the front<br />
Th e stage is stormed.<br />
At 9:05 p.m. on<br />
Wednesday, 23<br />
October 2002,<br />
during the beginning<br />
of the second act, a<br />
masked man dressed<br />
in camoufl age stormed<br />
onto the stage, fi ring<br />
an AK-47 assault rifl e<br />
into the air.<br />
6 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 7
We have come<br />
here to die, and<br />
you are going to<br />
die with us.<br />
An aspiring martyr displays her<br />
explosive device to the camera.<br />
doors seemed to think this suspicious.<br />
Th e selection of several large vehicles for<br />
delivery had been done before, and would<br />
ultimately be repeated at the Beslan<br />
Middle School No. 1 in southern Russia<br />
two years later.<br />
Th e entire theater was quickly rigged<br />
with explosives, including one major<br />
device in the center of the main seating<br />
area of the auditorium, and another in<br />
the balcony. Both were fashioned from<br />
large gas tanks taken from military<br />
vehicles. An additional 20 smaller bombs<br />
were spread throughout the theater, in<br />
addition to 25 suicide bombs strapped<br />
to the females. Th e Chechens had also<br />
brought with them 100 hand grenades.<br />
Th e women, part of the Black Widows<br />
and Fiancées of Allah, wore bomb belts,<br />
each containing 3 to 5 kilograms (6.6 to<br />
11 pounds) of explosives, wrapped with<br />
metal nuts, bolts and ball bearings. Th e<br />
women were constantly in the theater<br />
with the hostages, working in shifts, a<br />
schedule of terrorist control that would<br />
also be seen at Beslan. Th ey held the<br />
detonators–literally, the fate of their own<br />
lives and the hostages around them–in<br />
their hands.<br />
Th e Chechen leader was 25-yearold<br />
Mozar Barayev, though Russian<br />
intelligence determined that his original<br />
name was Barsayev. It was speculated<br />
that he had dropped the single “s”<br />
from his surname in order to create the<br />
impression there was some connection<br />
between him and the famed Chechen<br />
rebel leader Arbe Barayev. Others<br />
continue to insist that he was a cousin of<br />
the famous terrorist. Barayev demanded<br />
that Russia completely withdraw from<br />
Chechnya or all the hostages would die.<br />
He addressed the captives, telling them<br />
that Russia had just three days to pull<br />
out of Chechnya, and that if troops tried<br />
to storm the building it would be blown<br />
up. He also encouraged the hostages to<br />
use their cell phones to call police and<br />
loved ones, informing them of their dire<br />
situation and the steps necessary for the<br />
government to take in order for them to<br />
live.<br />
Th roughout the 58-hour ordeal the<br />
Chechens would periodically shoot their<br />
weapons into the theater ceiling, and<br />
scream across the auditorium to each<br />
other rather than utilize any type of<br />
conventional communication, fearing<br />
Spetsnaz (special operations forces)<br />
might intercept any communications<br />
system. Th is only had the eff ect of further<br />
terrifying an already inconsolable and<br />
panic-stricken 800-plus people. Prior to<br />
taking the theater, the terrorist group had<br />
videotaped a statement explaining why<br />
they were doing so: “Every nation has<br />
the right to decide their own fate. Russia<br />
has taken this right away from Chechnya.<br />
We have long waited for the world to<br />
notice that the innocent are dying in<br />
Chechnya. Th at women, children and the<br />
weak are being killed.”<br />
Barayev was the last to speak. Eyes<br />
down cast throughout his speech, he said:<br />
“Each of us is ready to give over life for<br />
Allah, and the freedom of Chechnya. I<br />
swear by Allah we desire death more than<br />
you desire life.” Th e hostages had been<br />
told: “We have come here to die, and you<br />
are going to die with us.” Th is haunting<br />
refrain would be repeated to the children<br />
of Beslan.<br />
Winter comes early in Russia. By<br />
10:00 o’clock that black, wet and frigid<br />
October night police and the Moscow<br />
contingents of several Special Forces<br />
units had surrounded the theater. Alpha,<br />
Vympel, the SOBR Rapid Reaction<br />
Force, and the famed Vityaz Anti-Terror<br />
group of the Interior Ministry had all<br />
responded to the call. Historically, Alpha<br />
and Vityaz had worked together, trained<br />
together, and had launched several<br />
successful joint operations in recent years.<br />
Vympel, with its focus on terrorist assault<br />
operations, was the newcomer to Russia’s<br />
8 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> Circle ~ September/October 237 on Reader Service Card<br />
2008
December 11-12 - Washington, DC<br />
November 17-18, 2008 - Chicago, IL<br />
November 20-21, 2008 - Washington, DC<br />
October 7-10, 2008 - Camp Blanding, FL<br />
November 4-7, 2008 - Anaheim, CA<br />
January 12-13, 2009 - Arlington, VA<br />
battle against terror on its own soil. Th e<br />
truth be known, the hostages could not<br />
have been in better hands. Within an<br />
hour of their arrival, 11:00 o’clock p.m.,<br />
the elite Spetsnaz forces had sealed off<br />
the entire area, leaving outer perimeter<br />
security to Vityaz and SOBR, in addition<br />
to the lesser trained police and other<br />
government units. Electricity was shut<br />
off to surrounding buildings and homes.<br />
Major Kontantin Komarov, a Russian<br />
Spetsnaz career offi cer, was an eightyear<br />
veteran of the Main Intelligence<br />
Directorate (GRU’s) 10 th Spetsnaz<br />
Brigade and seven-year commander<br />
with SOBR. Possessing a Ph.D. in<br />
psychology, he had been called in to<br />
begin psychological profi les of all the<br />
terrorists, particularly the women, to aid<br />
in the assault groups’ plans and determine<br />
the lengths to which the terrorists would<br />
likely go.<br />
Th e Spetsnaz were able to learn that<br />
the women were wearing all black<br />
burkas, face veils and headscarves. Th is<br />
was certainly not the cultural dress of<br />
Chechen women. All of the terrorists<br />
were wearing cravats with Arabic<br />
sayings written across their foreheads. In<br />
addition, the terrorists had hung a large<br />
Arabic fl ag in the theater. Chechens do<br />
not speak Arabic, and it was unlikely<br />
that any single one of them could have<br />
read the Arabic expressions of hatred<br />
they had adorned themselves and the<br />
theater with. Th is did not bode well for a<br />
peaceful resolution. All of this, together<br />
with the Palestinian-style suicide belts,<br />
demonstrated the Arabization of the<br />
Chechen cause and that this group of<br />
terrorists was well under the infl uence of<br />
an Arab-type terrorist policy.<br />
However, as would be seen at Beslan,<br />
appearances could not be allowed to<br />
incite fear. According to SOBR Col.<br />
Sergei Gritsenko, the women were<br />
ultimately found to have died their hair<br />
blonde and were wearing blue jeans under<br />
their dresses, signs they hoped to escape<br />
the holocaust that would eventually<br />
take their lives. While this was one<br />
expert’s opinion, and must be accorded<br />
commensurate consideration, it is just<br />
as likely that they had died their hair<br />
blonde and wore jeans in order to enter<br />
the theater with the other members of<br />
the audience, taking their seats without<br />
arousing suspicion. Police harassing<br />
Chechens, or anyone who appears to hail<br />
from the North Caucasus, is a constant<br />
occurrence in Moscow.<br />
Th en in the early morning hours<br />
of Th ursday, 24 October, a woman<br />
simply walked through the supposedly<br />
impenetrable security perimeter and<br />
marched into the theater. She was<br />
merely a citizen intent on speaking to<br />
the terrorist leader and demanding an<br />
end to the monstrosity. Th e terrorists,<br />
believing she was working for the special<br />
forces, took her out into the lobby and<br />
shot her fi ve times. Later they would<br />
demand that a team of physicians enter<br />
to treat the wounded, and they had<br />
them drag her body away. Despite the<br />
insistence of the Russian government<br />
publicly that she was merely a concerned<br />
citizen from the neighborhood, military<br />
offi cials would later tell me that she was,<br />
in fact, a Federal Security Service (FSB)<br />
intelligence offi cer who volunteered<br />
to enter the building in the hope that<br />
she could talk her way out with critical<br />
intelligence. 2<br />
Later that morning, Barayev, in<br />
communication with outside forces,<br />
threatened to begin killing groups of<br />
hostages within 48 hours if his earlier<br />
demands were not met. At this point,<br />
the negotiators attempted to persuade<br />
Barayev to release the children. He<br />
refused. Rather, he distributed cell<br />
phones to the child hostages, ordering<br />
them to call their parents and tell them<br />
not to let the government troops storm<br />
the building. Th ey were told to say<br />
<strong>Terrorist</strong> strapped with bombs and booby traps.<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 11<br />
Circle 251 on Reader Service Card
As the gas poured<br />
in, pandemonium<br />
broke out in the<br />
theater. Hostages<br />
began screaming.<br />
The male terrorists<br />
put on gas masks<br />
and took up position<br />
for the battle that<br />
was to ensue in the<br />
hallways outside.<br />
that if the parents organized televised,<br />
public demonstrations against the<br />
war in Chechnya, the kids would be<br />
released. Th e family members of the<br />
children quickly did so, but none of the<br />
government controlled TV stations would<br />
air them. Accordingly, Barayev reneged<br />
on his agreement, and the children<br />
remained.<br />
For all this, however, the male terrorists<br />
raped no women, and up to the time of<br />
the assault no hostage executions had<br />
been carried out. Still, one colonel with<br />
MChS, the Russian federal emergency<br />
services department, in full uniform and<br />
attending the play, was killed outright,<br />
as was another police offi cer. Another<br />
girl was reported to have taken some<br />
kind of drug due to the stress of the<br />
situation. It caused her to act out and<br />
she, too, was shot. On the second day<br />
two girls jumped from a second story<br />
window. One broke her leg on landing.<br />
A soldier came to help and he was shot<br />
and wounded, as was the other girl who<br />
had not been injured in the fall.<br />
As dawn came on that Th ursday–the<br />
fi rst morning of the siege–Alpha, Vympel<br />
and Vityaz commandos were already<br />
practicing storming the Nord-Ost<br />
Th eater at an identical building nearby.<br />
No one expected a peaceful outcome to<br />
this drama. Th e terrorists were constantly<br />
fearful they would be attacked through<br />
the roof of the theater and focused much<br />
of their attention in that direction. Th e<br />
hostages were forced to use the orchestra<br />
pit as a communal toilet.<br />
At 11:45 p.m. on Friday, 25 October,<br />
only seven hours remained until<br />
Barayev began executing hostages. He<br />
had been promised that Russian Army<br />
General Kazantsev, the highest profi le<br />
commander in the Chechen War, was<br />
coming to negotiate with them. Barayev<br />
said that if Kazantsev did not appear, he<br />
would begin “cutting the heads off ” the<br />
hostages and “throwing them outside.”<br />
In reality, the offi cials in charge of the<br />
situation had never even contacted<br />
Kazantsev. At 5:00 in the morning,<br />
Saturday, 26 October, the tasked special<br />
forces units fl ooded the theater with a<br />
fentanyl-enhanced gas which the U.S.<br />
government would identify as carfentanyl<br />
in 2007. Th e male terrorists, including<br />
the leaders, had positioned themselves in<br />
the corridors leading to the auditorium,<br />
rendering it impossible to give the order<br />
to the women to detonate their belt<br />
bombs; an act they were trained to not<br />
undertake absent an express order. As<br />
the gas poured in, pandemonium broke<br />
out in the theater. Hostages began<br />
screaming. Th e male terrorists put on<br />
gas masks and took up position for the<br />
battle that was to ensue in the hallways<br />
outside. Th e females had not been given<br />
masks, and they quickly succumbed to<br />
the gas. Alpha and Vympel, paired up<br />
with operators from Vityaz and SOBR,<br />
waited 30 full minutes from the delivery<br />
of the gas to assault the building. Other<br />
elements of Vityaz and SOBR were held<br />
in reserve. Th e assault launched at 5:30<br />
a.m. Th irty minutes later the battle<br />
was over and all of the terrorists were<br />
dead. Th e females, found seemingly<br />
unconscious in their seats, each received a<br />
bullet to the head.<br />
Th e Russian Special Forces would,<br />
receive criticism from an unrealistic<br />
international press for their shooting<br />
of the female terrorists. In reality, this<br />
was a tactic to be criticized only for<br />
its reliance on a single round, rather<br />
than redundancy for the sake of safety.<br />
Not everyone had succumbed to the<br />
fentanyl, and many of the hostages were<br />
found stumbling about. Th e female<br />
terrorists were found lying back in their<br />
seats, gripping the handles of their belt<br />
bombs and the detonators of the larger<br />
devices. Th ey could just as easily have<br />
been feigning sleep, awaiting the moment<br />
when government forces entered the<br />
theater before detonating all of the<br />
bombs, substantially increasing the body<br />
12 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 13<br />
Circle 181 on Reader Service Card
Inadequate medical support proved to be<br />
the undoing of an audacious operation<br />
count. Th is is standard al Qaeda training<br />
and doctrine: to draw in the rescuers<br />
before detonating major explosives,<br />
killing as many of the hostages and<br />
saviors as possible. Our own troops have<br />
seen this in Iraq and Afghanistan.<br />
Th at the storming of the Nord-Ost<br />
Th eater and the saving of these hostages<br />
would not go down in history as the<br />
single greatest hostage rescue in history<br />
was not the fault of the Russian Special<br />
Forces. Senior leaders had failed entirely<br />
to alert area hospitals that an assault<br />
of the building was to take place, or to<br />
inform doctors that gas was to be used.<br />
Once confronted with scores of aff ected<br />
gas victims, the government still refused<br />
to tell physicians what substance had<br />
been used, or that gas had been used<br />
at all. Moreover, no ambulances were<br />
in place and the entire area had been<br />
surrounded by enormous dump trucks,<br />
fi lled with sand, to absorb the blast in<br />
the event the terrorists blew the entire<br />
building up. Th e drivers of the trucks<br />
were long since gone, and no one had<br />
the keys. When word fi nally reached<br />
emergency services, the sand trucks<br />
and crowds prevented the ambulances<br />
from approaching the building. Many<br />
hostages, suff ering the eff ects of the gas,<br />
died in city buses, driving for hours while<br />
ignorant bus drivers sought hospitals they<br />
were unfamiliar with. Still others died<br />
when soldiers attempted to drag them<br />
outside to fresh air, pulling them along<br />
by their arms, allowing their heads to tilt<br />
back, suff ocating them.<br />
Despite all of this, the soldiers of<br />
Russia’s Special Forces managed to save<br />
more than 600 of the 800 hostages,<br />
losing 129, including many children. 3<br />
In the process they dispatched every<br />
single one of the 42 terrorists. It is a<br />
reminder of the grim reality of such<br />
situations to think that probably not<br />
a single one of those 129 would have<br />
died had the government prepared for<br />
the aftermath of the assault. Sadder<br />
still is the recognition that the Nord-<br />
Ost production was a show full of child<br />
performers. Th e terrorists knew this,<br />
planned the assault, and refused to release<br />
the children once taken. Who could not<br />
have seen this as a harbinger of things to<br />
come at Beslan two years hence?<br />
But these would not prove to be the<br />
only mistakes to be repeated at Beslan.<br />
One commander contends that a main<br />
mistake in Russia’s recent experiences in<br />
dealing with terrorist-hostage situations<br />
is a division between government units.<br />
He explains that at the siege, the FSB,<br />
through its “arms” Alpha and Vympel,<br />
unilaterally planned the assault and use<br />
of gas. Being in the loop, the Alpha<br />
and Vympel commandos entered the<br />
theater with gas masks. SOBR and<br />
Vityaz, MVD units, and to which the<br />
overall plan had not been fully disclosed,<br />
entered behind them–with no gas masks.<br />
Upon entering the building to neutralize<br />
terrorists and begin assisting the hostages,<br />
twelve operators from SOBR were<br />
stricken. Th is very failure to coordinate<br />
between government units would be a<br />
factor in the chaos that would ultimately<br />
engulf Beslan.<br />
How well America will deal with<br />
the tactical hurdles that our law<br />
enforcement–and perhaps even some<br />
military units–will confront upon our<br />
fi rst experience with this type of attack<br />
is dependent upon how willing we are<br />
to study our enemy’s operations in other<br />
countries. Any belief that a peaceful<br />
settlement will be negotiated is naïve.<br />
As a Russian Spetsnaz colonel once told<br />
me, when it comes to America there are<br />
only two guaranteed consequences of<br />
that attack: Th ere is going to be a battle,<br />
and people are going to die. All of the<br />
terrorists will die; they will allow no other<br />
solution. Some of the hostages will die,<br />
and there is nothing anyone can do to<br />
keep them all alive. Some will have been<br />
One analyst sees a doorknob.<br />
Another analyst sees a corroded doorknob.<br />
HS BOOST<br />
Homeland Security Bulletin of Open Source <strong>Threat</strong>s<br />
Circle 187 on Reader Service Card<br />
14 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />
•<br />
You see the signature of<br />
liquid explosives manufacturing.<br />
Open the door to higher intelligence—<br />
Get your monthly subscription to the very fi rst, threat-specifi c,<br />
actionable intelligence report in the USA For Offi cial Use Only.<br />
Subscription rates start at $499.00 per month.<br />
Get Your BOOST: Call Henry Morgenstern: 1-866-573-3999 Ext.105 • Mobile: 305-401-6906<br />
c o n t a c t @ s e c u r i t y s o l u t i o n s i n t . c o m • w w w . h o m e l a n d s e c u r i t y s s i . c o m
Circle 189 on Reader Service Card<br />
killed early on. And some of our rescuers<br />
are going to die.<br />
When it comes, our brave warriors<br />
who enter the building will be in an<br />
immediate deadly-force situation so<br />
long as a single terrorist is left alive. It<br />
cannot matter that they are “appearing”<br />
to surrender or are wounded. Th ey<br />
are trained to exploit American legal<br />
restraints and await our rescuers<br />
coming closer before detonating hidden<br />
explosives. Overall, the number and<br />
magnitude of fi rearms, explosives, booby<br />
traps and threats to hostages will stretch<br />
our units to their limits. Th e terrorists<br />
will arrive with a plan that likely was in<br />
the making for more than a year, based<br />
on near-perfect intelligence. Unless<br />
interdicted, we will only be able to react.<br />
How we react will depend on what we do<br />
to prepare now, for an attack like Nord-<br />
Ost on American soil. It may be a matter<br />
of when, and not if.<br />
if. •<br />
1 Portions of this article have been excerpted<br />
from an analysis of Russia’s recent terrorist<br />
mass-hostage sieges in the book, Terror At<br />
Beslan: A Russian Tragedy with Lessons<br />
for America’s Schools, available at<br />
www.antiterrorconsultants.org.<br />
2 Th e FSB is the current evolution of the<br />
former KGB.<br />
3 Four or fi ve were killed early on by the<br />
terrorists.<br />
ABOUT THE AUTHOR<br />
John Giduck is a senior consultant with the<br />
Archangel Group (www.antiterrorconsultants.<br />
org), providing training to U.S. law<br />
enforcement, government agencies and the<br />
military. He has a law degree and a master’s<br />
degree in Russian studies, and has worked with<br />
several Russian Special Forces units. He has<br />
authored the book Terror at Beslan<br />
Circle 229 on Reader Service Card<br />
Circle 191 on Reader Service Card<br />
16 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008
NYCWiN<br />
INTEROPERABLE<br />
COMMUNICATIONS<br />
By Henry Morgenstern<br />
A report on<br />
the New York<br />
City Wireless<br />
Network<br />
Innovations<br />
The tragedy of 9/11 made it clear that communications<br />
is one of the key weaknesses not just of New York, but of<br />
every city around the world. Consider some of the statements<br />
gleaned from the 1,613 taped conversations released by<br />
New York City offi cials in August 2006. These dialogues<br />
between fi rst responders and victims, which were recorded<br />
during the events of 9/11, clearly underline the vulnerability<br />
of the city’s communications systems.<br />
Photo: NYC DOITT<br />
T<br />
he tragedy of 9/11 made it clear<br />
that communications is one of the<br />
key weaknesses not just of New<br />
York, but of every city around the world.<br />
Consider some of the statements gleaned<br />
from the 1,613 taped conversations<br />
released by New York City offi cials in<br />
August 2006. Th ese dialogues between<br />
fi rst responders and victims, which were<br />
recorded during the events of 9/11,<br />
clearly underline the vulnerability of the<br />
city’s communications systems.<br />
In one of the tapes, for example, Chief<br />
Dennis Devlin of the New York City Fire<br />
Department’s Battalion 9 can be heard<br />
to remark, “We’re in a state of confusion.<br />
We have no cell phone service anywhere<br />
because of the disaster... Bring all the<br />
additional handy talkies.” Devlin was<br />
trying to get a rundown of which fi re<br />
companies had been dispatched to the<br />
burning World Trade Center. Sadly, he<br />
was still inside the south tower when it<br />
collapsed.<br />
Since 9/11 several large-scale projects<br />
have been initiated in an attempt to<br />
remedy such issues. One of the most<br />
spectacular eff orts, a project named<br />
NYCWiN, will make New York City a<br />
model of integrated communications.<br />
Th ere is every reason, of course,<br />
that New York City takes the threat of<br />
terrorism seriously. In fact, in response to<br />
the events of 9/11, the city has not only<br />
improved its communication system, but<br />
it has also created a complete counterterrorism<br />
division, including its own<br />
intelligence capability, within the NYPD.<br />
Th is division, which includes personnel<br />
stationed in hot spots around the world,<br />
rivals anything federal agencies can fi eld.<br />
“We remain a prime—if not the<br />
prime—target for al-Qaeda and other<br />
terrorist groups,” said Mayor Michael<br />
Bloomberg in testimony before Congress<br />
in 2007. Indeed, New York City’s<br />
large counter-terrorism force has so far<br />
managed to foil at least seven terrorist<br />
attempts, including an Islamic terror<br />
plot to blow up fuel-tank farms at John<br />
F. Kennedy International Airport. Th us,<br />
while most other cities spend their federal<br />
homeland security money on things like<br />
street lighting, New York means business<br />
when it comes to counter-terrorism.<br />
But no matter how elite New York’s<br />
counter-terrorism task force is, nor<br />
how prepared its police, fi re, emergency<br />
management, and transportation<br />
and traffi c departments are, none of<br />
these groups can function without a<br />
communications system built to resist<br />
tragedies such as 9/11 or Hurricane<br />
Katrina.<br />
I spoke to two people at New York<br />
City’s Department of Information<br />
Technology and Telecommunications<br />
(DOITT) to fi nd out exactly what is<br />
involved in the planning, requisitioning,<br />
and implementation of a system like<br />
NYCWiN. Although allotted a $500<br />
million budget and implementation time<br />
frame of fi ve years, it is believed that<br />
the project, which is being undertaken<br />
by homeland security giant Northrop<br />
Grumman, may eventually require up to<br />
15 years and $1.5 billion.<br />
First, I interviewed Paul J.<br />
Wireless call box. Photo: NYC DOITT<br />
Indeed, New York<br />
City’s large counterterrorism<br />
force has so<br />
far managed to foil<br />
at least seven terrorist<br />
attempts, including<br />
an Islamic terror<br />
plot to blow up fueltank<br />
farms at John F.<br />
Kennedy International<br />
Airport.<br />
18 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 19
So far, the system’s<br />
redundancy has been<br />
tested by simulated<br />
loads that exceed<br />
those of 9/11, and it<br />
has withstood the test.<br />
Cosgrave, who was appointed DOITT<br />
commissioner by Mayor Bloomberg in<br />
June 2006. With more than 30 years of<br />
experience, Cosgrave has the primary<br />
goal of making the power of technology<br />
available to both the public and private<br />
sector. In describing NYCWiN, Cosgrave<br />
stated the following:<br />
Our aim was to create a system<br />
that would provide our fi rst<br />
responders, police, fi re, EMS, and<br />
transportation [offi cials] with a better<br />
data communications infrastructure<br />
that will allow building plans to<br />
reach fi refi ghters, data on current<br />
developments to [reach] emergency<br />
management, communication [to<br />
occur] between the police (including<br />
[transmission of] graphic components<br />
like fi ngerprints), and will also allow<br />
the Department of Transportation to<br />
thoroughly control traffi c both on a<br />
daily basis and in emergencies—even<br />
severe ones.<br />
According to Cosgrave, New York’s<br />
diff erent agencies were all planning<br />
communications upgrades prior to 9/11,<br />
but once that day’s events highlighted the<br />
importance of interoperability, a citywide<br />
eff ort was requisitioned. “We learned a lot<br />
about the necessity of redundancy in the<br />
system from 9/11,” continues Cosgrave,<br />
“but we also learned how important...<br />
power supplies and the private cellular<br />
networks [are] at times of emergency.”<br />
Based on these lessons, NYCWiN<br />
is designed to support multiple,<br />
simultaneous transmission of full-motion<br />
video or large fi les to and from anywhere<br />
in the city; real-time tracking of all city<br />
vehicles and control of traffi c lights;<br />
continuous monitoring of air and water<br />
purity; transmission of patient vital signs<br />
from ambulances to receiving hospitals;<br />
and reliable voice communications to<br />
back-up radio and cell phone signals. So<br />
far, the system has been operational in the<br />
area below Canal Street.<br />
“We know the value of keeping the<br />
communications nodes working, because<br />
on 9/11, one of the lost nodes was put<br />
out near the towers,” notes Cosgrave.<br />
“Today, no site failing will have that eff ect<br />
on the network.” Similarly, according to<br />
Cosgrave, less visible events, such as small<br />
plane crashes and crane collapses, will<br />
also no longer cause cell phone network<br />
outages as a result of the implementation<br />
of NYCWiN.<br />
Of course, the amount of video<br />
processing that a city like New York<br />
has in play makes quality of service<br />
(QOS) and priority of service (POS)<br />
critical concepts in a system such as<br />
NYCWiN. For example, the New York<br />
Department of Transportation currently<br />
operates nearly 100 still and video<br />
cameras from its Traffi c Management<br />
Center in Long Island City, Queens; the<br />
Metropolitan Transportation Authority.<br />
Another 20 still and video cameras on<br />
the city’s major bridges and tunnels;<br />
and the New York Police Department<br />
operates several thousand cameras. Th e<br />
NYPD announced in July 2008 that<br />
it was seeking $90 million to deploy<br />
an additional 3,000 cameras in lower<br />
Manhattan.<br />
Th us, according to Brian Snodgrass of<br />
the DOITT, NYCWiN is not only built<br />
to foster video streaming, but also to<br />
ensure “a dynamic scheme for taking into<br />
account POS and QOS—for example,<br />
where we need to have critical laptops<br />
remain connected during an emergency.”<br />
Th is versatility also includes system<br />
scalability. Snodgrass worked at a private<br />
cellular provider during the 9/11 attacks<br />
and found that it was diffi cult to meet the<br />
immediate needs of getting 200 to 500<br />
phones activated immediately. “By having<br />
the system under the complete control of<br />
the city, we can mobilize those resources<br />
without going out to a third party,” says<br />
Snodgrass.<br />
Critics of NYCWiN have mentioned<br />
incompatibility as a possible problem<br />
associated with this system. According<br />
to Snodgrass, the system’s consistent IP<br />
interface opens it to transmission that<br />
would otherwise be incompatible. By<br />
utilizing gateway systems, NYCWiN<br />
should off er good access, if not complete<br />
interoperability. Th e system is also<br />
adaptable and can provide interfaces<br />
to equipment not compatible with the<br />
transmission network.<br />
“Th e Manhattan Security Initiative [a<br />
wide-ranging closed-captioned television<br />
network similar to the system in place<br />
in London] is just one example of the<br />
preventative side of the NYCWiN<br />
network,” says Cosgrave. “We are now<br />
working to link all kinds of monitoring<br />
and detection devices to the system and<br />
make results available system-wide. We<br />
are looking at radiological [monitoring],<br />
biological [monitoring], and more.”<br />
So far, the system’s redundancy has<br />
been tested by simulated loads that<br />
exceed those of 9/11, and it has withstood<br />
the test. Also, as previously mentioned,<br />
NYCWiN has been operational in lower<br />
Manhattan for some time. Th e robust<br />
system is already attracting the attention<br />
of other cities, including Oklahoma<br />
City, Tucson, and Washington, DC.<br />
In addition to its uses in terrorism<br />
prevention and response, some other<br />
features of NYCWiN that make this<br />
20 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 257 on Reader Service Card<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 21
system attractive include the following:<br />
• Water and electric utilities will<br />
be able to conduct meter reading<br />
without sending staff door to door.<br />
• Offi cials will be able to instantly<br />
locate and access any city vehicle,<br />
whether a patrol car, a bus, or a<br />
garbage truck.<br />
• Police will be able to locate pictures<br />
of suspects from their cars.<br />
• Fire chiefs will be able to watch<br />
live video of fi res taken from traffi c<br />
helicopters.<br />
• Inspectors will be able to look up<br />
building plans while at inspection<br />
sites.<br />
• Data can be sent 50 times faster<br />
than over current networks.<br />
• Satellite tracking devices can be<br />
shared around many diff erent<br />
applications.<br />
• Police and fi re offi cials will be able to<br />
see diff erent angles of a crime or fi re<br />
scene simultaneously.<br />
• All NYC employees will be part of a<br />
unifi ed communications network.<br />
It is hoped that New York, having<br />
suff ered so much, may be able to reach<br />
other municipal governments with their<br />
example, thus helping cities all over the<br />
country to do more to enhance fi rstresponder<br />
communications.<br />
SOME SPECS ON<br />
NYCWIN<br />
Th e original specifi cations for<br />
NYCWiN called for it to support<br />
multiple, simultaneous transmission<br />
of full-motion video or large fi les from<br />
and to anywhere in the city; real-time<br />
tracking of all city vehicles and control<br />
of traffi c lights; continuous monitoring<br />
of air and water purity; transmission of<br />
patient vital signs from ambulances to<br />
receiving hospitals; and reliable voice<br />
communications to back up radio and cell<br />
phone signals. Other specifi cs regarding<br />
this system include the following:<br />
• NYCWiN is not technically Wi-<br />
Fi, because it will use a licensed<br />
spectrum.<br />
• NYCWiN is not a WIMAX<br />
system, but it uses universal<br />
mobile telecommunications system<br />
technology on the 2.5 GHz band to<br />
provide a broadband data network<br />
and IP services.<br />
• NYCWiN York City is using IP<br />
wireless technology for their citywide<br />
safety network, with each cell site<br />
providing in-building coverage up to<br />
3 to 5 miles from the cell site in an<br />
urban setting. It operates in a single<br />
channel of 5 or 10MHz of spectrum<br />
and supports voice over IP with full<br />
QOS based on SIP. •<br />
September Mission: SOLD OUT!<br />
November Mission: November 14-21, 2008<br />
Circle 213 on Reader Service Card<br />
22 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />
Circle 215 on Reader Service Card
TERRORIST THREAT<br />
<strong>INDICATORS</strong><br />
By Richard Marquise<br />
Photo: Scott Morrison<br />
On September 5, 1972, Palestinian terrorists<br />
from the Black September Organization entered<br />
the world stage at the Olympic Games in<br />
Munich. Before it was over, 11 Israeli athletes<br />
were dead and the world was forever changed.<br />
I<br />
n the following weeks, the United<br />
States Government received<br />
information that a terrorist attack<br />
would occur within the United States.<br />
FBI agents familiar with the threat from<br />
the enemies of the time, the Soviet Union<br />
and China – the Communists—were<br />
dispatched to prevent it.<br />
Due to the large “Arab” population<br />
in the Dearborn, Michigan, area, agents<br />
began surveillances and conducted<br />
numerous interviews. Few of them<br />
understood the diff erence between<br />
Sunnis and Shiites or knew about the<br />
complex political situation in the Middle<br />
East. Th e police in Dearborn were<br />
unaware of the FBI activities in that<br />
community. Th e FBI believed it alone<br />
was equipped to deal with this threat,<br />
and since the information came from<br />
“intelligence” sources, it could not be<br />
shared. Fortunately we have come a long<br />
way since this time.<br />
Today, there are approximately 13,000<br />
FBI agents in the United States, not all<br />
of whom work terrorism. It is the great<br />
force multiplier of 800,000 federal,<br />
state, local and tribal law enforcement<br />
offi cers who will prevent the next act of<br />
terrorism. Th ese offi cers may encounter<br />
terrorist indicators during contact with<br />
the general public, through undercover<br />
operations, searches and car stops, as well<br />
as interviews, technical coverage and jail<br />
intelligence. Law enforcement analysts<br />
review large amounts of information<br />
and are a source of identifying pre-attack<br />
indicators. A knowledgeable general<br />
public can also identify and report<br />
indicators of terrorism.<br />
Not all terrorists look like the 19 men<br />
who hijacked airplanes on September<br />
11. Th ey look like each of us. John<br />
Walker Lindh, José Padilla, or any of<br />
the terrorists who have attacked targets<br />
in Russia, east Africa, the Philippines,<br />
India, Jordan, Pakistan, Indonesia, Spain<br />
or the United Kingdom over the past<br />
15 years are proof of this. While this<br />
makes an offi cer’s job more diffi cult, each<br />
must examine behaviors and activities,<br />
rather than appearance, to spot a terrorist<br />
planning an attack. <strong>Terrorist</strong>s plan,<br />
collect intelligence, acquire materials<br />
and exhibit certain behaviors during<br />
this process, which, if recognized, could<br />
prevent an act of terrorism.<br />
Th roughout our nation’s history,<br />
terrorism has been prevented by state<br />
and local offi cers. In late 1987, the<br />
chief of police in a small Vermont town<br />
arrested three Middle Eastern men near<br />
24 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 25
The planning stage<br />
is the best opportunity<br />
to prevent attacks,<br />
and it is through<br />
the recognition of<br />
indicators that law<br />
enforcement can stop<br />
an attack. Just as<br />
terrorists learn from<br />
previous attacks,<br />
law enforcement can<br />
study their methods to<br />
prevent future attacks.<br />
the Canadian border. It appeared that<br />
these men had circumvented the border<br />
crossing and later provided confl icting<br />
information in response to the chief’s<br />
questions. Investigation determined<br />
they were preparing to commit a terrorist<br />
attack in the United States. 1 Months<br />
later, a Japanese Red Army member was<br />
arrested by a New Jersey state trooper<br />
outside New York City en route to<br />
commit terrorist attacks. 2 Th e bombers of<br />
the Murrah Building in Oklahoma City<br />
and the Atlanta Olympic games in 1995<br />
and 1996, respectively, were arrested by<br />
state and local police offi cers just doing<br />
their jobs.<br />
Th ere are many challenges to<br />
preventing terrorism. Th ese include<br />
target displacement, sleeper cells and<br />
the fact the threat is ever-changing. Th e<br />
solution is to understand the threat,<br />
collect information and share it.<br />
<strong>Terrorist</strong> targets have changed.<br />
Historically, most attacks were symbolic,<br />
not designed to cause mass casualties,<br />
but simply send a message that terrorists<br />
could strike at will. Nonmilitary<br />
government institutions have traditionally<br />
been targeted. Police stations in America<br />
were attacked by domestic terrorists<br />
in the 1960s and 1970s. In Iraq, law<br />
enforcement and nonmilitary government<br />
entities are daily targets. Approximately<br />
17 percent of the 25,000 international<br />
terrorist attacks which occurred in<br />
2005-06 were directed against law<br />
enforcement. 3 Th e Murrah Building<br />
was targeted by domestic terrorists.<br />
Military facilities and specifi c individuals<br />
have been targeted by domestic and<br />
international terrorists throughout<br />
history. FBI Director Robert S. Mueller,<br />
in Congressional testimony, stated that<br />
future attacks will be against “economic<br />
targets such as aviation, the energy sector<br />
and mass transit; soft targets such as large<br />
public gatherings; and symbolic targets,<br />
such as monuments and government<br />
buildings.” 4<br />
United States law enforcement has<br />
had the al Qaeda manual or “playbook”<br />
for more than a decade. First discovered<br />
in the mid-1990s, one version says the<br />
best targets for spreading fear in the U.S.<br />
and Europe include skyscrapers, nuclear<br />
plants, and crowded football stadiums.<br />
It discusses hitting sites of sentimental<br />
value, including the Statue of Liberty,<br />
Big Ben and the Eiff el Tower, to generate<br />
intense publicity. Th eir targets include<br />
Jewish organizations and large gatherings<br />
to cause as many deaths as possible.<br />
Th is manual stipulates the strikes must<br />
be strong and have a wide impact on<br />
the population. 5 Th eir tactics are also<br />
outlined in the manual and include<br />
gathering information about the enemy<br />
(intelligence collection), kidnapping<br />
and assassinating enemy personnel, and<br />
how to respond to law enforcement<br />
contacts. Other sections are devoted to<br />
fi nding the ideal apartment and forging<br />
documents, as well as training in making<br />
chemical and biological weapons. 6 Every<br />
law enforcement offi cer should read this<br />
manual, a version of which is available<br />
on the Internet, in order to “know the<br />
enemy.”<br />
<strong>Terrorist</strong>s are opportunistic and<br />
will strike where we are vulnerable<br />
and inattentive, much as we were on<br />
September 11. Th e planning stage is the<br />
best opportunity to prevent attacks, and<br />
it is through the recognition of indicators<br />
that law enforcement can stop an attack.<br />
Just as terrorists learn from previous<br />
attacks, law enforcement can study their<br />
methods to prevent future attacks.<br />
<strong>Terrorist</strong>s surveil their targets. During<br />
an offi cer’s daily work, he or she may see<br />
unusual cameras, night-vision equipment,<br />
maps with targets highlighted, blueprints<br />
and law enforcement or terrorist training<br />
manuals. Offi cers may notice individuals<br />
loitering near or photographing<br />
potential targets. During 2004, offi cers<br />
from Baltimore County, Maryland,<br />
noticed individuals videotaping on the<br />
Chesapeake Bay Bridge, a major eastcoast<br />
route. Th ey tried to conceal their<br />
activities, but the offi cers spoke with<br />
them and shared the information with<br />
the Joint Terrorism Task Force (JTTF).<br />
Investigation determined the driver of<br />
their vehicle was a co-conspirator in a 15year<br />
scheme to fi nance terrorist activities<br />
in Israel for Hamas, a Palestinian terrorist<br />
organization. 7 Although Hamas has<br />
never conducted an attack in the United<br />
States, we have been a major source<br />
of funds for them. However, as the<br />
U.S. Government increasingly restricts<br />
fundraising, groups like Hamas have less<br />
and less reason not to conduct an attack.<br />
During the past several years,<br />
automatic weapons attacks have replaced<br />
bombings as the number one weapon<br />
of choice for international terrorist<br />
organizations. 8 If offi cers receive reports<br />
of thefts or unusual sales of weapons or<br />
ammunition, these should be shared with<br />
the JTTF. Th e same is true for reports of<br />
automatic weapons fi ring, theft or sale of<br />
body armor to non law enforcement, as<br />
well as any unusual paramilitary training.<br />
An alert offi cer in Skamania County,<br />
Washington, investigated reports of<br />
automatic gunfi re shortly after 9/11 and<br />
reported his fi ndings to the JTTF. Th is<br />
resulted in convictions of the “Portland<br />
Seven,” a group of American citizens who<br />
were preparing to go to Afghanistan and<br />
wage war on American troops. 9<br />
Since terrorists still use explosives<br />
to carry out attacks, any theft, sale or<br />
storage of explosive components should<br />
be shared with the JTTF. Vehicles are<br />
used to transport explosives, and reports<br />
about the modifi cation of cars, trucks or<br />
limousines should be shared. Th e same<br />
is true if information is received about<br />
individuals undergoing emergency room<br />
treatment for missing fi ngers, hands or<br />
chemical burns. Th ese may be indicators<br />
of terrorist bomb-making activity.<br />
In the fall of 2005, a University<br />
of Oklahoma student detonated a<br />
homemade bomb outside the school’s<br />
football stadium during a game attended<br />
by more than 80,000 people. It is not<br />
conclusively known whether the bomb<br />
detonated prematurely, whether he<br />
intended to take it into the stadium, or<br />
whether it was his intention to wait until<br />
the game was over and kill passersby. Th e<br />
investigation turned up no connection<br />
to terrorism, yet this young man had<br />
attempted to buy ammonium nitrate<br />
several days before he detonated his<br />
bomb. Th e bomb he made with easily<br />
obtainable items was similar to those used<br />
in the 2005 London subway attacks. 10<br />
Technology has made the creation of<br />
identifi cation documents easier and more<br />
diffi cult to detect. Legal documentation<br />
is often easy to acquire through illegal<br />
means, but others counterfeit driver’s<br />
licenses, vehicle registrations and license<br />
plates, identifi cation cards, social security<br />
cards, as well as immigration documents,<br />
visas and passports. Each document<br />
should be questioned and offi cers should<br />
look for alterations. Compare the<br />
individual with the photograph on the<br />
document presented. Ask where the<br />
document was obtained, and inquire as<br />
to citizenship and place of birth. If the<br />
offi cer is unable to ascertain whether the<br />
documents are legitimate, have an expert<br />
verify them.<br />
Offi cers may come upon evidence<br />
that drug proceeds support terrorist<br />
organizations. Th e Madrid train attacks<br />
in 2004 may have been in part fi nanced<br />
through the sale of drugs. 11 In South<br />
America, there is a close relationship<br />
between drug traffi ckers and terrorist<br />
organizations. 12 Because terrorists<br />
must fi nance their operations and most<br />
governments are making concerted eff orts<br />
to seize assets and shut down fund-raising<br />
mechanisms, “routine” criminal activity is<br />
one way they can earn money.<br />
State sponsors and nongovernmental<br />
organizations have historically funded<br />
terrorist operations. As governments<br />
have clamped down on these activities,<br />
terrorists have turned to various criminal<br />
enterprises. Th ese include credit- and<br />
telephone-card fraud, traffi cking in stolen<br />
property, counterfeiting, bank- and<br />
mail-fraud schemes, as well as selling<br />
counterfeit designer clothing, high end<br />
beauty products, CDs and DVDs.<br />
In the late 1990s, a deputy sheriff in<br />
North Carolina was working security at<br />
a cigarette mart. He noted that some<br />
men were regularly purchasing large<br />
quantities of cigarettes. Engaging them<br />
in conversation, he learned they were<br />
taking them to Michigan where taxes<br />
were ten times those of North Carolina.<br />
26 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 27
He initially reported this information<br />
to the Bureau of Alcohol, Tobacco and<br />
Firearms (ATF). Investigation soon<br />
determined these men were fund raisers<br />
for Hezbollah, an Iranian-backed terrorist<br />
organization, which, before September<br />
11, 2001, had killed more Americans<br />
than any other international terrorist<br />
organization. Th e FBI and ATF worked<br />
together and brought down this group,<br />
a major Hezbollah cell, which had<br />
transferred $8 million to the Middle<br />
East. Th e observations of one alert police<br />
offi cer had disrupted a major terrorist<br />
fund-raising cell. 13<br />
In addition to cigarette smuggling<br />
schemes, law enforcement offi cers should<br />
be alert for baby-formula and grocerystore<br />
coupon fraud, as well as individuals<br />
having connections to foreign charities.<br />
Offi cers should also be aware of<br />
individuals having multiple forms<br />
of identifi cation during car stops,<br />
contacts and searches. In addition, they<br />
should be alert for individuals having<br />
law enforcement or terrorist training<br />
manuals, radical literature, maps which<br />
have possible targets highlighted, as well<br />
as unusual photographs or decals and<br />
bumper stickers.<br />
When interacting with an individual,<br />
the offi cer is the expert on the scene.<br />
Based on his or her experience, the<br />
offi cial may see things that appear to be<br />
unusual. If something appears unusual<br />
to the expert on the scene, it probably<br />
is and should be shared with the JTTF if<br />
it appears to be terrorist related.<br />
We have not seen suicide bombing<br />
in the United States, however, Pakistan<br />
had only one suicide bombing prior to<br />
2007, yet had 59 attacks during that year<br />
alone. 14 Many believe it is only a matter<br />
of time before a suicide bomber strikes<br />
in our country. Th e Israelis have studied<br />
suicide bombers in depth and include<br />
the following as telltale signs of a possible<br />
suicide bomber. Th ey:<br />
• Conduct boundary probing (how<br />
close can they get to the target?)<br />
• Wear heavy clothing to hide<br />
explosives regardless of the season<br />
• Display a robotic gait or nervously<br />
look around<br />
• Show signs of tunnel vision and are<br />
not responsive to commands<br />
• Give the appearance of being<br />
drugged<br />
• Wear too much cologne or have<br />
other unusual smells<br />
• Carry a large backpack<br />
• Have wires protruding from sleeves<br />
or hands in pockets (for detonator)<br />
• Have a fresh shave or make other<br />
15 16<br />
attempts to “blend in.”<br />
While these indicators may be<br />
appropriate to Israel, other suspicious<br />
behavior outlined in this article may be<br />
more applicable to a suicide bomber in<br />
the United States. In 2004, the Capitol<br />
police in Washington believed if suicide<br />
bombers struck America, they would<br />
target the U.S. Capitol. Th at agency<br />
has documented a plan to deal with<br />
suicide attackers. Police offi cers receive<br />
comprehensive training on when and<br />
how to use deadly force. However, few<br />
are trained to deal with a suicide bomber.<br />
Every law enforcement department is<br />
encouraged to develop a plan to deal with<br />
a suicide attacker. Th is plan should be<br />
written and practiced, and every offi cer<br />
should be aware of its contents.<br />
Almost every terrorist attack in<br />
history was presaged by indicators which<br />
should have been recognized and acted<br />
upon by law enforcement. Ahmed<br />
Ressam, the “Millennium Bomber,” was<br />
arrested in December 1999 by a U.S.<br />
Customs inspector. Ressam’s activities<br />
had been noticed by law enforcement<br />
and intelligence offi cials in two countries<br />
before he ever arrived at the U.S. border.<br />
An Algerian, he arrived in Canada via<br />
France in February 1994, and although<br />
he possessed false documentation, he<br />
was welcomed and provided with social<br />
assistance. Ressam failed to appear for<br />
his immigration hearing and became<br />
involved in criminal activity.<br />
A French magistrate, investigating<br />
the al Qaeda threat in France, told the<br />
Canadians about Ressam. Although the<br />
Canadians monitored Ressam and his<br />
colleagues’ telephone conversations, they<br />
did not consider them a threat. Th ey<br />
learned that Ressam, who had acquired<br />
another identity, was on his way to<br />
“camp” in Afghanistan. He spent most<br />
of 1998 there learning to make bombs.<br />
Ressam returned to Canada via Los<br />
Angeles, and despite spending nearly a<br />
year in Afghanistan, and having been the<br />
focus of Canadian and French authorities,<br />
he was on no one’s radar. He drove to<br />
western Canada and began assembling<br />
his bombs at a motel. While there for<br />
several weeks, no one noticed that he left<br />
windows open, did not allow maid service<br />
into his room, and had strange odors<br />
emanating from the room. It took the<br />
last line of defense, an American customs<br />
inspector, to arrest him because numerous<br />
Almost every<br />
terrorist attack<br />
in history was<br />
presaged by<br />
indicators which<br />
should have been<br />
recognized and<br />
acted upon by<br />
law enforcement.<br />
Circle 241 on Reader Service Card<br />
28 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 29
precursors were ignored. 17 She prevented<br />
a signifi cant attack at the Los Angeles<br />
International Airport.<br />
Th e events of September 11th have<br />
been widely detailed. Indicators leading<br />
to this attack began as early as the murder<br />
of Meir Kahane by El Sayyid Nosair in<br />
1990. During their investigation, the<br />
New York City Police Department and<br />
the FBI recovered 47 boxes of documents,<br />
mostly written in Arabic. Th ey were not<br />
translated or analyzed until after the 1993<br />
World Trade Center attack. Some believe<br />
examining them could have prevented<br />
this attack. Ramzi Yousef, a Pakistani,<br />
had entered the United States a few<br />
months before with false documentation.<br />
Like Ressam in Canada, he had been<br />
allowed into the country. Working with a<br />
local cell, Yousef designed the plan which<br />
he hoped would topple both towers,<br />
killing 50,000 people. Following the<br />
attacks he fl ed to Pakistan. 18<br />
In December 1994 terrorists in Algeria<br />
hijacked an Air France plane hoping to<br />
fl y it into the center of Paris (one target<br />
No one can<br />
afford to lose<br />
focus and believe<br />
the prevention<br />
of terrorism will<br />
be handled by<br />
someone else.<br />
in the al Qaeda manual is the Eiff el<br />
Tower). French commandos were able to<br />
kill the hijackers prior to their carrying<br />
out the plan. 19<br />
In January 1995 authorities in the<br />
Philippines encountered Yousef. He<br />
was plotting to destroy 11 airliners<br />
over the Pacifi c using an innovative<br />
liquid explosive. Yousef’s partner later<br />
confessed to wanting to fl y a plane into<br />
CIA Headquarters, among other targets.<br />
Yousef escaped but was arrested two<br />
months later in Pakistan. One of the<br />
plotters in the Filipino plan was Yousef’s<br />
uncle Khalid Sheikh Mohammed, the<br />
mastermind of 9/11. 20<br />
In March 1995 the fi rst of the al<br />
Qaeda manuals was found, which<br />
outlined the targets of the organization.<br />
Other copies were also found: in the<br />
United Kingdom in 2000, and then in<br />
Afghanistan in 2001. Th e manual stated<br />
that among their targets were skyscrapers,<br />
but the information contained in it was<br />
not widely disseminated.<br />
In January 2000 intelligence agencies,<br />
including the CIA, surveilled a meeting<br />
in Malaysia of senior al Qaeda offi cials.<br />
Because information was not shared with<br />
American law enforcement, two of the<br />
men freely traveled to Los Angeles and<br />
San Diego, where they lived, attended<br />
local mosques and took fl ight lessons.<br />
On 9/11, they would be among the 19<br />
hijackers. 21<br />
In July 2001 an FBI agent in Arizona<br />
documented that Middle Eastern men<br />
were taking fl ying lessons and that he<br />
believed they should be investigated. 22<br />
For fear of being accused of racial<br />
profi ling, nothing was done, despite the<br />
information contained in the al Qaeda<br />
manual, the documents seized in New<br />
York, and the events aboard the Air<br />
France fl ight and in the Philippines. A<br />
month later, another pilot, Zacharias<br />
Moussaoui, attracted attention in a fl ight<br />
school in Minnesota and was arrested on<br />
immigration charges. Each of the above<br />
circumstances, taken individually, meant<br />
little. Collectively the entire plot could<br />
be seen. Th e 9/11 Commission report<br />
detailed the failures of American law<br />
enforcement and intelligence agencies<br />
to share information which may have<br />
prevented the attacks.<br />
Since the breakup of the Soviet Union,<br />
Chechens have tried to establish an<br />
independent Muslim state in southern<br />
Russia. In the early 1990s, Chechen<br />
terrorists invaded a school and later<br />
hijacked a school bus. Teachers and<br />
students in both cases were held for<br />
ransom. 23 Chechen terrorists also<br />
assassinated and kidnapped government<br />
offi cials, military leaders and soldiers.<br />
On August 18, 2004, the Russian<br />
security service reported that an attack by<br />
terrorists was imminent in North Ossetia<br />
(near Chechnya). On August 28 there<br />
were specifi c reports that terrorists had<br />
infi ltrated the North Ossetian town of<br />
Beslan. In the week before the raid, three<br />
terrorist attacks, including two airline<br />
bombings, had killed 100 people. At<br />
5:00 am on September 1, an informant<br />
in Chechnya advised authorities that<br />
an attack would take place at one of the<br />
four schools in Beslan that morning.<br />
Although the warning was target- and<br />
time-specifi c, as school opened at<br />
9:30 a.m., 32 armed men and women<br />
overtook the lone, unarmed police offi cer<br />
assigned to guard the facility. Th e offi cer<br />
had no radio or cell phone. Th e siege<br />
ended on September 3 with the deaths<br />
of 31 terrorists and approximately 332<br />
others, including 186 children. 24<br />
Each of these attacks may have been<br />
prevented if there had been proper<br />
analysis and sharing of information.<br />
Ressam should have been stopped before<br />
he reached the Washington-Canadian<br />
border. Two of the 9/11 hijackers<br />
should never have been allowed to live<br />
unimpeded in the United States for two<br />
years. Th e Phoenix memo should have<br />
been perceived as an eff ort to conduct<br />
good solid investigation, not one for<br />
profi ling. If authorities in Russia had<br />
taken the information they received<br />
in August and early September more<br />
seriously, they may have prevented the<br />
terrorists from taking over the school in<br />
Beslan.<br />
Recognition of events before they<br />
occur can prevent acts of terrorism. Just<br />
seeing them will not be enough, however.<br />
Information has to be collected, analyzed<br />
and shared with the appropriate entity,<br />
the JTTF. Th ere are now more than 100<br />
of them in the United States. Th e JTTFs<br />
must also share information with their<br />
local, state and tribal counterparts. It is a<br />
two-way street.<br />
Th ere have been many successes in<br />
America and around the world since<br />
the events of September 11, 2001. Law<br />
enforcement and intelligence agencies<br />
have disrupted dozens of planned attacks,<br />
and many arrests have been made.<br />
However, disruptions get far less attention<br />
than successful attacks, and it would<br />
be incorrect to assume the problem<br />
of terrorism has gone away. No one<br />
can aff ord to lose focus and believe the<br />
prevention of terrorism will be handled<br />
by someone else.<br />
Terrorism aff ects us all, regardless of<br />
whether we live in a major metropolitan<br />
area or a rural state. It is in our national<br />
interest to prevent the next act of<br />
terrorism, before anyone else loses his<br />
or her life, property is destroyed, and<br />
all of us are fi scally impacted. It can be<br />
done if the 800,000 federal, state, local<br />
and tribal law enforcement offi cers see<br />
themselves as a force multiplier and<br />
watch for indicators. In addition to the<br />
police, an informed public can also report<br />
suspicious activities. Once observed,<br />
Buildings are targeted as an opportunity for infl icting mass casualties. Photo: SSI<br />
information should be shared with the<br />
JTTF, as well as with each other.<br />
Law enforcement and intelligence<br />
agencies around the globe should examine<br />
their relationships with each other. Every<br />
agency should put offi cers in a position to<br />
recognize the indicators of terrorism, then<br />
collect, analyze and share information<br />
to keep each of our communities safe.<br />
Federal, state, local and tribal offi cers, the<br />
great force multiplier, are our fi rst line of<br />
defense against future acts of terrorism.<br />
Each can make a diff erence. •<br />
NOTES:<br />
1 Jeff rey J. Martel, “America’s Last<br />
Line of Defense,” interview with Chief of<br />
Police Richard Jewett, 2006.<br />
2 Oliver B. Revell, “International<br />
Terrorism in the United States,” Th e<br />
Police Chief magazine, March 1989.<br />
3 National Counterterrorism<br />
Center reports retrieved 3/29/08 from<br />
nctc.gov.<br />
4 Robert S. Mueller, FBI Director,<br />
testimony before the Senate Select<br />
Committee on Intelligence, January 11,<br />
2007.<br />
5 Hamza Hendawi, “Manual<br />
Teaches How to Kill Th ousands,” Th e<br />
Milwaukee Journal Sentinel, Sentinel February 2, 2002.<br />
6 Al Qaeda Manual, Manual Author<br />
unknown.<br />
7 Gretchen Parker, “Hamas<br />
Suspect Arrested After Wife Videotapes<br />
Chesapeake Bay Bridge,” Th e Milwaukee<br />
Journal Sentinel, Sentinel August 25, 2004.<br />
8 National Counterterrorism Center<br />
“Reports on Incidents of Terrorism 2005.”<br />
9 Terence P. Jeff rey, “<strong>Terrorist</strong><br />
Blamed His Failure on Bush,” February<br />
2006, retrieved March 23, 2007. from<br />
http://www.discoverthenetworks.org/<br />
Articles/<strong>Terrorist</strong>%20Blamed%20His%20<br />
Failure%20on%20Bush.html<br />
10 Nolan Clay and Randy Ellis, “No<br />
Terror Link Seen So Far in Blast; OU<br />
Tightens Security After Death Outside<br />
Stadium,” Th e Daily Oklahoman, October<br />
5, 2005.<br />
11 Mar Roman Associated<br />
Press, “Madrid Train Bombing Trial<br />
Begins,” February 16, 2007, retrieved<br />
March 23, 2007 from http://www.<br />
suburbanchicagonews.com/couriernews/<br />
news/260019.3_1_EL16_A5SPAIN_<br />
S1.article<br />
12 Mark S. Steinitz, “Th e Terrorism<br />
and Drug Connection in Latin America’s<br />
Andean Region,” Policy Papers on the<br />
Americas, Volume XIII, Study 5, July 2002.<br />
13 Author interview with Deputy<br />
30 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 31
Sheriff Robert Fromme, Iredell County<br />
Sheriff ’s Department, North Carolina,<br />
December 11, 2003.<br />
14 Khuram Iqbal, “Drivers of<br />
Suicide Terrorism in Pakistan,” RSIS<br />
Commentaries, February 27, 2008.<br />
15 International Association of Chiefs<br />
of Police Training Key #581, retrieved<br />
on March 23, 2007, from http://www.<br />
theiacp.org/pubinfo/IACP581SuicideBo<br />
mbersPart1.pdf<br />
16 Neil Livingstone, “Th e Detection<br />
and Prevention of Suicide Bombings,”<br />
Total Integrated Preparedness Solutions,<br />
Volume I, Number 10, May 18, 2005.<br />
17 Hal Bernton, Mike Carter, David<br />
Heath and James Neff , “Th e <strong>Terrorist</strong><br />
Within: Th e Story Behind One Man’s<br />
Holy War Against America,” Th e Seattle<br />
Times, June 23-July 7, 2002.<br />
18 Peter Lance, “Triple Cross,” (New<br />
York, Regan , 2006), page 58.<br />
19 Peter Lance, “Triple Cross,” (New<br />
York, Regan, 2006), page 188.<br />
20 Th e 9/11 Commission Report, Report July<br />
2004, page 491.<br />
21 Th e 9/11 Commission Report, Report July<br />
2004, page 182.<br />
22 FBI FD-302 of SA Kenneth<br />
Williams, July 10, 2001, retrieved<br />
March 23, 2007 from http://www.<br />
thememoryhole.org/911/phoenix-memo/<br />
23 Paul Murphy, “Th e Wolves of<br />
Islam,” (Dulles, Virginia, Brassey, 2004)<br />
pages 242-243.<br />
24 John B. Dunlop, “Beslan, Russia’s<br />
9/11?” Th e American Committee for<br />
Peace in Chechnya and the Jamestown<br />
Foundation, October 2005.<br />
ABOUT THE AUTHOR<br />
Richard A. Marquise is a Senior<br />
Research Associate with the Institute for<br />
Intergovernmental Research and teaches<br />
in the State and Local Antiterrorism<br />
Training (SLATT) program. He also<br />
teaches for the U.S. Department of State<br />
in the Anti Terrorism Assistance Program<br />
and has assisted the countries of Pakistan,<br />
Kenya, Serbia and the Philippines in<br />
creating and training their terrorist task<br />
forces. Mr. Marquise is a retired FBI agent<br />
who has had extensive counterterrorism<br />
experience. He led the American task force<br />
that investigated the bombing of Pan Am<br />
Flight 103 over Scotland and is the author<br />
of Scotbom: Evidence and the Lockerbie<br />
Investigation, Algora, 2006.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
32 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 207 on Reader Service Card<br />
The Counter <strong>Terrorist</strong> The Counter ~ September/October <strong>Terrorist</strong> 2008 33<br />
<br />
<br />
<br />
<br />
Circle 247 on Reader Service Card
How <strong>Terrorist</strong>s and Criminals<br />
EXPLOIT<br />
E-COMMERCE<br />
To Store and Move Money<br />
By Jennifer L. Hesterman<br />
All good investigators know the value of the money trail<br />
to an investigation. Whether tracing a petty fund in a<br />
continuing criminal enterprise or millions of dollars moved by<br />
an international terrorist group, an investigator can learn a<br />
great deal about the unique story of an operation by paying<br />
attention to the origin, path, and destination of the money.<br />
Often, this story yields evidence that allows infi ltration of the<br />
group, identifi cation of its key players, and ultimately, the<br />
eradication of the organization or one of its cells.<br />
Photo: Scott Morrison<br />
A lthough improved technology<br />
has greatly improved the<br />
Alife<br />
quality and ease of daily<br />
life in recent years, it is not without its<br />
problems. One downside to technological<br />
advances is that terrorists and criminals<br />
are users, just like law-abiding citizens.<br />
With this new technology comes<br />
innovative means to move, store, and<br />
liquidate funds, often in ways that<br />
are not transparent or detectable.<br />
Unfortunately, as corporations continue<br />
to rush cutting-edge products to market,<br />
technology is sometimes fi elded without<br />
complementary safeguards to prevent<br />
exploitation by individuals who are<br />
engaged in illegal activities. Th e emerging<br />
nexus between telecommunications<br />
technology and illicit fi nancial<br />
transactions is one such area of concern.<br />
A lthough improved technology<br />
quality<br />
NEW PAYMENT METHODS<br />
Th e Financial Action Task Force<br />
(FATF) is an intergovernmental body<br />
that works internationally to combat<br />
money laundering and terrorist fi nancing<br />
(ML/TF). In recent years, the FATF<br />
has become increasingly concerned over<br />
so-called “new payment methods,” or<br />
NPMs. 1 NPMs, also referred to in the<br />
fi nance industry as “e-money,” “digital<br />
cash,” or “e-cash,” facilitate the transfer<br />
of value between individuals and<br />
organizations by way of the Internet,<br />
cellular phones, or other electronic<br />
methods.<br />
It is important to note that e-cash was<br />
intended to be analogous to physical cash<br />
by design; thus, it off ers unconditional<br />
anonymity and is impossible to trace<br />
because payments are not linked to a<br />
particular customer account. Other<br />
benefi ts associated with the use of e-cash<br />
include rapid transaction times and the<br />
ability to accumulate value. Obviously,<br />
these characteristics make NPMs<br />
appealing to those engaged in nefarious<br />
activity.<br />
Common examples of NPMs include<br />
the following:<br />
• Internet payment services.<br />
Th rough privately held companies labeled<br />
by the FATF as “nonbanks,” Internet<br />
payment services allow users to pay bills<br />
online, make purchases at participating<br />
websites, buy and sell items from auction<br />
sites, and contribute to charities. Niche<br />
companies have also emerged that serve<br />
markets not engaged by larger providers,<br />
such as Internet gambling sites. Setting<br />
up an account with a nonbank is simple<br />
and requires little personal data, most of<br />
which can easily be fabricated. Money<br />
may be accumulated in a nonbank<br />
account; then, when the account’s owner<br />
is ready, the balance can be liquidated<br />
in several ways, including through<br />
untraceable debit cards that can be used<br />
to withdraw cash from ATMs worldwide.<br />
Notably, a few nonbanks operate<br />
globally, and their transactions can cross<br />
borders. Such companies need only<br />
follow licensing and regulatory guidance<br />
in the countries in which they are based.<br />
Th erefore, the regulations that apply to<br />
The ease of<br />
obtaining and<br />
using open system<br />
cards opens the<br />
door for “smurfi ng,”<br />
a money-laundering<br />
activity in which<br />
criminals spread<br />
a great deal of<br />
cash across many<br />
sources, concealed<br />
from regulators and<br />
law enforcement.<br />
34 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 35
individual nonbanks vary and directly<br />
correlate to the strength of the rule of law<br />
in each nonbank’s host nation, as well as<br />
whether ML/TF is an area of concern or<br />
focus in that country. Of further concern<br />
are off shore nonbanks, which off er even<br />
more anonymity to customers and fewer<br />
restrictions on transaction limits.<br />
• Stored value cards. Th is popular<br />
category of NPM includes phone, retail,<br />
and credit cards that can be purchased<br />
with cash at many grocery and drug<br />
stores. Th e owners of these cards remain<br />
anonymous, an unlimited number of<br />
cards may be purchased and held by<br />
one person, and any subsequent use is<br />
virtually untraceable. Stored value cards<br />
can be divided into two types:<br />
• Limited-purpose or closedsystem<br />
cards. Th is category consists of<br />
merchant-issued gift cards and calling<br />
cards. Such cards can only be used<br />
for specifi c purposes, may have an<br />
expiration date, and usually cannot be<br />
reloaded. However, there is still a ML/<br />
TF risk associated with these cards.<br />
In particular, an unlimited amount of<br />
cards can be purchased anonymously<br />
with cash and then sold through online<br />
auction sites, with the value transferred<br />
to a nonbank for subsequent<br />
liquidation through an untraceable<br />
ATM card.<br />
• Multipurpose or open-system<br />
cards. Of much greater ML/TF risk<br />
are multipurpose or open-system<br />
stored value cards, which bear the<br />
name of a major credit card company<br />
and may also be purchased with cash<br />
in unlimited quantities. Value can be<br />
added to these cards through an online<br />
nonbank or with cash at a participating<br />
retailer. Th en, when the cardholder<br />
is ready to cash out, money can be<br />
withdrawn from most ATMs, or these<br />
cards can be sold online with payments<br />
being laundered through the nonbank.<br />
As long as the amount doesn’t exceed<br />
the $10,000-per-day threshold that<br />
necessitates generation of a currency<br />
transaction report (CTR), such<br />
transactions will occur off the radar<br />
screen, with no documentation.<br />
Th e ease of obtaining and using<br />
open system cards opens the door<br />
for “smurfi ng,” a money-laundering<br />
activity in which criminals spread a<br />
great deal of cash across many sources,<br />
concealed from regulators and law<br />
enforcement. Indeed, the multipurpose<br />
card industry is booming; in fact, the<br />
National Drug Intelligence Center’s<br />
2006 threat assessment indicates<br />
there are already more than 7 million<br />
MasterCard and Visa prepaid debit<br />
cards in circulation. 2<br />
• E-purse. Unlike a stored value<br />
card, which has a magnetic strip, an<br />
e-purse stores value directly on a card<br />
itself using a microchip. Currently,<br />
the most popular e-purses are the socalled<br />
“smart cards” used for public<br />
transportation, tollbooths, parking<br />
garages, and vending machines. Th ese<br />
cards can be reloaded with cash at<br />
specialized vending machines and are<br />
also sold through online auctions.<br />
In addition, many cell phones will<br />
soon be transformed into e-purses<br />
through new technology that imbeds<br />
debit or credit card information into<br />
the phones’ SIM cards. Th is method,<br />
dubbed “mobile ticketing,” will<br />
allow users to simply tap their phone<br />
against a terminal to complete a sales<br />
transaction. 3<br />
• Mobile payments. Th e State<br />
Department recently issued its latest<br />
International Narcotics Control Strategy<br />
Report, 4 which includes a new section<br />
entitled “Mobile Payments—A Growing<br />
Th reat.” 5 Th is document sounds the<br />
alarm on a new type of remittance<br />
method with an extremely high ML/TF<br />
risk.<br />
Mobile payments, also known as “mpayments,”<br />
“proximity payments,” or<br />
“micropayments,” are point-of-sale cash<br />
transactions made through a mobile<br />
device such as cell phone or personal<br />
data assistant. Th e sender takes the cash<br />
to a remittance center, which charges<br />
a modest service fee. Th e center then<br />
“sends” the amount to the recipient’s<br />
mobile account, also known as an ewallet.<br />
Th e recipient gets a text message<br />
on his or her mobile device indicating<br />
that the sum has been placed in the<br />
account. Th e cash can then be collected<br />
at any participating remittance center,<br />
retail store, or, if business evolves as<br />
predicted, fast-food outlet. Although the<br />
entire transaction takes mere minutes,<br />
the ML/TF implications are tremendous<br />
and inevitable.<br />
One of the world’s leading<br />
information technology research and<br />
advisory companies, Gartner, Inc.,<br />
predicts that mobile payment services are<br />
just beginning to take hold, with today’s<br />
projected 32.9 million users worldwide<br />
swelling to 103.9 million users by 2011. 6<br />
Th ese services are heavily marketed to<br />
segments of the world population that<br />
are unbanked or underbanked due to the<br />
cost of maintaining accounts or a lack<br />
of access to banking facilities. Consider<br />
the fact that over 3 billion people in the<br />
world have mobile phones, but only 1<br />
billion people have bank accounts; 7 given<br />
these statistics, the market for mobile<br />
payment services is vast.<br />
Th e recent intersection of two popular<br />
NPMs has also led to emerging ML/TF<br />
concerns. Specifi cally, a partnership<br />
between a major Internet payment service<br />
and a global cellular phone company now<br />
allows the instantaneous transfer of funds<br />
directly between nonbank accounts.<br />
Use of a “throw-away” cell phone,<br />
anonymously purchased with cash,<br />
will make any of type of m-payment<br />
transaction even more obscure and<br />
diffi cult to trace.<br />
• Digital precious metals. Finally,<br />
another NPM worth watching is the<br />
emerging practice of using digital<br />
precious metals as a way to store and<br />
move large amounts of currency.<br />
Th rough this service, users create an<br />
account and then secure cash deposits<br />
against gold, silver, and platinum. Th e<br />
major companies engaging in this NPM<br />
actually hold vaulted precious metal in<br />
the name of the investor, employing<br />
major companies such as Brinks for<br />
security. Gold is the most popular<br />
product on the market, with over $1<br />
billion worth of transfers through the<br />
e-gold Ltd., corporation in 2007 alone. 8<br />
Notably, Brinks stores over 48,000 fi ne<br />
troy ounces of gold purchased online in<br />
their vaults located around the world. 9<br />
Similarly, e-dinar, an off shoot and<br />
former partner of e-gold, provides a<br />
unique, niche service. Since 1992, the<br />
company has minted its own gold Islamic<br />
dinar to provide its customers a means<br />
of exchange in line with the religious<br />
specifi cations found in the Koran.<br />
Th erefore, the Islamic dinar retains a<br />
unique fungibility and can be directly<br />
used to pay zakat and dowry as required<br />
by Islamic law. 10<br />
Th e FATF reports that some<br />
companies in this international business<br />
allow investors to remain anonymous. 11<br />
Indeed, a quick Internet query yields<br />
Similarly, e-dinar, an<br />
offshoot and former<br />
partner of e-gold,<br />
provides a unique, niche<br />
service. Since 1992, the<br />
company has minted its<br />
own gold Islamic dinar<br />
to provide its customers<br />
a means of exchange<br />
in line with the religious<br />
specifi cations found in<br />
the Koran.<br />
36 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 37
several sites that indicate metals may be<br />
purchased using a nonbank account and<br />
possibly even with untraceable stored<br />
value credit cards.<br />
CRIMINALS AND<br />
TERRORISTS ARE<br />
TURNING TO NPMS<br />
Evidence shows that those individuals<br />
and groups engaged in criminal or<br />
terrorist-related activities are already<br />
turning to NPMs as a way to move and<br />
store money. In fact, the number of<br />
suspicious wire transfers in previously<br />
heavy markets is down, perhaps as a<br />
result of an increase in the use of NPMs<br />
to move money.<br />
• Ample evidence of exploitation.<br />
Several high-profi le cases confi rm<br />
that NPMs are attractive to criminals<br />
and terrorists. Examples include the<br />
following:<br />
• In 2008, Indonesian police<br />
reported that radical Islamic terrorists<br />
were observed selling phone cards,<br />
generating upwards of $500 per day to<br />
fund operations. 12<br />
• A Mexican criminal caught at the<br />
U.S. border in 2005 was using stolen<br />
credit cards to transfer value to prepaid<br />
cards. 13<br />
• In 2001, a suspicious activity<br />
report (SAR) fi led in the United<br />
States detailed the acquisition of more<br />
than 300 prepaid cards by a single<br />
individual who used them to transfer<br />
almost $2 million to Colombia. 14<br />
• In 2004, German tax investigators<br />
discovered a case of ML through<br />
prepaid cards. Two participants of a<br />
criminal fraud/embezzlement scheme<br />
had transferred parts of their shares<br />
of the criminal proceeds onto several<br />
prepaid cards. In this case, more<br />
than €350,000 were hidden and<br />
laundered. 15<br />
• Members of the criminal<br />
networking site “Shadowcrew” used egold<br />
to send and receive payments for<br />
illicit goods and services. 16<br />
• Cards as a form of payment for illicit<br />
activity. In lieu of traceable currency,<br />
stored value cards are becoming the<br />
preferred form of payment for illegal<br />
services rendered. Some examples in<br />
which these cards were used are as<br />
follows:<br />
• A joint Immigration and Customs<br />
Enforcement/Internal Revenue Service<br />
investigation uncovered a relationship<br />
between a U.S. criminal organization<br />
and a Mexican co-conspirator who<br />
was creating fake credit cards. Th e coconspirator<br />
was paid for his assistance<br />
with retail gift cards. He then sold the<br />
gift cards and moved the cash back<br />
across the U.S. border to buy phone<br />
cards, which were then smuggled into<br />
Mexico in a separate operation. 17<br />
• Th e U.S. Drug Enforcement<br />
Agency uncovered an operation in<br />
which drug dealers were loading cash<br />
onto prepaid cards and then sending<br />
the cards to suppliers outside of the<br />
country, who in turn liquidated the<br />
funds using ATMs. 18<br />
• In 2005, U.S. Immigration<br />
and Customs Enforcement offi cials<br />
initiated an investigation into a state<br />
employee in Ohio who was selling<br />
fraudulent drivers’ licenses and<br />
identifi cation cards in exchange for<br />
prepaid telephone cards. 19<br />
• Stored value cards are a smuggling<br />
risk. Th e smuggling of bulk currency out<br />
of the United States is on the rise, and<br />
according to offi cials, it is “the largest and<br />
most signifi cant drug money laundering<br />
threat facing law enforcement.” 20 Many<br />
experts believe that prepaid stored value<br />
cards are now an attractive alternative<br />
to bulk cash smuggling. 21 Cards are not<br />
subject to the same rules as cash at the<br />
border. For instance, cards cannot be<br />
seized if the amount carried exceeds the<br />
$10,000 threshold and is not properly<br />
declared.<br />
Cards can easily be smuggled without<br />
detection onboard a commercial aircraft,<br />
train, bus, or ship. Th ey are lighter<br />
in weight and more compact than a<br />
bundle of equivalent-value paper bills.<br />
Th ese physical properties, along with<br />
easy, anonymous acquisition and lack of<br />
regulatory guidance, make cards the ideal<br />
smuggling mechanism.<br />
THE BATTLE AHEAD<br />
Th e potential exploitation of NPMs<br />
by criminals and terrorists is a global<br />
problem; thus, it must be addressed<br />
with a comprehensive set of regulatory<br />
guidelines that are adhered to by all<br />
parties. Until this massive undertaking<br />
is realized, self-regulation within the<br />
industry would be a positive step<br />
forward. Most importantly, there must<br />
be ongoing dialogue between counterterrorism<br />
experts who research emerging<br />
ML/TF risks and operators on the front<br />
lines, as each group has information the<br />
other needs to ensure a united, relevant,<br />
and uncompromising strategy in the War<br />
on Terror.<br />
Traditional money laundering makes<br />
“dirty” money “clean” after a crime<br />
has been committed; today, however,<br />
terrorists are increasingly laundering<br />
“clean” money by moving and storing<br />
it for the purposes of fi nancing training<br />
and future operations. No matter<br />
which type of laundering a criminal<br />
organization conducts, that group<br />
stands to benefi t from the nexus<br />
between telecommunications, for-profi t<br />
Circle 205 on Reader Service Card<br />
38 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008
HONOR your<br />
FINEST and<br />
BRAVEST with<br />
QUALITY<br />
www.libertyartworks.com<br />
888-411-7744<br />
Proudly Made in the U.S.A<br />
Circle 195 on Reader Service Card<br />
“nonbanks,” and the banking industry.<br />
Th e lack of physical evidence in mobile<br />
transactions, compounded by the ease<br />
of moving and storing money through<br />
various NPMs, should be of great<br />
concern to policy makers and the law<br />
enforcement community alike. •<br />
ABOUT THE AUTHOR<br />
Jennifer Hesterman is a retired Air Force<br />
colonel. She is currently a senior analyst for<br />
Th e MASY Group, a global intelligence and<br />
risk Management fi rm, as well as a professor<br />
at American Military University, teaching<br />
courses in homeland security and intelligence<br />
studies. Her book, Transnational Crime and<br />
the Criminal-<strong>Terrorist</strong> Nexus was published<br />
in 2005.<br />
NOTES:<br />
1 Financial Action Task Force,<br />
Report on New Payment Methods (Paris:<br />
Author, 2006), http://www.fatf-gafi .org/<br />
dataoecd/30/47/37627240.pdf (accessed July<br />
22, 2008).<br />
2 U.S. Department of Justice National<br />
Drug Intelligence Center, “Prepaid Stored<br />
Value Cards: A Potential Alternative to<br />
Traditional Money Laundering Methods”<br />
(Johnstown, PA: Author, 2006), http://www.<br />
usdoj.gov/ndic/pubs11/20777/20777p.pdf<br />
(accessed July 22, 2008).<br />
3 George Smith Alexander, “It’s Time<br />
to Shop through Cell Phones,” Rediff .com,<br />
December 22, 2003, http://in.rediff .com/<br />
money/2003/dec/22betterlife.htm?zcc=ar<br />
(accessed July 22, 2008).<br />
4 United States Department of State,<br />
International Narcotics Control Strategy Report<br />
(Washington, DC: Author, 2008), http://<br />
www.state.gov/p/inl/rls/nrcrpt/2008 (accessed<br />
July 22, 2008).<br />
5 United States Department of State,<br />
“Mobile Payments—A Growing Th reat,”<br />
in International Narcotics Control Strategy<br />
Report, vol. 2 (Washington, DC: Author,<br />
2008), http://www.state.gov/p/inl/rls/<br />
nrcrpt/2008/vol2/html/101346.htm (accessed<br />
www.gartner.com/it/page.jsp?id=652308<br />
(accessed July 22, 2008).<br />
7 “Mobile Phones to Send Money Home,”<br />
BBC News, February 12, 2007, http://news.<br />
bbc.co.uk/2/hi/business/6353797.stm<br />
(accessed July 22, 2008).<br />
8 e-gold Ltd., “e-gold Benefi ts,” http://<br />
www.e-gold.com/benefi ts.html (accessed July<br />
22, 2008).<br />
9 e-gold Ltd., “Gold Held by the e-gold<br />
Bullion Special Purpose Trust Stored at<br />
Brinks,” http://www.e-gold.com/examiner_<br />
blowup.asp?id=400&metal=1 (accessed July<br />
22, 2008).<br />
10 e-dinar, “What Is the Dinar?” http://<br />
www.e-dinar.com/html/1_2.html (accessed<br />
July 22, 2008).<br />
11 Financial Action Task Force, Report on<br />
New Payment Methods.<br />
12 Eva C. Komandjaja, “Indonesia:<br />
<strong>Terrorist</strong>s ‘Selling Phone Cards,’” Jakarta<br />
Post, Post November 22, 2005, http://www.<br />
asiamedia.ucla.edu/article-southeastasia.<br />
asp?parentid=34173 (accessed July 22, 2008).<br />
13 Chester Dawson, “Prepaid Cards:<br />
Candy for Criminals?” BusinessWeek.<br />
com, December 12, 2005, http://www.<br />
businessweek.com/magazine/content/05_50/<br />
b3963115.htm (accessed July 22, 2008).<br />
14 Financial Action Task Force, Report on<br />
New Payment Methods.<br />
15 Ibid. Ibid<br />
16 Brian Grow, “Gold Rush,” BusinessWeek.<br />
com, January 9, 2006, http://www.<br />
businessweek.com/magazine/content/06_02/<br />
b3966094.htm (accessed July 22, 2008).<br />
17 U.S. Immigration and Customs<br />
Enforcement, “Prepaid Cards an Emerging<br />
July 22, 2008).<br />
Th reat,” Cornerstone Report, Report December 2006,<br />
http://www.ice.gov/doclib/pi/cornerstone/pdf/<br />
CS1206.pdf (accessed July 22, 2008).<br />
18 http://www.ice.gov/doclib/pi/<br />
cornerstone/pdf/CS1206.pdf<br />
19 Financial Action Task Force, Report on<br />
New Payment Methods.<br />
20 U.S. Department of the Treasury, et<br />
al., 2007 National Money Laundering Strategy<br />
(Washington DC: Author, 2007), http://<br />
www.treas.gov/press/releases/docs/nmls.pdf<br />
(accessed July 22, 2008).<br />
6 Gartner, Inc., “Gartner Says Worldwide 21 U.S. Department of Justice National<br />
Mobile Payment Users to Total 33 Million in Drug Intelligence Center, “Prepaid Stored<br />
2008,” press release, April 21, 2008, http://<br />
Circle 197 on Reader Service Card<br />
40 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />
Value Cards.”<br />
Circle 209 on Reader Service Card<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008
BOOK REVIEW<br />
<strong>Terrorist</strong> Recognition Handbook,<br />
Second Edition by Malcolm Nance Reviewed by: Chris Graham<br />
A<br />
fter returning from my<br />
third tour of duty in Iraq,<br />
I generally avoided books on<br />
the ongoing war in that country. I was<br />
extremely unimpressed with the accuracy<br />
and perspective of the accounts that<br />
were provided by major news outlets<br />
and many publishers. It often<br />
seemed to me that the U.S. Central<br />
Command issued orders based on<br />
this fl awed reporting. Th e only thing<br />
I was certain of was that little of<br />
the “conventional wisdom” seemed<br />
consistent with what I observed<br />
on the ground in Iraq, living with<br />
Iraqis, conducting operations, and<br />
patrolling.<br />
Th is changed when I encountered<br />
Malcolm Nance’s book Th e <strong>Terrorist</strong>s<br />
of Iraq. To my surprise, this volume<br />
accurately captured my perspective<br />
on encounters with members of<br />
various terror groups in Iraq and<br />
provided additional information<br />
I was unaware of. Nance’s book<br />
refl ected lessons learned by “grunts”<br />
in the fi eld, even if this knowledge<br />
hadn’t always fi ltered uphill.<br />
Furthermore, Nance went into<br />
signifi cant detail, off ering little<br />
that I could dispute. Th us, when I<br />
learned that the second edition of<br />
Nance’s <strong>Terrorist</strong> Recognition Handbook:<br />
A Practitioner’s Manual for Predicting and<br />
Identifying <strong>Terrorist</strong> Activities (CRC Press/<br />
Taylor and Francis Group, 2008) had<br />
been released, I immediately requested a<br />
copy.<br />
Nance did not gain his insight by<br />
earning a PhD and watching CNN;<br />
rather, he is a 20-year veteran of<br />
intelligence operations in the Balkans,<br />
the Middle East (including Iraq and<br />
Afghanistan), and Africa. As a result, the<br />
<strong>Terrorist</strong> Recognition Handbook is truly<br />
a “practitioner’s manual,” as its subtitle<br />
indicates. Broken into six sections, this<br />
volume off ers a wealth of information for<br />
any security, law enforcement, military,<br />
or intelligence personnel involved in<br />
counter-terrorism and anti-terrorism<br />
operations.<br />
In section one of the <strong>Terrorist</strong><br />
Recognition Handbook, entitled “Know<br />
the <strong>Terrorist</strong>,” Nance begins with<br />
a discussion of critical awareness,<br />
including how to identify operatives,<br />
profi le suspects, and understand terrorist<br />
training, motivation, and beliefs. Th is<br />
section is essential in that it demystifi es<br />
the terrorist from a phantom-like enigma<br />
while simultaneously discouraging the<br />
equally detrimental belief that<br />
terrorists are incompetent human<br />
caricatures.<br />
Later portions of the text<br />
expand on many of the topics<br />
introduced in section one. For<br />
example, section two, “Identifying<br />
the <strong>Terrorist</strong> Group and Its<br />
Cells,” explores how these groups<br />
organize themselves, while section<br />
three, “Detection of Key <strong>Terrorist</strong><br />
Activities,” examines the typical<br />
signatures of terrorist actions.<br />
Discussion of the processes by<br />
which terrorists acquire safe<br />
houses, money, and transportation<br />
reveals the level of coordination<br />
necessary to support their eff orts.<br />
Also of particular note is Chapter<br />
12, which discusses equipment and<br />
other indicators that may reveal<br />
a group’s intended use of nuclear,<br />
biological, or chemical materials.<br />
In section four, “Predicting<br />
an Attack,” the activities of our<br />
opponents are further revealed. After<br />
noting that attacks are preceded by<br />
surveillance, Nance discusses the elements<br />
of surveillance in depth. Infi ltration<br />
techniques, as well as the decision-making<br />
processes used by terrorist groups, are<br />
analyzed. Perhaps the most useful portion<br />
of this section—indeed, of the book<br />
as a whole—is Chapter 17, “Point of<br />
Danger: Law Enforcement Traffi c Stops<br />
and Encountering <strong>Terrorist</strong>s.” Because<br />
the patrol offi cer is far more likely to<br />
encounter militant activity than other<br />
specialized personnel, this chapter<br />
provides a number of detection ideas that<br />
can be implemented in the fi eld. Finally,<br />
this section concludes with Chapter 18,<br />
“Point of Failure: <strong>Terrorist</strong> Operations<br />
and Tactics.” Th is chapter discusses the<br />
types of terrorist action that may unfold<br />
if not detected and interdicted in earlier<br />
stages. In doing so, this piece familiarizes<br />
the reader with a wide range of attack<br />
methods previously employed and likely<br />
to be implemented in the future.<br />
Nance closes out the textual portion<br />
of his book with section fi ve, “Th e New<br />
Field of Terror,” which explores several<br />
key developments in modern terrorism.<br />
Individual chapters are devoted to the<br />
examination of al-Qaeda and related<br />
worldwide movements, to suicide<br />
terror and its implementation, and to<br />
major developments in the Iraq War<br />
between 2003 and 2008. Finally, in<br />
section six, Nance provides a number<br />
of supplemental resources, including<br />
a bibliography, a list of known global<br />
terror groups, and checklists for explosive<br />
materials.<br />
Malcolm Nance has acquired a level<br />
of understanding that surpasses that<br />
of many senior government offi cials<br />
with regard to the topics of terrorism,<br />
Iraq, and Afghanistan, and he shares his<br />
vast knowledge with us in the second<br />
edition of the <strong>Terrorist</strong> Recognition<br />
Handbook. Th ough Nance withholds<br />
some technological details for security<br />
purposes, this book is an excellent<br />
introduction to terrorist methodologies<br />
for both vigilant fi rst responders<br />
and personnel who are preparing for<br />
deployment. •<br />
If you<br />
read one<br />
book on<br />
radical<br />
Islam this<br />
year, read<br />
this!<br />
$12.95<br />
plus shipping<br />
Circle 193 on Reader Service Card<br />
To order go to:<br />
www.wakeupamerica.ws or Amazon.com<br />
Or, call Woodmont Publishers at 561-441-5484<br />
Circle 249 on Reader Service Card<br />
42 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 43
JUST 2 SECONDS<br />
Using Time and Space to Defeat Assassins<br />
By Gavin de Becker,<br />
Tom Taylor, and Jeff Marquart<br />
NOW<br />
This is not the time for thinking. This is not the time for planning.<br />
This is the time for action. It is 2:25 PM on March 30, 1981, and<br />
the system of Presidential appearances is chugging along just<br />
fi ne, at least by all appearances.<br />
A group of people behind a slender cordon is waiting to see<br />
President Reagan walk to his car. Some are waiting to get a<br />
closer look at him, some are waiting to photograph him, others<br />
are waiting to call out questions, and one is waiting to kill him.<br />
T he media reporters and<br />
Tof<br />
technicians are part of the system<br />
of Presidential appearances. Political<br />
promoters like them to be close,<br />
protectors like them to be far away,<br />
and presidents don’t like them at all.<br />
Nonetheless, they are part of the system,<br />
and this afternoon, they are helping to<br />
conceal John Hinckley, who is not part of<br />
the system. Not yet anyway.<br />
In a second or two, Hinckley’s actions<br />
will cause the system’s gears to grind<br />
as they try to digest something new:<br />
bullets. Th e assailant has six bullets in<br />
his handgun, and he’s about to fi re them<br />
all. When this happens, some people will<br />
fl inch and duck, some will fall, others will<br />
stand tall. John Hinckley will become<br />
part of the system, his quality-control test<br />
improving it in the long run, but having<br />
terrible consequences in the short run.<br />
Th e President walks out of the hotel.<br />
Th ough Hinckley glimpses him for just<br />
an instant, he draws the gun and begins<br />
fi ring. At the sound of the fi rst gunshot,<br />
nobody standing on the sidewalk of the<br />
Washington Hilton Hotel recognizes<br />
what is happening—nobody other than<br />
Hinckley, that is. For some, it takes<br />
another shot and seeing people fall. For<br />
others, it will take all six shots to call their<br />
minds into this moment.<br />
Since the attack began and ended<br />
in less than two seconds, it’s easy to<br />
understand how some people who<br />
were right there had no idea what had<br />
happened until afterwards. Just two<br />
seconds, and the shooting was over. Th is<br />
book is entirely about those tiny fractions<br />
of time. Th ese pages do not explore<br />
44 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 45<br />
T he<br />
the planning that precedes attacks,<br />
the rationale behind them, the nature<br />
of conspiracy, the social and cultural<br />
conditions that foment them, or the<br />
psychology of attackers—all important<br />
topics that have been addressed in other<br />
books. We are concerned here only with<br />
events at the scene of the attack, during<br />
the attack.<br />
Th ere are many disciplines that break<br />
events down to their elements. When<br />
judging a guitar, for example, experts<br />
listen for four things in particular,<br />
described by the term ASDR:<br />
Attack ttack (the fi rst sound that comes from<br />
the instrument when a note is played),<br />
Sustain (how long the instrument<br />
body holds the pure sound of the note),<br />
Decay (how long it takes the sound<br />
to die), and Release (the end of the<br />
sound).<br />
Our scrutiny must be as precise, given the<br />
stakes. Were this a book for pilots, it would<br />
be about crashes and near-crashes, not<br />
about routine fl ight, aircraft maintenance,<br />
nor navigation. Instead, it would explore<br />
the lessons that present themselves from<br />
the moment an aircraft comes out of<br />
stable fl ight until the moment the incident<br />
ends—such incidents always ending in one<br />
of two ways: Th e pilot regains control, or<br />
the aircraft crashes.<br />
Th e moment protective operations<br />
come out of stable fl ight is usually<br />
marked by the sound of gunfi re. In most<br />
of the hundreds of incidents we studied,<br />
that sound is what led protectors to know<br />
an attack had commenced. However,<br />
there’s an event before the sound of<br />
gunfi re that actually marks the start of<br />
From the Moment<br />
of Commitment<br />
onward, the<br />
overwhelming<br />
majority of public<br />
fi gure attacks are<br />
over in less than fi ve<br />
seconds. Within just<br />
those few seconds,<br />
all the damage that<br />
will be done has<br />
been done.
an attack: the Moment of Commitment.<br />
Th at’s the instant in which an assailant<br />
fi rst takes an obvious action likely to<br />
reveal intent, an action from which he<br />
cannot easily retreat. It might be his<br />
bringing a gun into view, or pushing<br />
forward through the crowd, jumping<br />
onto the stage, or raising his arm with a<br />
knife, but whatever it is, he knows he’s<br />
not likely going home when his act is<br />
over. It is this Moment of Commitment<br />
that starts the clock on a critical race<br />
between safety and lethality.<br />
Sometime (i.e., some time) after the<br />
Moment of Commitment comes the<br />
Moment of Recognition. Th is is the<br />
instant when protectors get their minds<br />
around what is happening, a prerequisite<br />
to getting their arms around what is<br />
happening—and more signifi cantly,<br />
getting their arms around the assailant<br />
or the protectee. Watch the videos and<br />
fi lms of attacks and the Moment of<br />
Recognition is unmistakable. You will see<br />
a powerful energy bolt through everyone<br />
present. Th e target freezes and recoils,<br />
the bodyguards and the attacker begin an<br />
awkward and disturbing ballet, onlookers<br />
surge forward to see, then backward to<br />
survive. A chorus of screams and gasps is<br />
heard long after the violence has stopped.<br />
Th e extensive study undertaken for<br />
this book has produced many insights,<br />
the most striking of which is also the<br />
simplest:<br />
From the Moment of Commitment<br />
onward, the overwhelming majority<br />
of public fi gure attacks are over in less<br />
than fi ve seconds. Within just those few<br />
seconds, all the damage that will be<br />
done has been done.<br />
Th e fi ve-second statistic could be<br />
discouraging to protectors, because it<br />
grants them very little time to respond<br />
eff ectively. However, embedded within<br />
that fi ve-second statistic is one of the<br />
most encouraging lessons we learned:<br />
Attackers are even more handicapped<br />
by the speeding clock than are<br />
protectors.<br />
Just as an attacker benefi ts from the<br />
narrowness of time in which protectors<br />
can respond, so do protectors benefi t<br />
from the ever-narrowing time the attacker<br />
has to complete his act.<br />
For an attacker like Hinckley, the<br />
choice to bring a handgun into play<br />
carries an enormous and immediate<br />
consequence: Where time served him<br />
before he revealed the gun, afterwards,<br />
it begins to enslave him. Th e gun he<br />
wields as a weapon can also be seen as<br />
the starting pistol for a race. From the<br />
moment he introduces it, he is fi ghting<br />
time, and hopefully (for our purposes), he<br />
is fi ghting capable protectors.<br />
Given such a small window of time,<br />
if the Moment of Recognition is moved<br />
forward by even a fraction of a second,<br />
allowing a protector to respond during<br />
that gained time, the odds of survival<br />
increase profoundly. You are about<br />
to learn concepts that can prepare<br />
your mind to reach the Moment of<br />
Recognition sooner.<br />
Attackers have plenty of time before<br />
the Moment of Commitment, but from<br />
that instant onwards they have almost no<br />
time at all. Th e asset of surprise cannot<br />
sustain its value for it’s spent entirely in<br />
a fl ash. After that fl ash, most attackers<br />
rely so heavily upon speed that it quickly<br />
becomes their greatest weakness. Speed is<br />
an enemy of accuracy and composure—<br />
both necessary components of successful<br />
attacks. If the presence of protectors<br />
doesn’t deter an attack, protective<br />
strategies can at least compel an attacker<br />
to rush.<br />
Th ose intending assassination have<br />
some advantages over their targets, but<br />
many more factors work against them<br />
than for them. Th ousands of opportunities<br />
exist for them to fail, and only one slender<br />
opportunity exists for them to succeed.<br />
Often, both literally and fi guratively,<br />
assassins have one shot at success—and<br />
they know this. Accordingly, though<br />
assassination might be seen as a reckless<br />
act, it is rarely committed recklessly.<br />
Th ere’s a popular belief that<br />
attackers have the advantage, even over<br />
sophisticated protective operations,<br />
because they can choose when to attack.<br />
In reality, however, most attackers do<br />
not get to choose precisely when to<br />
attack. Th ey may select the date or<br />
the general period, but the timing<br />
that really matters—the Moment of<br />
Commitment—is dictated and stimulated<br />
by events attackers rarely control: When<br />
does the target come into view or into the<br />
killing zone? How long will he remain<br />
there? When is the target nearest? Are<br />
protectors close to the attacker? Are<br />
protectors focused on the attacker? Are<br />
bystanders focused on the attacker? Is<br />
the target moving or stationary? When<br />
is the space between attacker and target<br />
most free of obstructions? Is this instant<br />
the best moment for attack, or this<br />
one… or will there be a better one if<br />
I wait? Eff ective protective strategies<br />
can infl uence how an attacker answers<br />
these questions, and often, more often<br />
than we know, the answers cause him to<br />
delay, postpone, or even cancel his plans.<br />
Th ough history off ers many examples of<br />
attackers who aborted their attempts, this<br />
book focuses on those who acted on their<br />
plans—and on the few seconds it took<br />
them to do so.<br />
IT’S ABOUT TIME<br />
Th e cases in the Compendium show<br />
the number of attacks that happened in<br />
the daytime versus at night, and how<br />
many were political versus personal—but<br />
such information is not useful for our<br />
purposes here. If you know, for example,<br />
that 70% of past attacks occurred in the<br />
daytime, it doesn’t mean you give 30%<br />
less attention or preparation during the<br />
night. Similarly, knowing that 75% of all<br />
assassins were mentally ill does not have<br />
much value to a bodyguard intercepting<br />
someone who suddenly charges through a<br />
crowd. Th ere is no time for mental health<br />
diagnosis, and the bodyguard must not<br />
ignore people just because they appear<br />
sane or reasonable, nor focus only on<br />
those who appear deranged.<br />
Some statistics, however, can be useful<br />
to protectors. For example, knowing<br />
that most attacks are launched from<br />
within 25 feet of the target can encourage<br />
protectors to focus most of their attention<br />
and resources on the close range, rather<br />
than watching only for snipers on distant<br />
rooftops.<br />
Th e Compendium cases off er other<br />
useful insights:<br />
• In the U.S., attacks are most<br />
likely to be undertaken by lone<br />
assailants (87% of the time).<br />
Outside the U.S., attacks are most<br />
likely committed by multiple<br />
assailants (71%).<br />
• Attacks in the U.S. are about as<br />
likely to be indoors as outdoors<br />
(53% versus 47%). Outside the<br />
U.S., they are far more likely to<br />
occur outdoors (80%).<br />
• Firearms are the most likely<br />
weapons of attack (71%).<br />
• In the U.S., handguns are more<br />
than twice as likely to be used<br />
than long guns (51% handguns,<br />
20% long guns). Outside the U.S.,<br />
the reverse is true.<br />
• Attacks in the U.S. are most likely<br />
to be at close range, less than 25<br />
feet (81%). Only 19% occurred at<br />
more than 25 feet, with the longest<br />
range being 263 feet. Outside the<br />
U.S., even though long guns are<br />
used twice as often, most attacks<br />
still occur at close range (70%). If<br />
you combine this fact with the less<br />
eff ective emergency medicine found<br />
in most other countries, it’s not<br />
surprising that attacks outside the<br />
U.S. are more likely to be lethal.<br />
• Bombs succeed at killing intended<br />
targets only slightly more often<br />
than they fail (57% of the time).<br />
• Th e most dangerous place to be is<br />
in or around the protectee’s car.<br />
To be present at the<br />
location is one thing,<br />
but to be there in<br />
time is the central<br />
issue of this book.<br />
Sixty-four percent of attacks happen<br />
when the protected person is in or<br />
around the car, and these attacks<br />
succeed an astonishing 77% of the<br />
time.<br />
While this information has value for<br />
developing protective strategies, once<br />
an attack has commenced, almost all<br />
knowledge becomes useless mental<br />
clutter. Perhaps the single most valuable<br />
thing a protector could know is when<br />
future attacks will happen—and that we<br />
do know, precisely:<br />
One hundred percent of all attacks<br />
happen at exactly the same time:<br />
Now.<br />
Th e only time anything can happen is<br />
in the present moment. Everything else<br />
is a memory (the past) or a fantasy (the<br />
future), and nothing in the past or future<br />
can hurt your protectee. An attacker’s<br />
Moment of Commitment is always in the<br />
Now, and if you hope to meet him there,<br />
you too must be in the Now. Focusing<br />
attention on the Now is the surest way to<br />
be present and ready in the event of an<br />
attack, literally to be in the event, and not<br />
just a bystander watching events unfold.<br />
To be present at the location is one<br />
thing, but to be there in time is the central<br />
issue of this book. You could place yourself<br />
in the perfect position for foiling an attack<br />
(many bodyguards have), and yet if you<br />
are not present in the moment, pre-sent as<br />
it were, your body being there is not likely<br />
to be of constructive consequence.<br />
46 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 47
PREPARING TO BE PRESENT<br />
Professional protectors already<br />
know a lot about maintaining physical<br />
readiness, but it’s the mind that must<br />
fi rst be properly prepared, the mind that<br />
controls the hands, arms, eyes, and ears.<br />
Th ere are strategies available to help<br />
prepare warriors, based upon knowing<br />
how the body responds to lethal combat,<br />
what happens to your blood fl ow, your<br />
muscles, judgment, memory, vision, and<br />
your hearing when someone is trying<br />
to kill you. Police offi cers, soldiers, and<br />
protectors can learn how to keep going<br />
even if shot, and how to prepare the<br />
mind and body for survival instead of<br />
defeat. Th is is much more than mere<br />
information; the knowledge itself can be<br />
a kind of armor.<br />
Just as a computer functions best when<br />
loaded with accurate and relevant data,<br />
we encourage protectors to mentally<br />
download the information in this book.<br />
Getting the strategies into practice<br />
begins with getting them into your<br />
mind. Speaking of the mind, imagine<br />
for a moment that your mind is a time<br />
machine able to take you into the past or<br />
the future. Now realize that you need not<br />
imagine this at all, because your mind is<br />
a time machine, one that almost always<br />
takes you out of the present moment.<br />
You might have enjoyable or even useful<br />
journeys, but while you’re on them, you<br />
cannot truly be in the present.<br />
Every thought about anything outside<br />
the Now is a burden that makes you<br />
mentally heavier, while focusing your<br />
perception on the ever-changing Now<br />
makes you lighter and more agile. For<br />
a protector, it all comes down to this<br />
question: Will you be present to recognize<br />
the earliest detectable signs of an attack,<br />
or will you be elsewhere, called back to<br />
the moment by the sound of gunfi re?<br />
Even if a loud sound ends your time<br />
travel and pulls you back to the present,<br />
that doesn’t mean you’ve reached the<br />
Moment of Recognition. You still have to<br />
spend time coming to understand what’s<br />
happening. Your senses can alert you to<br />
danger, but on their own they can’t tell<br />
you what caused that loud noise. In other<br />
words, the gunshot and the Moment of<br />
Recognition are rarely simultaneous.<br />
You might think that all of your<br />
training on how to respond to an attack<br />
automatically kicks in at the sound of<br />
gunfi re. But it doesn’t. Nor should it.<br />
If you’re an experienced protector, you<br />
already know this. You’ve heard many<br />
sounds at public appearances that were<br />
indistinguishable from gunfi re—dropped<br />
trays, fi recrackers, cars backfi ring,<br />
balloons popping—and yet you didn’t<br />
always pull your protectee from the stage.<br />
Th at’s because even a sound like gunfi re is<br />
rarely enough on its own to get you to the<br />
Moment of Recognition and stimulate<br />
the Big Response that might follow. On<br />
hearing such sounds, protectors (for<br />
better or for worse) tend to look for other<br />
indicators to complete the puzzle before<br />
responding.<br />
On the one hand, protectors want to<br />
respond eff ectively at the earliest possible<br />
instant; on the other hand, they dread<br />
acting prematurely. Nobody wants to<br />
charge across the baseball fi eld during<br />
the National Anthem, knock the famous<br />
singing star to the dirt—and then fi nd<br />
out that the gunshot sound was actually<br />
a backfi re in the parking lot. Th is is the<br />
protector’s great confl ict: Act too early<br />
and risk embarrassment. Act too late, and<br />
risk everything.<br />
Th e only way to be fully certain before<br />
responding is to allow more of the event<br />
to unfold. But how many pieces of the<br />
puzzle must you see before you can know<br />
what image is being formed (or at least be<br />
willing to commit to a guess)? Th e answer<br />
might diff er from person to person, but<br />
clearly, in order to see the earliest pieces<br />
of the puzzle, your attention must be<br />
focused on the Now.<br />
Consider the true meaning of the<br />
popular expression, passing the time:<br />
When someone is merely passing the<br />
time, he is passing events that are<br />
occurring right in front of him, passing<br />
the Now. Or another expression, killing<br />
time, which is, quite literally, killing the<br />
one resource a protector needs most.<br />
Imagine that a protector’s mind is<br />
anywhere else when something calls him<br />
back to the present. He’ll then need time<br />
to land, time to assess, time to conclude,<br />
time to respond. But he has been killing<br />
the very time he needs.<br />
Th e concept of spending time is<br />
perfectly apt: Once spent, time is gone,<br />
just like any other resource. In the<br />
economy of public fi gure attack, time is<br />
spent in tiny increments—and each one<br />
is priceless.<br />
Just an instant before confi rming that<br />
the sound of gunfi re actually is gunfi re,<br />
a bodyguard might have been thinking<br />
about the complicated route back to the<br />
car, or whether the protectee’s speech is<br />
almost over, or about the loading dock<br />
door that got stuck at the half-way point<br />
on this morning’s advance. A bodyguard<br />
might have been thinking about staying<br />
on schedule, keeping intact a complex<br />
web of logistics, or he might be even<br />
farther from this moment, thinking about<br />
an upcoming vacation.<br />
But wherever attention might have<br />
been an instant ago, from the Moment<br />
of Recognition onward, bodyguards are<br />
fi rmly rooted in the present, riding a<br />
terrible roller coaster of shifting priorities:<br />
• Cover the protectee<br />
• Stop the attack<br />
• Subdue the attacker<br />
• Get the protectee out of here<br />
Th ough a bodyguard might have the<br />
objective of stopping the gunfi re, that<br />
goal is rarely reached. In most of the<br />
1400 incidents we studied, it was the<br />
gunmen who decided when to stop<br />
shooting.<br />
If the protectee has not been hit by<br />
gunfi re, your priority might be to pull<br />
or push him out of danger, or to cover<br />
him. If you are closer to the attacker, your<br />
priority might be to disrupt the shooter’s<br />
aim or view. If the protectee has just been<br />
shot, your priority shifts again, this time<br />
to ensuring that he is not hit by another<br />
bullet.<br />
If the protectee has been injured<br />
and the attacker is no longer shooting,<br />
your priority likely shifts to stopping<br />
blood loss and getting the protectee to<br />
emergency medical care. Th at priority<br />
doesn’t change even if the protectee<br />
is dead: Protectors rush to the damn<br />
hospital anyway, knowing all along the<br />
awful drive that doctors won’t be able<br />
to do anything more than confi rm the<br />
obvious.<br />
Th is was the experience of protectors<br />
rushing to hospitals with the dead<br />
or soon-to-be-dead bodies of John<br />
F. Kennedy, Israeli Prime Minister<br />
Rabin, and Egyptian President Anwar<br />
Sadat—hoping that time still mattered,<br />
while facing the one situation in which it<br />
doesn’t matter at all. It’s hard to imagine<br />
that gunfi re aimed in one’s direction<br />
is ever desirable, yet the protectors in<br />
these three cases would tell you they<br />
preferred the moments of danger over<br />
the moments that followed, and the years<br />
that followed. •<br />
Th is passage was excerpted from the forthcoming<br />
book Just 2 Seconds: Using Time and Space<br />
to Defeat Assassins. Special advance copies are<br />
available to readers of Th e Counter <strong>Terrorist</strong> at<br />
a discounted price. For more information on the<br />
book, visit http://www.just2seconds.org.<br />
ABOUT THE AUTHOR<br />
Gavin de Becker, is a highly regarded<br />
expert in public fi gure protection, and<br />
his 200-member fi rm provides protective<br />
coverage for many of the world’s most at-<br />
risk people. Mr. de Becker also designed the<br />
MOSAIC threat assessment systems used<br />
by the CIA, the U.S. Supreme Court, and<br />
the U.S. Capitol Police. His bestselling<br />
books, including Th e Gift of Fear, have been<br />
published in 14 languages.<br />
Worldʼs Finest Magazines<br />
“OPTIMUM”... THE WORLDʼS BEST MAGAZINES<br />
MEC-GAR is proud to offer “Optimum” - our new<br />
and unique series of high capacity flush-fit pistol<br />
magazines.<br />
The new design of the magazine housing and<br />
interlinked magazine components, together with<br />
a special Anti-Friction Coating offer far superior<br />
performance even in difficult operational<br />
environments.<br />
The increased firepower of MEC-GAR “Optimum”<br />
magazines can be further raised by an optional “Plus<br />
Two” adapter. “Plus Two” is a new set of hollow<br />
butt-plate and inner base to raise the capacity of the<br />
MEC-GAR “Optimum” magazine by 2-rounds and<br />
stick out only 5/8” from the butt of the pistol!<br />
Circle 243 on Reader Service Card<br />
Available For: Beretta 92FS 9mm 18rd / 20rd<br />
Beretta 96FS .40S&W 13rd / 15rd<br />
Para-Ordnance P14 .45ACP 14rd<br />
SIG P226 9mm 18rd / 20rd<br />
SIG P226 .40S&W 13rd / 15rd<br />
Springfield XD 9mm 18rd<br />
Springfield XD .40S&W 13rd<br />
Taurus PT92 9mm 18rd / 20rd<br />
Taurus PT100 .40S&W 13rd / 15rd<br />
Mec-Gar USA, Inc., 905 Middle Street, Middletown, CT 06457<br />
Tel: (800) 632-4271 Fax: (860) 635-1712 www.mec-gar.com<br />
Circle 235 on Reader Service Card<br />
48 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 49
CIVILIAN STANDBY<br />
CT GROUPS PART 1<br />
By Mickey Hargaash<br />
sraeli governmental security<br />
organizations had much experience<br />
with terror attacks in the 20th Israeli governmental<br />
organizations had much experience<br />
with terror attacks in the 20 century,<br />
especially outside the country’s borders.<br />
Th e same could not (previously) be said<br />
within community settlements.<br />
Th e Israel Defense Force (IDF)<br />
had only a few experiences with terrorist<br />
killing attacks until recent years, and no<br />
professional doctrine was formed to face<br />
the threats. Th e military CT tactics and<br />
special forces activities were directed solely<br />
Photo: SSI International<br />
TEST CASES: FOUR TERRORIST KILLING<br />
ATTACKS THAT SHAPED ISRAELI TACTICS<br />
towards the well-known hostage terrorist<br />
takeovers, like the famous Entebbe rescue<br />
operation in 1976.<br />
During the “hang gliding night” in<br />
1987 and the “pitch forks night” in 1992,<br />
terrorists infi ltrated military compounds<br />
and killed numerous soldiers until they<br />
were shot at on one occasion and ran<br />
away with stolen M16s on the other.<br />
Lessons learned included very long<br />
summaries focusing on personal blame.<br />
Th e HIC (High Intensity Confl ict) was<br />
the only relevant interest, and there was<br />
no decision made to form any doctrinal<br />
knowledge in relation to the LIC (Low<br />
Intensity Confl ict), in particular the<br />
terror killing attacks.<br />
Civilian community settlements<br />
had little experience either, though they<br />
had the ambition to prepare for terrorist<br />
threats, along with volunteers. Th e threats<br />
materialized in the year 2000 with the<br />
Palestinian General Security Police, but<br />
expertise was not yet available.<br />
Defeating suicide bombers by using<br />
basically trained civilians in an urban<br />
environment on three diff erent occasions<br />
at the beginning of 2002 established<br />
a new eff ort. Local eff orts to combat<br />
terrorism could be helpful, but somebody<br />
had to take responsibility.<br />
In 2002 the IDF made a decision<br />
to “adopt” the combatant local-eff ort<br />
approach and opened a special CT<br />
school for civilian groups in community<br />
settlements. It also pushed for a crossorganizations<br />
exchange of knowledge<br />
in order to develop the proper doctrine<br />
needed. Th is was the beginning of<br />
establishing civil defense to combat terror<br />
in the community environment in Israel.<br />
ELEY SINAI, 2001<br />
Basic data: A terrorist attack in a small<br />
neighborhood at a civilian settlement<br />
near Gaza. Two terrorists; approximately<br />
three hours of ongoing killing; many<br />
military forces, including special forces,<br />
with no organized or trained civilian force<br />
around at the time.<br />
Timetable: Taken by the division’s<br />
operations room and made available to<br />
the public:<br />
19:25 hours: Two terrorists infi ltrated<br />
a military-secured civilian settlement.<br />
Th ey shot a soldier and walked around<br />
for about an hour shooting and throwing<br />
many grenades in between the houses.<br />
Military teams did not make any contact<br />
with them.<br />
20:30: After a local civilian called the<br />
operations room and directed authorities<br />
to the precise location, military forces<br />
started to close on the two.<br />
20:50: A cordon was placed around the<br />
house where the terrorists shut themselves in.<br />
22:50: Th e terrorists were hit by snipers<br />
after trying to escape by pretending to be<br />
a terrorist kidnapping a civilian.<br />
Outcome: Two killed; 16 wounded;<br />
two terrorists killed.<br />
Disadvantages were the endless time<br />
needed for engagement, the large military<br />
employment, and the lack of knowledge<br />
to enable effi cient use of combat forces.<br />
Lessons learned were written at<br />
all levels and included very long lists,<br />
though the focus was not on personal<br />
blame. Th e basic understanding was<br />
that the conservative equation of<br />
<strong>Terrorist</strong>s=hostage situations does not<br />
work, and time until engagement (of<br />
terrorists) is highly important.<br />
MARGANIT, 2002<br />
Basic data: A terrorist attack on a small<br />
military compound near Gaza, only 30<br />
meters in length. Th e attack lasted for<br />
15 minutes. Th ere were two terrorists –<br />
policemen of the General Security Police<br />
Force, 11 infantry trained soldiers with no<br />
CT training asleep, three guards on duty.<br />
Timetable: taken by the division’s<br />
operations room and made available to<br />
the public:<br />
02:50: A last warning was given<br />
following a few others of a fence cut a few<br />
hundred meters from the compound. No<br />
one bothered to check the warning.<br />
03:01: Shooting and grenade explosions<br />
were heard from the compound. Two<br />
terrorists shot at the guard at the gate<br />
Like many tough<br />
issues, private<br />
police, jurisdiction<br />
and responsibilities<br />
are ones that have<br />
to be faced and<br />
will eventually rise<br />
to a critical point,<br />
from either needs or<br />
liability or both.<br />
50 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 51
from a distance of 15 meters. He was<br />
not hurt, and in fact he ran to call his<br />
commander. Th e other two guards did<br />
not initiate any contact, as they were<br />
afraid to leave their posts. No contact<br />
by sight or fi re was initiated by the<br />
awakening soldiers. Th e terrorists walked<br />
around and kept shooting in all directions<br />
in the compound.<br />
03:10: Reinforcement arrived with<br />
the major, second in command of the<br />
battalion, who found that no one was<br />
actually doing anything, aside from some<br />
aimless shooting. He was the only one to<br />
move around in the compound, and was<br />
hit while fi ghting.<br />
03:16: After local soldiers started to<br />
aim and shoot from static posts, one<br />
terrorist was hit and the other one ran<br />
away.<br />
Outcomes: Th ree were killed, seven<br />
wounded; two terrorists killed, including<br />
one at the end of a pursuit at 07:00.<br />
Disadvantages start with the near<br />
endless time that was needed to shoot the<br />
terrorists at virtually no distance. Th is is<br />
added to the “on-guard team” available<br />
inside the compound, which had the best<br />
starting point, even better than that of a<br />
“stand-by team” located nearby.<br />
Lessons learned were written at all<br />
levels and included very long lists. Focus<br />
was on personal blame, and still no<br />
connection was made to the method of<br />
fi ghting and training of combatants.<br />
ITAMAR, 2002<br />
Basic data: A terrorist attack on a<br />
civilian settlement in Samaria, starting<br />
with shooting in the neighborhood and<br />
fi nally shooting civilians inside one of<br />
the houses. One terrorist was involved<br />
as were many military and police forces,<br />
with no civilian trained force available.<br />
Timetable: Not available.<br />
21:00: One terrorist infi ltrated, fi red<br />
rounds and threw grenades while he<br />
walked around the neighborhood. Finally<br />
he entered a house and shot the children<br />
and parents inside.<br />
A police special operations unit<br />
performed a cordon around the house<br />
and started rescuing the victims. Th e unit<br />
had to improvise since the scenario did<br />
not meet any hostage situation that was<br />
familiar at that time; thus, the unit went<br />
in using grenades. Th ree kids were saved<br />
though injured, and the terrorist who<br />
tried to escape through a window on the<br />
second fl oor was shot by a sniper.<br />
Outcomes: Five were killed, three of<br />
them children, and three children were<br />
wounded.<br />
Disadvantages were the excessive time<br />
needed to shoot the terrorist and the<br />
inappropriate combat tactics used by the<br />
on scene police unit.<br />
Lessons learned focused on the<br />
improvements needed with the CT<br />
combat tactics. At a diff erent level, a<br />
military decision was made to create<br />
a designated school for local civil<br />
combatant groups.<br />
ITAMAR, 2004<br />
Basic data: Multiple terrorist actions<br />
started with shooting at civilian vehicles.<br />
Th ey were driving along a road located in<br />
an orchard contour that connected two<br />
separate neighborhoods of the settlement.<br />
Timetable: Was measured according to<br />
a reconstruction of the event I conducted<br />
in the fi eld.<br />
10:30: A report was heard of local<br />
civilians being shot at on the inner road<br />
mentioned above. Four members of the<br />
local civilian combat team heard it on the<br />
military radio, along with several shots<br />
they could hear from the mentioned<br />
direction.<br />
A military team on a logistics mission<br />
with a vehicle nearby also heard it. Th ey<br />
were asked to observe until the standby<br />
team of the military company in charge<br />
and the commander would join them.<br />
10:40: Four civilian members<br />
mentioned above took their weapons and<br />
rushed towards the observing military<br />
vehicle to get more information. Th ey<br />
saw a civilian vehicle on the road and<br />
thought it might be a car being attacked.<br />
10:45: Th ey spread into a square<br />
formation and, under the orchard’s<br />
cover, ran towards the car. From this<br />
distance they managed to see a civilian<br />
shooting another civilian lying next to<br />
the car while trading his rifl e for one on<br />
the ground. Th en, after he shot at them<br />
and they made a brief attempt to identify<br />
The nation's best source for current, open<br />
Federal, State, Local law enforcement<br />
and Private Security positions.<br />
www.LawEnforcementJobs.com<br />
Find Criminal Justice degrees at:<br />
You've chosen your career,<br />
Now find<br />
your JOB!<br />
Employers:<br />
Contact us at 703-351-5565 or<br />
info@LawEnforcementJobs.com<br />
for more information<br />
52 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 53<br />
Circle 199 on Reader Service Card<br />
........
themselves, they determined it was the<br />
terrorist.<br />
10:48: Th ey shot and killed him. As<br />
the military standby team arrived, they<br />
passed on command for a secondary<br />
search around the entire orchard area.<br />
Outcomes: One terrorist killed, one<br />
civilian killed – the new security offi cer in<br />
charge of the settlement who rushed into<br />
the orchards when he heard the shots.<br />
Advantages were the relatively short time<br />
needed for engagement, even though the<br />
terrorist was distant and ambushing, and<br />
the absence of need for large military<br />
employment. It was a local civilian<br />
combatant standby team, which pursued<br />
contact and shot the terrorist.<br />
Lessons learned were written very<br />
briefl y. It appeared that both civilian<br />
and military forces can supplement<br />
each other, along with the eff ectiveness<br />
of combatant civil groups. Urgent<br />
development of contact emphasized for<br />
an actively shooting terrorist, not when<br />
the terrorist is quiet, ambushing and not<br />
NHDF has issued a<br />
CALL FOR PAPERS.<br />
Papers selected will be presented at<br />
Symposium VI and archived<br />
in the NHDF actively killing. Library.<br />
Th e tragic killing attacks portrayed<br />
above presented a new challenge, which<br />
emphasized the logic and importance of<br />
local combatant groups.<br />
Securing the Future of Liberty<br />
October 27-30, 2008 • Colorado Springs, Colorado<br />
The theme of Symposium VI is “Securing our Homelands Through<br />
International Collaboration; Neighbors Helping Neighbors.”<br />
Presentations will include key officials from the US, Canada,<br />
Mexico, Australia, and other nations. This annual conference is the<br />
nation’s leading public forum on homeland defense and security<br />
matters and offers valuable networking opportunities.<br />
Plan to exhibit and attend by registering at www.nhdf.org<br />
The world class 5<br />
Star 5 Diamond<br />
Broadmoor Hotel is<br />
the host location for<br />
Symposium VI.<br />
For more information, visit www.nhdf.org<br />
NHDF has issued a CALL FOR PAPERS. Papers selected will<br />
be presented at Symposium VI and archived in the NHDF Library.<br />
CHARACTERISTICS<br />
OF THE AREA THE<br />
ATTACKERS CHOOSE<br />
Wherever helpless victims can be<br />
attacked and killed, defensive ability is<br />
needed – whether on the streets or inside<br />
houses, whether on a military compound<br />
or in a soldier’s bed room, or in an<br />
ambush on an orchard side road.<br />
Implications: Defense of, and coverage<br />
of, an entire area is problematic,<br />
especially against terrorists. A possible<br />
solution would be to form available local<br />
standby combat groups.<br />
CHARACTERISTICS OF<br />
THE THREAT<br />
Th e number of terrorists in a single<br />
attack is usually somewhere between one<br />
and a few. Th e backgrounds of terrorists<br />
range from no professional training to<br />
police level. Th eir professional ability is<br />
generally very low. Th ey usually need a<br />
great deal of time to “achieve deaths,”<br />
even when the helpless don’t fi ght back,<br />
despite their possession of assault rifl es<br />
and grenades and the close ranges they<br />
use. Th eir advantages include the ability<br />
to operate as excellent hunters, their<br />
ability to use the element of surprise, and<br />
their ability to get as close as possible<br />
to their targets. Th e sacrifi cing element<br />
varies; sometimes they tried to run away,<br />
but generally they didn’t even try.<br />
Implications: Th e average terrorist is<br />
not a demon. It would be reasonable to<br />
marshal effi cient resistance against him<br />
by using locally designated and trained<br />
combatant groups.<br />
FRIENDLIES: KNOW-<br />
HOW, LEARNING ABILITY<br />
AND COOPERATION<br />
Knowledge of how to combat a<br />
specifi c threat is highly important. Th e<br />
availability of such knowledge is generally<br />
not obvious and even special forces<br />
units in the area will not necessarily help<br />
2008 NATIONAL CALENDAR OF EVENTS SPONSORED BY:<br />
Counter<br />
Th e<br />
Th e Counter <strong>Terrorist</strong><br />
magazine is proud<br />
to sponsor the<br />
following events as<br />
part of its ongoing<br />
mission to provide<br />
the most current and<br />
relevant information<br />
on Homeland<br />
Defense Security:<br />
Offi cial Journal of the<br />
Homeland Security Professional<br />
An SSI ®<br />
Publication<br />
Register for these and other events at: www.thecounterterroristmag.com<br />
Circle 245 on Reader Service Card eff ectively. At Eley Sinay two terrorists<br />
54 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ Circle September/October 255 on Reader Service 2008 Card<br />
55
EMSExpoAd_4.75x7.5.qxd:Layout 1 7/31/08 4:41 PM Page 1<br />
CO-LOCATED WITH:<br />
1988 1990 1992 1994 1996 1998 2000 2002 2004 2008<br />
CELEBRATING 20 YEARS Y<br />
OF SERVING THE EMS COMMUNITY<br />
OCTOBER 13-17, 2008<br />
LAS VEGAS CONVENTION CENTER<br />
LAS VEGAS, NEVADA<br />
VISIT WWW.EMSEXPO2008.COM<br />
FOR EXCITING CELEBRATION UPDATES!<br />
at<br />
P r e s e n t e d b y E M S E X P O<br />
MAGAZINE<br />
Circle 231 on Reader Service Card<br />
kept more than fi ve diff erent military<br />
forces busy while shooting for several<br />
hours (some of them were special forces<br />
designated for hostage situations) and the<br />
whole scenario was limited to only a small<br />
neighborhood. At Marganit, well-trained<br />
infantry combatants were attacked, but<br />
that did not help them save themselves.<br />
Flexibility and learning during combat is<br />
not limited to military forces. In Itamar,<br />
2002, a police force had improvised<br />
according to the goals and the situation,<br />
and succeeded to a certain degree. In<br />
Itamar, 2004, the civilian combatant<br />
group had to improvise in relation<br />
to the non-familiar orchard contour,<br />
without waiting for the military force.<br />
It actually succeeded well in initiating a<br />
swift engagement and neutralizing the<br />
ambushing terrorist.<br />
Th e idea of the need for special units<br />
in order to fi ght terrorists is not always<br />
justifi ed. Local civilian combatants can<br />
act more effi ciently in certain contexts.<br />
Cooperation between local civilians<br />
and combat forces is essential. Th is<br />
includes civilians directly confronting<br />
terrorists and coordination / deconfl<br />
iction between the various<br />
forces. In Itamar, 2004, mutual radio<br />
frequencies shortened the response time,<br />
as implemented by the civilian standby<br />
combatant group.<br />
Implications: Properly trained local<br />
civilian combatant groups could be a<br />
highly valuable part of the defense puzzle<br />
when terrorist attacks take place in their<br />
own community environment. •<br />
ABOUT THE AUTHOR<br />
Mr. Hargaash served in Israeli<br />
governmental and military organizations,<br />
and specialized in counter terrorism and<br />
guerrilla operations for the last 25 years.<br />
Th e above is based on three years of work as<br />
the military professional liaison to the new<br />
CT school for civilian standby teams. Next<br />
month, Mr. Hargaash further develops the<br />
concepts behind the Israeli civilian standby<br />
CT teams in part two.<br />
DID YOU KNOW?<br />
SATGIN Organization formed to<br />
Counter Organized Crime<br />
S<br />
outh American Th eft Groups<br />
Intelligence Network (SATGIN)<br />
Sestablished<br />
is a not-for-profi t organization<br />
established to facilitate a networking<br />
platform for law enforcement, corporate<br />
and the private sector for the sharing<br />
of intelligence information relating to<br />
organized theft crimes, with a specifi c<br />
and unique focus on the South American<br />
Th eft Groups (SATG). Th is transnational<br />
criminal network has operated worldwide<br />
for decades virtually unknown to the<br />
public and to much of law enforcement<br />
until now.<br />
SATGs are recognized by the Federal<br />
Bureau of Investigation as a violent,<br />
organized criminal syndicate who<br />
travel the world conducting crimes<br />
ranging from pick pocketing to violent,<br />
commando-style carjacking of jewelers.<br />
Th e SATGs are a loosely knit, laterally<br />
structured crime syndicate unlike the<br />
historical, pyramidal structures of the<br />
well-studied Italian mafi a.<br />
Everyone is already an indirect victim<br />
of their crimes with regard to the costs<br />
in losses to the retailers and insurance<br />
companies who then pass them on to the<br />
general consumer. Someone becomes a<br />
potential target every time they purchase<br />
jewelry or a big ticket item, make a sales<br />
call visit, travel to and from the airport,<br />
rent a car, use public transportation, or<br />
withdraw money from the bank.<br />
SATGIN’s basic premise of<br />
communication, awareness, education,<br />
and training has already made a diff erence<br />
in deterring these criminals from their<br />
on-going criminal enterprises.<br />
South American Th eft Groups<br />
Th e SATGIN organization is<br />
comprised of retired and active law<br />
enforcement offi cers from federal,<br />
state and local agencies who specialize<br />
in the SATG’s. Collectively, we have:<br />
participated in numerous tack forces;<br />
investigated, arrested prosecuted and<br />
deported hundreds of SATG members;<br />
published manuscripts and articles on<br />
the SATG; and, trained hundreds of<br />
law enforcement offi cers and corporate<br />
security personnel throughout the world.<br />
We provide verifi ed law enforcement<br />
offi cers access to specifi cally designed,<br />
secured areas of our website for them<br />
to remain updated on the most recent<br />
criminal activities of the SATG, as well<br />
as to communicate among themselves<br />
on a secured platform in order to share<br />
intelligence on crimes and suspects. Th ey<br />
also share contact information so that the<br />
more sensitive aspects of the cases may be<br />
discussed off -line.<br />
Our Corporate and Professional<br />
SATGIN Team Members, for a low-cost<br />
annual membership, enjoy access to their<br />
own secured areas of the site where they<br />
will also be kept updated on the latest<br />
criminal activities of the SATG. Th ey are<br />
also provided a secured forum with which<br />
to communicate with other SATGIN<br />
Corporate Team members on a variety of<br />
topics.<br />
Most of the crimes committed by<br />
the SATG go either unreported or are<br />
not properly attributed to having been<br />
committed by an organized theft group.<br />
Rather, these crimes are concluded to<br />
have been “random”. SATGIN feels that<br />
Someone becomes<br />
a potential target<br />
every time they<br />
purchase jewelry<br />
or a big ticket<br />
item, make a<br />
sales call visit,<br />
travel to and from<br />
the airport, rent<br />
a car, use public<br />
transportation, or<br />
withdraw money<br />
from the bank.<br />
these forums will provide a way for the<br />
Law Enforcement and private sector to<br />
exchange, share, and provide the needed<br />
information to locate, apprehend and<br />
convict these organized crime members.<br />
Th ese forums allow for the immediate<br />
dissemination of facts, leads or losses<br />
occurred by the victims.<br />
SATGIN allows for the interactive<br />
participation in the website design,<br />
forums and changes that will benefi t all<br />
members.<br />
With these basic types of<br />
memberships, SATGIN allows for<br />
anyone who may be a potential target<br />
to get involved, become informed, and<br />
participate in an active forum.<br />
You can visit our website at<br />
www.SATGIN.org. •<br />
Circle 239 on Reader Service Card<br />
56 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 57
Call to register for OCTOBER 7TH - 10TH, 2008 at CAMP BLANDING, FL<br />
TRAINING REVIEW<br />
<strong>onPoint</strong> <strong>Tactical</strong>’s Urban Escape<br />
and Evasion<br />
O<br />
n February 13, 2003, a single<br />
engine, propeller-driven<br />
Othe<br />
Cessna 206 crashed into<br />
the lush jungle of Colombia’s Caquetá<br />
Province. Revolutionary Armed Forces<br />
of Colombia (FARC) guerrillas quickly<br />
apprehended the fi ve survivors. Two<br />
of these men—pilot Tom Janis and a<br />
Colombian soldier—were immediately<br />
executed. Pilot Th omas Howes, fl ight<br />
engineer Keith Stansell, and systems<br />
analyst Marc Gonsalves were quickly<br />
marched into the bush. 1<br />
Survival, evasion, resistance, and escape<br />
(SERE) training has long been taught<br />
to military and intelligence personnel.<br />
Unfortunately, even within the<br />
military and intelligence communities,<br />
opportunities for formal school-based<br />
training are available to only a minority<br />
of individuals. Moreover, military<br />
SERE training has historically focused<br />
on conventional warfare scenarios;<br />
soldiers have been taught to adhere to<br />
Geneva Convention requirements and<br />
seek the permission of senior personnel<br />
before attempting escape, for example.<br />
Unfortunately, in an unconventional<br />
setting, adversaries do not uphold legal<br />
niceties, and individuals are unlikely to<br />
be taken to a prisoner-of-war camp where<br />
seeking permission from senior personnel<br />
may be practical.<br />
Not only soldiers are at risk in regard<br />
to terrorists. Contractors, the hidden<br />
multiplier behind many government<br />
agencies, also face signifi cant danger.<br />
Whether driving logistics convoys<br />
in Iraq, serving on personal security<br />
Must be an active member in a SRT Team or SWAT Team<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 179 on Reader Service Card<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 59<br />
O<br />
n<br />
engine,<br />
Cessna<br />
details for State Department personnel<br />
in Afghanistan, or fl ying surveillance<br />
planes in South America, contractors are<br />
frequently targeted by terrorists. While<br />
it is common knowledge that FBI, DEA<br />
and other federal agents work overseas,<br />
local law enforcement agencies such as<br />
the New York and Los Angeles police<br />
departments increasingly pursue their<br />
own international interests and send<br />
offi cers abroad.<br />
By Chris Graham<br />
Photo: Courtesy Wade Heninger and <strong>onPoint</strong> <strong>Tactical</strong><br />
Th us, there is ultimately a growing<br />
number of people in need of SERE<br />
training, as well as a need to supplement<br />
existing training with threat-specifi c<br />
capabilities and relevant enhancement.<br />
In the course of pursuing supplemental<br />
training, I had the opportunity to attend<br />
<strong>onPoint</strong> <strong>Tactical</strong>’s urban escape and<br />
evasion (E&E) course.<br />
Day one of <strong>onPoint</strong>’s E&E course<br />
began in the classroom with PowerPoint
Alamo Alamo City City Gold Gold & & Silver<br />
Silver<br />
Over 1500 Agencies on File<br />
Gold and silver chains available<br />
Badges available in sizes from 3/4 in. to 1-1/2 in.<br />
Earn Extra Money!<br />
Distributors Wanted!<br />
950 N.E. Loop 410<br />
San Antonio, Texas 78209<br />
Telephone: (210) 930-3900<br />
Toll Free: (866) 333-3715<br />
Fax: (210) 930-3903<br />
Owned and operated by retired police<br />
detective, David Putnam<br />
We customize badge<br />
pendants and rings.<br />
Call for current prices or visit our<br />
website.<br />
Bracelet shown is actual size.<br />
Sizes available in 7 in. or 8 in. lengths.<br />
E-Mail: acgse@swbell.net<br />
Website: www.sadiamonds.com<br />
Check our website for most current prices<br />
Earn Extra Money!<br />
Distributors Wanted!<br />
presentations on several topics, including<br />
training, planning, and the body’s<br />
reaction to stress. We also discussed E&E<br />
priorities, diff erent types of useful gear,<br />
urban caches, knowledge of terrain, and<br />
the use of intelligence. Th e instructors<br />
emphasized the value of creating a<br />
briefi ng book that contains various<br />
types of data relevant to escape, such<br />
as locations of transportation systems,<br />
communications resources, governmental<br />
services, military/paramilitary<br />
installments, commercial establishments,<br />
fi nancial/medical services, and major<br />
industrial facilities. Next, we examined<br />
the importance of tracking the locations<br />
and volume of hostile activity in an area<br />
and preplanning safe houses and hides.<br />
Th e second half of day one was<br />
dedicated to the topic of urban<br />
movement. Discussion focused on the<br />
uniqueness of neighborhoods, including<br />
baselines of normal activity and the<br />
value of matching a given baseline.<br />
We considered the use disguises and<br />
possibilities for constructing fake<br />
identity documents and credentials.<br />
Th e instructors then moved on to issues<br />
of “social engineering,” elicitation,<br />
and improvised weapons. Finally, they<br />
presented us with techniques for urban<br />
climbing, ideas for dealing with dogs, and<br />
considerations for moving at night and<br />
fi nding hiding places.<br />
Day two of the course also began<br />
with PowerPoint presentations in the<br />
classroom. Th is time, however, our fi rst<br />
topic was lock picking. While on the run,<br />
the ability to pick locks can aid in escape<br />
and/or the acquisition of resources. We<br />
discussed lock picking tools, methods<br />
for concealing these tools, and methods<br />
for improvising them. We also talked<br />
about characteristics of pin tumbler locks,<br />
including the benefi ts and disadvantages<br />
of “raking” versus “feel picking” to defeat<br />
these locks. Next, participants spent<br />
several hours practicing these skills and<br />
defeating various locks.<br />
Th e discussion of lock picking led<br />
into the next major topic covered on day<br />
two: how to escape from captivity. Th e<br />
fi rst series of lectures related to this topic<br />
described how to defeat various restraints,<br />
including handcuff s, fl ex cuff s, and ropes.<br />
We improvised picks and shims and used<br />
these devices to get out of both single-<br />
and double-locked handcuff s. Ultimately,<br />
we practiced this process with our hands<br />
behind our backs and while locked in<br />
the trunk of a car. Th e instructors then<br />
introduced an ingenious technique for<br />
defeating fl ex cuff s and ropes that I had<br />
never seen before.<br />
Following our exploration of how<br />
to overcome cuff s and ropes, we spent<br />
some time talking about methods for<br />
negotiating fences, including those made<br />
of barbed and razor wire. We also talked<br />
about sensors, lighting considerations,<br />
and methods of dealing with television<br />
cameras, and the instructors delivered a<br />
presentation on night vision and thermal<br />
imaging.<br />
Finally, day two concluded with a<br />
discussion of how to fi nd transport<br />
following escape. We received a lecture<br />
on defeating car locks and ignition<br />
systems. We also talked about evasive<br />
driving techniques and linking back up<br />
with friendly forces without instigating a<br />
violent confrontation.<br />
Th e third and fi nal day of <strong>onPoint</strong>’s<br />
urban E&E training began on the<br />
outskirts of Chicago. Th is was fi nal<br />
exercise day. As the morning began, I<br />
stood blindfolded and handcuff ed. I took<br />
my blindfold off to discover that I was<br />
in an upstairs bathroom, and my leg was<br />
shackled to one of the stalls. As I surveyed<br />
the debris in my environment for possible<br />
tools, fi rst one of my teammates and<br />
then the other showed up; they had<br />
already escaped. I was in the process of<br />
improvising a pick when my partners<br />
went to work on my cuff s. Before I even<br />
had time to access my hidden cuff key,<br />
Captain F had my ankle free. Meanwhile,<br />
Photo: Courtesy Wade Heninger<br />
and <strong>onPoint</strong> <strong>Tactical</strong><br />
While it is common<br />
knowledge that<br />
FBI, DEA and other<br />
federal agents work<br />
overseas, local law<br />
enforcement agencies<br />
such as the New<br />
York and Los Angeles<br />
police departments<br />
increasingly pursue<br />
their own international<br />
interests and send<br />
offi cers abroad.<br />
60 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 219 on Reader Service Card<br />
The Counter <strong>Terrorist</strong> ~ September/October 2008 61
Circle 253 on Reader Service Card<br />
EOD EQUIPMENT<br />
SUPPLY<br />
WWW.IDEALSUPPLYINC.COM<br />
800-533-0144 or 828-274-0140<br />
Major B inadvertently cinched my left<br />
handcuff down to the point of cutting off<br />
circulation, but quickly freed my right<br />
hand, then returned to the left. After the<br />
fact, I would regret that we made noise<br />
ratcheting a cuff and plodding across<br />
the fl oor. We fl ew down a set of stairs<br />
and exited a side door of the building, as<br />
people came up the primary staircase.<br />
Exiting the building, we passed several<br />
people. Either our blighted warehouse<br />
was a popular site on Saturday mornings,<br />
or we were bumping into the opposition’s<br />
surveillance. Th rowing subtlety out the<br />
window, we ran and took a few turns. As<br />
we encountered our playmates again in<br />
diff erent clothes, it became clear that they<br />
were the opposition.<br />
After dropping my external shirt<br />
and trying some other minor attempts<br />
at misdirection, my teammates and I<br />
drifted apart from each other and took<br />
a circuitous route toward the site of our<br />
fi rst task. As we traveled, we discovered<br />
that we were in a poor neighborhood and<br />
did not match the racial norm for the<br />
area. As we moved on, trying to get out of<br />
the area in which we stood out so badly,<br />
I observed a young black man fl ashing<br />
gang signs behind Captain F’s back.<br />
Our challenge was enhanced by the<br />
presence of police. Police vehicles seemed<br />
to be pre-positioned at neighborhood<br />
boundaries. Even though my teammates<br />
and I were blending in as best as possible,<br />
we still stood out. In addition, I was<br />
uncertain whether law enforcement<br />
was in play. I didn’t know whether I<br />
was being scrutinized for participation<br />
in the exercise or simply for appearing<br />
suspicious. Either way, I needed to<br />
maintain a low profi le and avoid<br />
apprehension. As I turned onto a side<br />
street, a grey Crown Victoria paralleled<br />
me at a distance. I took another logical<br />
turn and was back in distant trail of<br />
Maj B in what I hoped appeared to be a<br />
natural chain of events.<br />
After several hours and several more<br />
tasks, our exercise was complete. My<br />
teammates and I had demonstrated most<br />
of the skills we were taught in the course.<br />
We had picked handcuff s and locks;<br />
hidden and moved through unfamiliar<br />
neighborhoods without money or<br />
transport; and acquired water and food.<br />
Finally, we rendezvoused with the other<br />
teams and instructors at the Chicago<br />
House of Blues. Frosty beer in hand, we<br />
relaxed after accomplishing our E&E<br />
mission.<br />
Exercise complete, it is apparent<br />
how many types of individuals would<br />
benefi t from this sort of training.<br />
Th omas Howes, Keith Stansell, and<br />
Marc Gonsalves endured more than<br />
fi ve years of humid, mosquito-fi lled<br />
days, shivering nights, and constant<br />
uncertainty as hostages before they were<br />
rescued by Colombian intelligence and<br />
special operations personnel on July 2,<br />
2008. 2 Numerous other contractors and<br />
soldiers have been captured, tortured,<br />
and executed around the world. Clearly,<br />
law enforcement offi cers and security<br />
personnel face similar risks. Ironically,<br />
civilians are targeted even more<br />
frequently.<br />
Each of these groups would benefi t<br />
from training that enhanced their ability<br />
to evade and resist capture. Any person<br />
involved in counter- or anti-terrorism<br />
work must evaluate the risks they face.<br />
Each individual must decide whether<br />
their skills and training are suffi cient or<br />
whether they need to be supplemented.<br />
One source of useful SERE skills is<br />
<strong>onPoint</strong> <strong>Tactical</strong>’s urban escape and<br />
evasion course. •<br />
1 Juan Forero, “Private U.S. Operatives<br />
on Risky Missions in Colombia,” New<br />
York Times, February 14, 2004.<br />
2 Tim Padgett, “Colombia’s Stunning<br />
Hostage Rescue,” Time, July 2, 2008.<br />
Stabilization Through Innovation<br />
The Bishop EMR-100<br />
Robotic directed energy stabilization tool designed for EOD and Bomb Technicians<br />
Impedes motion sensors and electronic devices without causing pre-detonation<br />
or destroying the circuitry<br />
www.pslhq.com<br />
info@pslhq.com<br />
China Lake, CA<br />
(760) 377-4400<br />
(760) 793-2449<br />
Circle 233 on Reader Service Card<br />
Circle 223 on Reader Service Card<br />
62 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 63
The Counter <strong>Terrorist</strong> ~ September/October 2008<br />
Circle 225 on Reader Service Card