29.11.2012 Views

Terrorist Threat INDICATORS - onPoint Tactical LLC

Terrorist Threat INDICATORS - onPoint Tactical LLC

Terrorist Threat INDICATORS - onPoint Tactical LLC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Counter<br />

Th e<br />

<strong>Terrorist</strong> <strong>Threat</strong><br />

<strong>INDICATORS</strong><br />

SEPTEMBER/OCTOBER 2008<br />

USA/CANADA $9.95<br />

Offi cial Journal of the Homeland Security Professional<br />

VOLUME 1• NUMBER 3<br />

SEPTEMBER/OCTOBER 2008<br />

An SSI ®<br />

Publication<br />

www.thecounterterroristmag.com<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 1


• Complements FirstDefender to maximize in-the-fi eld<br />

coverage of unidentifi ed chemicals including TICs/TIMs,<br />

chemical weapons, explosives and more<br />

• Ground-breaking design—fi ts in your hand, lightweight,<br />

yet rugged enough for fi eld use<br />

• Fast and easy to use—delivers accurate results in less<br />

than a minute, even for complex mixtures<br />

Made in the USA<br />

TruDefender FT<br />

When every second counts,<br />

reliable results are at your fi ngertips.<br />

From the makers of FirstDefender, the revolutionary<br />

TruDefender FT handheld FTIR system enables<br />

identifi cation of an even broader range of<br />

unknown chemicals—right in the hotzone.<br />

To register for an upcoming seminar:<br />

+1.978.642.1132 or www.ahurascientifi c.com/ct<br />

TruDefender | FT<br />

FTIR<br />

FirstDefender<br />

Raman<br />

Counter<br />

Th e<br />

CONTENTS<br />

COVER STORY:<br />

SEPTEMBER/OCTOBER 2008<br />

VOLUME 1• NUMBER 3<br />

Offi cial Journal of the<br />

Homeland Security Professional<br />

Circle 175 on Reader Service Card<br />

2 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 3<br />

24<br />

18<br />

34<br />

44<br />

24<br />

TERRORIST THREAT <strong>INDICATORS</strong><br />

by Richard Marquise<br />

FEATURES:<br />

6<br />

18<br />

34<br />

44<br />

50<br />

Case Study:<br />

NORD-OST A Mass Hostage Scenario<br />

by John Gidduck<br />

NYCWiN INTEROPERABLE COMMUNICATIONS<br />

by Henry Morgenstern<br />

HOW TERRORISTS EXPLOIT E-COMMERCE<br />

by Jennifer L. Hesterman<br />

JUST 2 SECONDS<br />

Using Time and Space to Defeat Assassins<br />

by Gavin de Becker, Tom Taylor and Jeff Marquart<br />

CIVILIAN STANDBY CT GROUPS (PART 1)<br />

by Mickey Hargaash<br />

DEPARTMENTS:<br />

4 From the Editor<br />

42 Book Review<br />

57 Did You Know?<br />

59 Training Review<br />

Cover Photo: Scott Morrison


FROM THE EDITOR:<br />

The Struggle<br />

Continues<br />

Welcome back to<br />

By Chris Graham<br />

W elcome back to Th e Counter <strong>Terrorist</strong>. In the time that has elapsed<br />

Wproliferation<br />

since our previous issue, the world has witnessed a continued<br />

proliferation of terrorist actions. More bombs have been detonated, more<br />

people have been killed. A range of groups have continued attempts to further<br />

their objectives by deliberately targeting civilians. Belligerent nations cultivate<br />

relationships with like-minded terror groups. In short, the struggle continues.<br />

As you receive this issue, we will also be commemorating the loss of our<br />

countrymen murdered on September 11, 2001. Th e 9/11 hijackings and<br />

attacks on the World Trade Center and pentagon are a watershed event. Th is<br />

event marks the fi rst occasion many Americans realized the extent of their<br />

vulnerability and the fact that people exist both committed to their destruction<br />

and unwilling to compromise. Let us take this moment in time to re-commit<br />

ourselves to hunting down these enemies and preventing circumstances likely to<br />

produce more of them.<br />

Congratulations are due to the intelligence and special operations personnel<br />

of Colombia. On July 2, they successfully rescued 15 hostages from the<br />

Revolutionary Armed Forces of Colombia (FARC) in a historically audacious<br />

operation. Th ree Americans held hostage for more than fi ve years were among<br />

the rescued.<br />

Coalition personnel have also experienced successes. Senior terrorists have<br />

been killed or captured in attempt to disrupt militant activities. Domestically,<br />

eff orts are ongoing. Surveillance of suspected terror group members continues.<br />

fi rst responders continue to train and prepare to prevent and respond to terrorist<br />

acts.<br />

Th e Counter <strong>Terrorist</strong> stands as a forum for communication for counter- and<br />

anti- terrorism professionals. In this issue you will fi nd some useful articles<br />

and products. Our cover story will provide identifi able indicators of terrorist<br />

activity. Not a 20 year old check-list; this piece will provide specifi cally useful<br />

information based on a detailed understanding of recent terrorist events from<br />

the perspective of an experienced CT investigator. Our Case Study will provide<br />

a close look into the degree of complexities faced in a large-scale hostage<br />

scenario undertaken by jihadi terrorists. I am confi dent that you will fi nd<br />

insight throughout the magazine. As always, Th e Counter <strong>Terrorist</strong> is here to<br />

assist in the refi nement of eff ective counter- and anti- terrorism eff orts.<br />

I look forward to hearing from you.<br />

Semper Fidelis,<br />

Chris Graham<br />

Editor of Th e Counter <strong>Terrorist</strong><br />

Counter<br />

Th e<br />

Offi cial Journal of the Homeland Security Professional<br />

VOLUME 1 • NUMBER 3<br />

SEPTEMBER/OCTOBER 2008<br />

Editor<br />

Chris Graham<br />

Director of Operations<br />

Sol Bradman<br />

Director of Advertizing<br />

Carmen Arnaes<br />

Director of Production<br />

Kelli Richardson<br />

Contributing Editors<br />

John Andrews<br />

Jennifer Hesterman<br />

Richard Marquise<br />

Chuck Pfarrer<br />

Graphic Design<br />

Morrison Creative Company<br />

Copy Editor<br />

Th omas Duxbury<br />

Offi ce Manager<br />

Lily Valdes<br />

Publisher:<br />

Security Solutions International<br />

Suite 204<br />

14300 SW 129th Street<br />

Miami, Florida 33140<br />

ISSN 1941-8639 Th e Counter <strong>Terrorist</strong><br />

Magazine, Th e Offi cial Journal of<br />

the Homeland Security Professional,<br />

is published by Security Solutions<br />

International <strong>LLC</strong>, as a service to the<br />

nation’s First Responders and Homeland<br />

Security Professionals with the aim of<br />

deepening understanding of issues related<br />

to Terrorism. No part of the publication<br />

can be reproduced without permission<br />

from the publisher. Th e opinions<br />

expressed herein are the opinions of the<br />

authors represented and not necessarily<br />

the opinions of the publisher. Please<br />

direct all Editorial correspondence related<br />

to the magazine to: Security Solutions<br />

International SSI, 14300 SW 129th<br />

Street, Suite 204, Miami, Florida. 33186<br />

or info@thecounterterroristmag.com Th e<br />

subscription price for 6 issues is $49.00<br />

and the price of the magazine is $9.95.<br />

(1-866-573-3999) Fax: 1-786-573-2090.<br />

For article reprints, e-prints, posters and<br />

plaques please contact:<br />

PARS International Corp.<br />

Web: www.magreprints.com/quickquote.asp<br />

Email: reprints@parsintl.com<br />

Phone: 212-221-9595 • Fax: 212-221-9195<br />

Please visit the magazine web site where you can<br />

also contact the editorial staff :<br />

www.thecounterterrroristmag.com<br />

© 2008 Security Solutions International<br />

3rd annual Gulf Coast<br />

Terrorism Prevention Conference<br />

A FULL WEEK OF COUNTER TERROR TRAINING<br />

Law Enforcement and Security Professionals education on combating terrorism<br />

1. Protecting Schools against terrorism<br />

2. Suicide bomber training<br />

3. Jihad 2.0 From Virtual to Reality<br />

4. Protecting Aviation<br />

5. Mall Safety<br />

6. Technologies against terrorism<br />

7. <strong>Threat</strong> of Radical Extremism in the USA<br />

September 15-19, 2008<br />

Hyatt Sarasota<br />

1000 boulevard of the arts<br />

Sarasota Florida USA<br />

Register at: www.homelandsecurityssi.com<br />

1-866-573-3999<br />

4 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 5<br />

Hosted by:<br />

Sponsored by:<br />

Th e<br />

Counter<br />

SSI<br />

® SECURITY<br />

SOLUTIONS<br />

INTERNATIONAL<br />

Circle 177 on Reader Service Card


Case Study:<br />

NORD-OST<br />

A MASS HOSTAGE SCENARIO<br />

By John Giduck<br />

Photographs for this article are derived from video footage shot by the hostage<br />

takers and provided by Russian Special Forces courtesy of Archangel Group.<br />

Before America confronts the fi rst mass-hostage siege<br />

on her soil she can prepare herself by looking at how a<br />

determined and coordinated enemy plans, prepares and<br />

executes such operations. For years, starting in June<br />

1995–just six months after Usama bin Laden sent ten top<br />

al Qaeda terrorist trainers and planners into Chechnya<br />

to take over the Islamist side of that confl ict–Russia<br />

suffered a long series of these sieges, where the lives of<br />

dozens and even hundreds hung in the balance.<br />

y October 2002 the world<br />

witnessed one of our terrorist<br />

enemy’s most complex<br />

operations for the taking and<br />

holding of innocent people.<br />

At that time, the taking of more than<br />

800 people at the Dubrovka–or Nord-<br />

Ost–Th eater in Moscow was the best plan<br />

yet executed, and we have much to learn<br />

from it. 1 By October 2002 the world<br />

witnessed one of our terrorist<br />

enemy’s most complex<br />

operations for the taking and<br />

holding of innocent people.<br />

At that time, the taking of more than<br />

As Lt. Col. Dave Grossman<br />

frequently lectures, when it comes to our<br />

enemies, “the best predictor of future<br />

behavior is past behavior.” Nor should<br />

it be lost on our nation that bin Laden<br />

himself has promised us that everything<br />

they are doing to Russia now, they will<br />

visit on America many times over. I had<br />

been engaged in a training program with<br />

the Ministry of International Aff airs<br />

(MVD’s) Vityaz Spetsnaz Anti-Terror<br />

Unit on the Balashikha Army Base<br />

approximately 50 km east of Moscow the<br />

week prior to the hostage taking. Vityaz,<br />

known as Krapovoi Bereti, or the Blood<br />

Red Berets, was one of the units tasked<br />

with responding to this crisis and we were<br />

in regular contact with them throughout.<br />

After the siege I was able to pay a visit to<br />

the theater itself.<br />

A spectacular musical, the fi rst ever<br />

all-Russian production of the Nord-<br />

Ost Th eater, had been playing for more<br />

than a year. A tall, modern building,<br />

the theater sits at the intersection of<br />

Dubrovka and Melnikova Streets, wide<br />

and open, tree-lined boulevards in north<br />

Moscow just a few kilometers from the<br />

Kremlin. Playing to a packed house, and<br />

enjoying overwhelming critical acclaim,<br />

the musical’s popularity continued in the<br />

days following its debut. At 9:05 p.m.<br />

on Wednesday, 23 October 2002, during<br />

the beginning of the second act, a masked<br />

man dressed in camoufl age stormed onto<br />

the stage, fi ring an AK-47 assault rifl e<br />

into the air. More Chechen terrorists,<br />

with bombs and automatic weapons,<br />

quickly appeared and took more than<br />

800 theatergoers, dancers, actors and<br />

production personnel, including many<br />

children, hostage. Th e performers were<br />

made to sit with the audience. At fi rst,<br />

many in the audience thought it was part<br />

of the show. Symbolically, the terrorists<br />

had waited until the scene in which<br />

actors, dressed in World War I Russian<br />

Air Force uniforms, were dancing.<br />

Female terrorists, seated in the audience<br />

throughout the performance, quickly<br />

donned black Muslim robes and veils,<br />

strapping explosive suicide belts about<br />

their waists.<br />

Th e terrorists had arrived in three<br />

SUV-type vehicles, which were left<br />

running outside as a fallback in the event<br />

their initial takeover proved unsuccessful.<br />

Strangely, no one who saw the driverless<br />

vehicles idling just outside the front<br />

Th e stage is stormed.<br />

At 9:05 p.m. on<br />

Wednesday, 23<br />

October 2002,<br />

during the beginning<br />

of the second act, a<br />

masked man dressed<br />

in camoufl age stormed<br />

onto the stage, fi ring<br />

an AK-47 assault rifl e<br />

into the air.<br />

6 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 7


We have come<br />

here to die, and<br />

you are going to<br />

die with us.<br />

An aspiring martyr displays her<br />

explosive device to the camera.<br />

doors seemed to think this suspicious.<br />

Th e selection of several large vehicles for<br />

delivery had been done before, and would<br />

ultimately be repeated at the Beslan<br />

Middle School No. 1 in southern Russia<br />

two years later.<br />

Th e entire theater was quickly rigged<br />

with explosives, including one major<br />

device in the center of the main seating<br />

area of the auditorium, and another in<br />

the balcony. Both were fashioned from<br />

large gas tanks taken from military<br />

vehicles. An additional 20 smaller bombs<br />

were spread throughout the theater, in<br />

addition to 25 suicide bombs strapped<br />

to the females. Th e Chechens had also<br />

brought with them 100 hand grenades.<br />

Th e women, part of the Black Widows<br />

and Fiancées of Allah, wore bomb belts,<br />

each containing 3 to 5 kilograms (6.6 to<br />

11 pounds) of explosives, wrapped with<br />

metal nuts, bolts and ball bearings. Th e<br />

women were constantly in the theater<br />

with the hostages, working in shifts, a<br />

schedule of terrorist control that would<br />

also be seen at Beslan. Th ey held the<br />

detonators–literally, the fate of their own<br />

lives and the hostages around them–in<br />

their hands.<br />

Th e Chechen leader was 25-yearold<br />

Mozar Barayev, though Russian<br />

intelligence determined that his original<br />

name was Barsayev. It was speculated<br />

that he had dropped the single “s”<br />

from his surname in order to create the<br />

impression there was some connection<br />

between him and the famed Chechen<br />

rebel leader Arbe Barayev. Others<br />

continue to insist that he was a cousin of<br />

the famous terrorist. Barayev demanded<br />

that Russia completely withdraw from<br />

Chechnya or all the hostages would die.<br />

He addressed the captives, telling them<br />

that Russia had just three days to pull<br />

out of Chechnya, and that if troops tried<br />

to storm the building it would be blown<br />

up. He also encouraged the hostages to<br />

use their cell phones to call police and<br />

loved ones, informing them of their dire<br />

situation and the steps necessary for the<br />

government to take in order for them to<br />

live.<br />

Th roughout the 58-hour ordeal the<br />

Chechens would periodically shoot their<br />

weapons into the theater ceiling, and<br />

scream across the auditorium to each<br />

other rather than utilize any type of<br />

conventional communication, fearing<br />

Spetsnaz (special operations forces)<br />

might intercept any communications<br />

system. Th is only had the eff ect of further<br />

terrifying an already inconsolable and<br />

panic-stricken 800-plus people. Prior to<br />

taking the theater, the terrorist group had<br />

videotaped a statement explaining why<br />

they were doing so: “Every nation has<br />

the right to decide their own fate. Russia<br />

has taken this right away from Chechnya.<br />

We have long waited for the world to<br />

notice that the innocent are dying in<br />

Chechnya. Th at women, children and the<br />

weak are being killed.”<br />

Barayev was the last to speak. Eyes<br />

down cast throughout his speech, he said:<br />

“Each of us is ready to give over life for<br />

Allah, and the freedom of Chechnya. I<br />

swear by Allah we desire death more than<br />

you desire life.” Th e hostages had been<br />

told: “We have come here to die, and you<br />

are going to die with us.” Th is haunting<br />

refrain would be repeated to the children<br />

of Beslan.<br />

Winter comes early in Russia. By<br />

10:00 o’clock that black, wet and frigid<br />

October night police and the Moscow<br />

contingents of several Special Forces<br />

units had surrounded the theater. Alpha,<br />

Vympel, the SOBR Rapid Reaction<br />

Force, and the famed Vityaz Anti-Terror<br />

group of the Interior Ministry had all<br />

responded to the call. Historically, Alpha<br />

and Vityaz had worked together, trained<br />

together, and had launched several<br />

successful joint operations in recent years.<br />

Vympel, with its focus on terrorist assault<br />

operations, was the newcomer to Russia’s<br />

8 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> Circle ~ September/October 237 on Reader Service Card<br />

2008


December 11-12 - Washington, DC<br />

November 17-18, 2008 - Chicago, IL<br />

November 20-21, 2008 - Washington, DC<br />

October 7-10, 2008 - Camp Blanding, FL<br />

November 4-7, 2008 - Anaheim, CA<br />

January 12-13, 2009 - Arlington, VA<br />

battle against terror on its own soil. Th e<br />

truth be known, the hostages could not<br />

have been in better hands. Within an<br />

hour of their arrival, 11:00 o’clock p.m.,<br />

the elite Spetsnaz forces had sealed off<br />

the entire area, leaving outer perimeter<br />

security to Vityaz and SOBR, in addition<br />

to the lesser trained police and other<br />

government units. Electricity was shut<br />

off to surrounding buildings and homes.<br />

Major Kontantin Komarov, a Russian<br />

Spetsnaz career offi cer, was an eightyear<br />

veteran of the Main Intelligence<br />

Directorate (GRU’s) 10 th Spetsnaz<br />

Brigade and seven-year commander<br />

with SOBR. Possessing a Ph.D. in<br />

psychology, he had been called in to<br />

begin psychological profi les of all the<br />

terrorists, particularly the women, to aid<br />

in the assault groups’ plans and determine<br />

the lengths to which the terrorists would<br />

likely go.<br />

Th e Spetsnaz were able to learn that<br />

the women were wearing all black<br />

burkas, face veils and headscarves. Th is<br />

was certainly not the cultural dress of<br />

Chechen women. All of the terrorists<br />

were wearing cravats with Arabic<br />

sayings written across their foreheads. In<br />

addition, the terrorists had hung a large<br />

Arabic fl ag in the theater. Chechens do<br />

not speak Arabic, and it was unlikely<br />

that any single one of them could have<br />

read the Arabic expressions of hatred<br />

they had adorned themselves and the<br />

theater with. Th is did not bode well for a<br />

peaceful resolution. All of this, together<br />

with the Palestinian-style suicide belts,<br />

demonstrated the Arabization of the<br />

Chechen cause and that this group of<br />

terrorists was well under the infl uence of<br />

an Arab-type terrorist policy.<br />

However, as would be seen at Beslan,<br />

appearances could not be allowed to<br />

incite fear. According to SOBR Col.<br />

Sergei Gritsenko, the women were<br />

ultimately found to have died their hair<br />

blonde and were wearing blue jeans under<br />

their dresses, signs they hoped to escape<br />

the holocaust that would eventually<br />

take their lives. While this was one<br />

expert’s opinion, and must be accorded<br />

commensurate consideration, it is just<br />

as likely that they had died their hair<br />

blonde and wore jeans in order to enter<br />

the theater with the other members of<br />

the audience, taking their seats without<br />

arousing suspicion. Police harassing<br />

Chechens, or anyone who appears to hail<br />

from the North Caucasus, is a constant<br />

occurrence in Moscow.<br />

Th en in the early morning hours<br />

of Th ursday, 24 October, a woman<br />

simply walked through the supposedly<br />

impenetrable security perimeter and<br />

marched into the theater. She was<br />

merely a citizen intent on speaking to<br />

the terrorist leader and demanding an<br />

end to the monstrosity. Th e terrorists,<br />

believing she was working for the special<br />

forces, took her out into the lobby and<br />

shot her fi ve times. Later they would<br />

demand that a team of physicians enter<br />

to treat the wounded, and they had<br />

them drag her body away. Despite the<br />

insistence of the Russian government<br />

publicly that she was merely a concerned<br />

citizen from the neighborhood, military<br />

offi cials would later tell me that she was,<br />

in fact, a Federal Security Service (FSB)<br />

intelligence offi cer who volunteered<br />

to enter the building in the hope that<br />

she could talk her way out with critical<br />

intelligence. 2<br />

Later that morning, Barayev, in<br />

communication with outside forces,<br />

threatened to begin killing groups of<br />

hostages within 48 hours if his earlier<br />

demands were not met. At this point,<br />

the negotiators attempted to persuade<br />

Barayev to release the children. He<br />

refused. Rather, he distributed cell<br />

phones to the child hostages, ordering<br />

them to call their parents and tell them<br />

not to let the government troops storm<br />

the building. Th ey were told to say<br />

<strong>Terrorist</strong> strapped with bombs and booby traps.<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 11<br />

Circle 251 on Reader Service Card


As the gas poured<br />

in, pandemonium<br />

broke out in the<br />

theater. Hostages<br />

began screaming.<br />

The male terrorists<br />

put on gas masks<br />

and took up position<br />

for the battle that<br />

was to ensue in the<br />

hallways outside.<br />

that if the parents organized televised,<br />

public demonstrations against the<br />

war in Chechnya, the kids would be<br />

released. Th e family members of the<br />

children quickly did so, but none of the<br />

government controlled TV stations would<br />

air them. Accordingly, Barayev reneged<br />

on his agreement, and the children<br />

remained.<br />

For all this, however, the male terrorists<br />

raped no women, and up to the time of<br />

the assault no hostage executions had<br />

been carried out. Still, one colonel with<br />

MChS, the Russian federal emergency<br />

services department, in full uniform and<br />

attending the play, was killed outright,<br />

as was another police offi cer. Another<br />

girl was reported to have taken some<br />

kind of drug due to the stress of the<br />

situation. It caused her to act out and<br />

she, too, was shot. On the second day<br />

two girls jumped from a second story<br />

window. One broke her leg on landing.<br />

A soldier came to help and he was shot<br />

and wounded, as was the other girl who<br />

had not been injured in the fall.<br />

As dawn came on that Th ursday–the<br />

fi rst morning of the siege–Alpha, Vympel<br />

and Vityaz commandos were already<br />

practicing storming the Nord-Ost<br />

Th eater at an identical building nearby.<br />

No one expected a peaceful outcome to<br />

this drama. Th e terrorists were constantly<br />

fearful they would be attacked through<br />

the roof of the theater and focused much<br />

of their attention in that direction. Th e<br />

hostages were forced to use the orchestra<br />

pit as a communal toilet.<br />

At 11:45 p.m. on Friday, 25 October,<br />

only seven hours remained until<br />

Barayev began executing hostages. He<br />

had been promised that Russian Army<br />

General Kazantsev, the highest profi le<br />

commander in the Chechen War, was<br />

coming to negotiate with them. Barayev<br />

said that if Kazantsev did not appear, he<br />

would begin “cutting the heads off ” the<br />

hostages and “throwing them outside.”<br />

In reality, the offi cials in charge of the<br />

situation had never even contacted<br />

Kazantsev. At 5:00 in the morning,<br />

Saturday, 26 October, the tasked special<br />

forces units fl ooded the theater with a<br />

fentanyl-enhanced gas which the U.S.<br />

government would identify as carfentanyl<br />

in 2007. Th e male terrorists, including<br />

the leaders, had positioned themselves in<br />

the corridors leading to the auditorium,<br />

rendering it impossible to give the order<br />

to the women to detonate their belt<br />

bombs; an act they were trained to not<br />

undertake absent an express order. As<br />

the gas poured in, pandemonium broke<br />

out in the theater. Hostages began<br />

screaming. Th e male terrorists put on<br />

gas masks and took up position for the<br />

battle that was to ensue in the hallways<br />

outside. Th e females had not been given<br />

masks, and they quickly succumbed to<br />

the gas. Alpha and Vympel, paired up<br />

with operators from Vityaz and SOBR,<br />

waited 30 full minutes from the delivery<br />

of the gas to assault the building. Other<br />

elements of Vityaz and SOBR were held<br />

in reserve. Th e assault launched at 5:30<br />

a.m. Th irty minutes later the battle<br />

was over and all of the terrorists were<br />

dead. Th e females, found seemingly<br />

unconscious in their seats, each received a<br />

bullet to the head.<br />

Th e Russian Special Forces would,<br />

receive criticism from an unrealistic<br />

international press for their shooting<br />

of the female terrorists. In reality, this<br />

was a tactic to be criticized only for<br />

its reliance on a single round, rather<br />

than redundancy for the sake of safety.<br />

Not everyone had succumbed to the<br />

fentanyl, and many of the hostages were<br />

found stumbling about. Th e female<br />

terrorists were found lying back in their<br />

seats, gripping the handles of their belt<br />

bombs and the detonators of the larger<br />

devices. Th ey could just as easily have<br />

been feigning sleep, awaiting the moment<br />

when government forces entered the<br />

theater before detonating all of the<br />

bombs, substantially increasing the body<br />

12 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 13<br />

Circle 181 on Reader Service Card


Inadequate medical support proved to be<br />

the undoing of an audacious operation<br />

count. Th is is standard al Qaeda training<br />

and doctrine: to draw in the rescuers<br />

before detonating major explosives,<br />

killing as many of the hostages and<br />

saviors as possible. Our own troops have<br />

seen this in Iraq and Afghanistan.<br />

Th at the storming of the Nord-Ost<br />

Th eater and the saving of these hostages<br />

would not go down in history as the<br />

single greatest hostage rescue in history<br />

was not the fault of the Russian Special<br />

Forces. Senior leaders had failed entirely<br />

to alert area hospitals that an assault<br />

of the building was to take place, or to<br />

inform doctors that gas was to be used.<br />

Once confronted with scores of aff ected<br />

gas victims, the government still refused<br />

to tell physicians what substance had<br />

been used, or that gas had been used<br />

at all. Moreover, no ambulances were<br />

in place and the entire area had been<br />

surrounded by enormous dump trucks,<br />

fi lled with sand, to absorb the blast in<br />

the event the terrorists blew the entire<br />

building up. Th e drivers of the trucks<br />

were long since gone, and no one had<br />

the keys. When word fi nally reached<br />

emergency services, the sand trucks<br />

and crowds prevented the ambulances<br />

from approaching the building. Many<br />

hostages, suff ering the eff ects of the gas,<br />

died in city buses, driving for hours while<br />

ignorant bus drivers sought hospitals they<br />

were unfamiliar with. Still others died<br />

when soldiers attempted to drag them<br />

outside to fresh air, pulling them along<br />

by their arms, allowing their heads to tilt<br />

back, suff ocating them.<br />

Despite all of this, the soldiers of<br />

Russia’s Special Forces managed to save<br />

more than 600 of the 800 hostages,<br />

losing 129, including many children. 3<br />

In the process they dispatched every<br />

single one of the 42 terrorists. It is a<br />

reminder of the grim reality of such<br />

situations to think that probably not<br />

a single one of those 129 would have<br />

died had the government prepared for<br />

the aftermath of the assault. Sadder<br />

still is the recognition that the Nord-<br />

Ost production was a show full of child<br />

performers. Th e terrorists knew this,<br />

planned the assault, and refused to release<br />

the children once taken. Who could not<br />

have seen this as a harbinger of things to<br />

come at Beslan two years hence?<br />

But these would not prove to be the<br />

only mistakes to be repeated at Beslan.<br />

One commander contends that a main<br />

mistake in Russia’s recent experiences in<br />

dealing with terrorist-hostage situations<br />

is a division between government units.<br />

He explains that at the siege, the FSB,<br />

through its “arms” Alpha and Vympel,<br />

unilaterally planned the assault and use<br />

of gas. Being in the loop, the Alpha<br />

and Vympel commandos entered the<br />

theater with gas masks. SOBR and<br />

Vityaz, MVD units, and to which the<br />

overall plan had not been fully disclosed,<br />

entered behind them–with no gas masks.<br />

Upon entering the building to neutralize<br />

terrorists and begin assisting the hostages,<br />

twelve operators from SOBR were<br />

stricken. Th is very failure to coordinate<br />

between government units would be a<br />

factor in the chaos that would ultimately<br />

engulf Beslan.<br />

How well America will deal with<br />

the tactical hurdles that our law<br />

enforcement–and perhaps even some<br />

military units–will confront upon our<br />

fi rst experience with this type of attack<br />

is dependent upon how willing we are<br />

to study our enemy’s operations in other<br />

countries. Any belief that a peaceful<br />

settlement will be negotiated is naïve.<br />

As a Russian Spetsnaz colonel once told<br />

me, when it comes to America there are<br />

only two guaranteed consequences of<br />

that attack: Th ere is going to be a battle,<br />

and people are going to die. All of the<br />

terrorists will die; they will allow no other<br />

solution. Some of the hostages will die,<br />

and there is nothing anyone can do to<br />

keep them all alive. Some will have been<br />

One analyst sees a doorknob.<br />

Another analyst sees a corroded doorknob.<br />

HS BOOST<br />

Homeland Security Bulletin of Open Source <strong>Threat</strong>s<br />

Circle 187 on Reader Service Card<br />

14 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />

•<br />

You see the signature of<br />

liquid explosives manufacturing.<br />

Open the door to higher intelligence—<br />

Get your monthly subscription to the very fi rst, threat-specifi c,<br />

actionable intelligence report in the USA For Offi cial Use Only.<br />

Subscription rates start at $499.00 per month.<br />

Get Your BOOST: Call Henry Morgenstern: 1-866-573-3999 Ext.105 • Mobile: 305-401-6906<br />

c o n t a c t @ s e c u r i t y s o l u t i o n s i n t . c o m • w w w . h o m e l a n d s e c u r i t y s s i . c o m


Circle 189 on Reader Service Card<br />

killed early on. And some of our rescuers<br />

are going to die.<br />

When it comes, our brave warriors<br />

who enter the building will be in an<br />

immediate deadly-force situation so<br />

long as a single terrorist is left alive. It<br />

cannot matter that they are “appearing”<br />

to surrender or are wounded. Th ey<br />

are trained to exploit American legal<br />

restraints and await our rescuers<br />

coming closer before detonating hidden<br />

explosives. Overall, the number and<br />

magnitude of fi rearms, explosives, booby<br />

traps and threats to hostages will stretch<br />

our units to their limits. Th e terrorists<br />

will arrive with a plan that likely was in<br />

the making for more than a year, based<br />

on near-perfect intelligence. Unless<br />

interdicted, we will only be able to react.<br />

How we react will depend on what we do<br />

to prepare now, for an attack like Nord-<br />

Ost on American soil. It may be a matter<br />

of when, and not if.<br />

if. •<br />

1 Portions of this article have been excerpted<br />

from an analysis of Russia’s recent terrorist<br />

mass-hostage sieges in the book, Terror At<br />

Beslan: A Russian Tragedy with Lessons<br />

for America’s Schools, available at<br />

www.antiterrorconsultants.org.<br />

2 Th e FSB is the current evolution of the<br />

former KGB.<br />

3 Four or fi ve were killed early on by the<br />

terrorists.<br />

ABOUT THE AUTHOR<br />

John Giduck is a senior consultant with the<br />

Archangel Group (www.antiterrorconsultants.<br />

org), providing training to U.S. law<br />

enforcement, government agencies and the<br />

military. He has a law degree and a master’s<br />

degree in Russian studies, and has worked with<br />

several Russian Special Forces units. He has<br />

authored the book Terror at Beslan<br />

Circle 229 on Reader Service Card<br />

Circle 191 on Reader Service Card<br />

16 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008


NYCWiN<br />

INTEROPERABLE<br />

COMMUNICATIONS<br />

By Henry Morgenstern<br />

A report on<br />

the New York<br />

City Wireless<br />

Network<br />

Innovations<br />

The tragedy of 9/11 made it clear that communications<br />

is one of the key weaknesses not just of New York, but of<br />

every city around the world. Consider some of the statements<br />

gleaned from the 1,613 taped conversations released by<br />

New York City offi cials in August 2006. These dialogues<br />

between fi rst responders and victims, which were recorded<br />

during the events of 9/11, clearly underline the vulnerability<br />

of the city’s communications systems.<br />

Photo: NYC DOITT<br />

T<br />

he tragedy of 9/11 made it clear<br />

that communications is one of the<br />

key weaknesses not just of New<br />

York, but of every city around the world.<br />

Consider some of the statements gleaned<br />

from the 1,613 taped conversations<br />

released by New York City offi cials in<br />

August 2006. Th ese dialogues between<br />

fi rst responders and victims, which were<br />

recorded during the events of 9/11,<br />

clearly underline the vulnerability of the<br />

city’s communications systems.<br />

In one of the tapes, for example, Chief<br />

Dennis Devlin of the New York City Fire<br />

Department’s Battalion 9 can be heard<br />

to remark, “We’re in a state of confusion.<br />

We have no cell phone service anywhere<br />

because of the disaster... Bring all the<br />

additional handy talkies.” Devlin was<br />

trying to get a rundown of which fi re<br />

companies had been dispatched to the<br />

burning World Trade Center. Sadly, he<br />

was still inside the south tower when it<br />

collapsed.<br />

Since 9/11 several large-scale projects<br />

have been initiated in an attempt to<br />

remedy such issues. One of the most<br />

spectacular eff orts, a project named<br />

NYCWiN, will make New York City a<br />

model of integrated communications.<br />

Th ere is every reason, of course,<br />

that New York City takes the threat of<br />

terrorism seriously. In fact, in response to<br />

the events of 9/11, the city has not only<br />

improved its communication system, but<br />

it has also created a complete counterterrorism<br />

division, including its own<br />

intelligence capability, within the NYPD.<br />

Th is division, which includes personnel<br />

stationed in hot spots around the world,<br />

rivals anything federal agencies can fi eld.<br />

“We remain a prime—if not the<br />

prime—target for al-Qaeda and other<br />

terrorist groups,” said Mayor Michael<br />

Bloomberg in testimony before Congress<br />

in 2007. Indeed, New York City’s<br />

large counter-terrorism force has so far<br />

managed to foil at least seven terrorist<br />

attempts, including an Islamic terror<br />

plot to blow up fuel-tank farms at John<br />

F. Kennedy International Airport. Th us,<br />

while most other cities spend their federal<br />

homeland security money on things like<br />

street lighting, New York means business<br />

when it comes to counter-terrorism.<br />

But no matter how elite New York’s<br />

counter-terrorism task force is, nor<br />

how prepared its police, fi re, emergency<br />

management, and transportation<br />

and traffi c departments are, none of<br />

these groups can function without a<br />

communications system built to resist<br />

tragedies such as 9/11 or Hurricane<br />

Katrina.<br />

I spoke to two people at New York<br />

City’s Department of Information<br />

Technology and Telecommunications<br />

(DOITT) to fi nd out exactly what is<br />

involved in the planning, requisitioning,<br />

and implementation of a system like<br />

NYCWiN. Although allotted a $500<br />

million budget and implementation time<br />

frame of fi ve years, it is believed that<br />

the project, which is being undertaken<br />

by homeland security giant Northrop<br />

Grumman, may eventually require up to<br />

15 years and $1.5 billion.<br />

First, I interviewed Paul J.<br />

Wireless call box. Photo: NYC DOITT<br />

Indeed, New York<br />

City’s large counterterrorism<br />

force has so<br />

far managed to foil<br />

at least seven terrorist<br />

attempts, including<br />

an Islamic terror<br />

plot to blow up fueltank<br />

farms at John F.<br />

Kennedy International<br />

Airport.<br />

18 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 19


So far, the system’s<br />

redundancy has been<br />

tested by simulated<br />

loads that exceed<br />

those of 9/11, and it<br />

has withstood the test.<br />

Cosgrave, who was appointed DOITT<br />

commissioner by Mayor Bloomberg in<br />

June 2006. With more than 30 years of<br />

experience, Cosgrave has the primary<br />

goal of making the power of technology<br />

available to both the public and private<br />

sector. In describing NYCWiN, Cosgrave<br />

stated the following:<br />

Our aim was to create a system<br />

that would provide our fi rst<br />

responders, police, fi re, EMS, and<br />

transportation [offi cials] with a better<br />

data communications infrastructure<br />

that will allow building plans to<br />

reach fi refi ghters, data on current<br />

developments to [reach] emergency<br />

management, communication [to<br />

occur] between the police (including<br />

[transmission of] graphic components<br />

like fi ngerprints), and will also allow<br />

the Department of Transportation to<br />

thoroughly control traffi c both on a<br />

daily basis and in emergencies—even<br />

severe ones.<br />

According to Cosgrave, New York’s<br />

diff erent agencies were all planning<br />

communications upgrades prior to 9/11,<br />

but once that day’s events highlighted the<br />

importance of interoperability, a citywide<br />

eff ort was requisitioned. “We learned a lot<br />

about the necessity of redundancy in the<br />

system from 9/11,” continues Cosgrave,<br />

“but we also learned how important...<br />

power supplies and the private cellular<br />

networks [are] at times of emergency.”<br />

Based on these lessons, NYCWiN<br />

is designed to support multiple,<br />

simultaneous transmission of full-motion<br />

video or large fi les to and from anywhere<br />

in the city; real-time tracking of all city<br />

vehicles and control of traffi c lights;<br />

continuous monitoring of air and water<br />

purity; transmission of patient vital signs<br />

from ambulances to receiving hospitals;<br />

and reliable voice communications to<br />

back-up radio and cell phone signals. So<br />

far, the system has been operational in the<br />

area below Canal Street.<br />

“We know the value of keeping the<br />

communications nodes working, because<br />

on 9/11, one of the lost nodes was put<br />

out near the towers,” notes Cosgrave.<br />

“Today, no site failing will have that eff ect<br />

on the network.” Similarly, according to<br />

Cosgrave, less visible events, such as small<br />

plane crashes and crane collapses, will<br />

also no longer cause cell phone network<br />

outages as a result of the implementation<br />

of NYCWiN.<br />

Of course, the amount of video<br />

processing that a city like New York<br />

has in play makes quality of service<br />

(QOS) and priority of service (POS)<br />

critical concepts in a system such as<br />

NYCWiN. For example, the New York<br />

Department of Transportation currently<br />

operates nearly 100 still and video<br />

cameras from its Traffi c Management<br />

Center in Long Island City, Queens; the<br />

Metropolitan Transportation Authority.<br />

Another 20 still and video cameras on<br />

the city’s major bridges and tunnels;<br />

and the New York Police Department<br />

operates several thousand cameras. Th e<br />

NYPD announced in July 2008 that<br />

it was seeking $90 million to deploy<br />

an additional 3,000 cameras in lower<br />

Manhattan.<br />

Th us, according to Brian Snodgrass of<br />

the DOITT, NYCWiN is not only built<br />

to foster video streaming, but also to<br />

ensure “a dynamic scheme for taking into<br />

account POS and QOS—for example,<br />

where we need to have critical laptops<br />

remain connected during an emergency.”<br />

Th is versatility also includes system<br />

scalability. Snodgrass worked at a private<br />

cellular provider during the 9/11 attacks<br />

and found that it was diffi cult to meet the<br />

immediate needs of getting 200 to 500<br />

phones activated immediately. “By having<br />

the system under the complete control of<br />

the city, we can mobilize those resources<br />

without going out to a third party,” says<br />

Snodgrass.<br />

Critics of NYCWiN have mentioned<br />

incompatibility as a possible problem<br />

associated with this system. According<br />

to Snodgrass, the system’s consistent IP<br />

interface opens it to transmission that<br />

would otherwise be incompatible. By<br />

utilizing gateway systems, NYCWiN<br />

should off er good access, if not complete<br />

interoperability. Th e system is also<br />

adaptable and can provide interfaces<br />

to equipment not compatible with the<br />

transmission network.<br />

“Th e Manhattan Security Initiative [a<br />

wide-ranging closed-captioned television<br />

network similar to the system in place<br />

in London] is just one example of the<br />

preventative side of the NYCWiN<br />

network,” says Cosgrave. “We are now<br />

working to link all kinds of monitoring<br />

and detection devices to the system and<br />

make results available system-wide. We<br />

are looking at radiological [monitoring],<br />

biological [monitoring], and more.”<br />

So far, the system’s redundancy has<br />

been tested by simulated loads that<br />

exceed those of 9/11, and it has withstood<br />

the test. Also, as previously mentioned,<br />

NYCWiN has been operational in lower<br />

Manhattan for some time. Th e robust<br />

system is already attracting the attention<br />

of other cities, including Oklahoma<br />

City, Tucson, and Washington, DC.<br />

In addition to its uses in terrorism<br />

prevention and response, some other<br />

features of NYCWiN that make this<br />

20 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 257 on Reader Service Card<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 21


system attractive include the following:<br />

• Water and electric utilities will<br />

be able to conduct meter reading<br />

without sending staff door to door.<br />

• Offi cials will be able to instantly<br />

locate and access any city vehicle,<br />

whether a patrol car, a bus, or a<br />

garbage truck.<br />

• Police will be able to locate pictures<br />

of suspects from their cars.<br />

• Fire chiefs will be able to watch<br />

live video of fi res taken from traffi c<br />

helicopters.<br />

• Inspectors will be able to look up<br />

building plans while at inspection<br />

sites.<br />

• Data can be sent 50 times faster<br />

than over current networks.<br />

• Satellite tracking devices can be<br />

shared around many diff erent<br />

applications.<br />

• Police and fi re offi cials will be able to<br />

see diff erent angles of a crime or fi re<br />

scene simultaneously.<br />

• All NYC employees will be part of a<br />

unifi ed communications network.<br />

It is hoped that New York, having<br />

suff ered so much, may be able to reach<br />

other municipal governments with their<br />

example, thus helping cities all over the<br />

country to do more to enhance fi rstresponder<br />

communications.<br />

SOME SPECS ON<br />

NYCWIN<br />

Th e original specifi cations for<br />

NYCWiN called for it to support<br />

multiple, simultaneous transmission<br />

of full-motion video or large fi les from<br />

and to anywhere in the city; real-time<br />

tracking of all city vehicles and control<br />

of traffi c lights; continuous monitoring<br />

of air and water purity; transmission of<br />

patient vital signs from ambulances to<br />

receiving hospitals; and reliable voice<br />

communications to back up radio and cell<br />

phone signals. Other specifi cs regarding<br />

this system include the following:<br />

• NYCWiN is not technically Wi-<br />

Fi, because it will use a licensed<br />

spectrum.<br />

• NYCWiN is not a WIMAX<br />

system, but it uses universal<br />

mobile telecommunications system<br />

technology on the 2.5 GHz band to<br />

provide a broadband data network<br />

and IP services.<br />

• NYCWiN York City is using IP<br />

wireless technology for their citywide<br />

safety network, with each cell site<br />

providing in-building coverage up to<br />

3 to 5 miles from the cell site in an<br />

urban setting. It operates in a single<br />

channel of 5 or 10MHz of spectrum<br />

and supports voice over IP with full<br />

QOS based on SIP. •<br />

September Mission: SOLD OUT!<br />

November Mission: November 14-21, 2008<br />

Circle 213 on Reader Service Card<br />

22 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />

Circle 215 on Reader Service Card


TERRORIST THREAT<br />

<strong>INDICATORS</strong><br />

By Richard Marquise<br />

Photo: Scott Morrison<br />

On September 5, 1972, Palestinian terrorists<br />

from the Black September Organization entered<br />

the world stage at the Olympic Games in<br />

Munich. Before it was over, 11 Israeli athletes<br />

were dead and the world was forever changed.<br />

I<br />

n the following weeks, the United<br />

States Government received<br />

information that a terrorist attack<br />

would occur within the United States.<br />

FBI agents familiar with the threat from<br />

the enemies of the time, the Soviet Union<br />

and China – the Communists—were<br />

dispatched to prevent it.<br />

Due to the large “Arab” population<br />

in the Dearborn, Michigan, area, agents<br />

began surveillances and conducted<br />

numerous interviews. Few of them<br />

understood the diff erence between<br />

Sunnis and Shiites or knew about the<br />

complex political situation in the Middle<br />

East. Th e police in Dearborn were<br />

unaware of the FBI activities in that<br />

community. Th e FBI believed it alone<br />

was equipped to deal with this threat,<br />

and since the information came from<br />

“intelligence” sources, it could not be<br />

shared. Fortunately we have come a long<br />

way since this time.<br />

Today, there are approximately 13,000<br />

FBI agents in the United States, not all<br />

of whom work terrorism. It is the great<br />

force multiplier of 800,000 federal,<br />

state, local and tribal law enforcement<br />

offi cers who will prevent the next act of<br />

terrorism. Th ese offi cers may encounter<br />

terrorist indicators during contact with<br />

the general public, through undercover<br />

operations, searches and car stops, as well<br />

as interviews, technical coverage and jail<br />

intelligence. Law enforcement analysts<br />

review large amounts of information<br />

and are a source of identifying pre-attack<br />

indicators. A knowledgeable general<br />

public can also identify and report<br />

indicators of terrorism.<br />

Not all terrorists look like the 19 men<br />

who hijacked airplanes on September<br />

11. Th ey look like each of us. John<br />

Walker Lindh, José Padilla, or any of<br />

the terrorists who have attacked targets<br />

in Russia, east Africa, the Philippines,<br />

India, Jordan, Pakistan, Indonesia, Spain<br />

or the United Kingdom over the past<br />

15 years are proof of this. While this<br />

makes an offi cer’s job more diffi cult, each<br />

must examine behaviors and activities,<br />

rather than appearance, to spot a terrorist<br />

planning an attack. <strong>Terrorist</strong>s plan,<br />

collect intelligence, acquire materials<br />

and exhibit certain behaviors during<br />

this process, which, if recognized, could<br />

prevent an act of terrorism.<br />

Th roughout our nation’s history,<br />

terrorism has been prevented by state<br />

and local offi cers. In late 1987, the<br />

chief of police in a small Vermont town<br />

arrested three Middle Eastern men near<br />

24 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 25


The planning stage<br />

is the best opportunity<br />

to prevent attacks,<br />

and it is through<br />

the recognition of<br />

indicators that law<br />

enforcement can stop<br />

an attack. Just as<br />

terrorists learn from<br />

previous attacks,<br />

law enforcement can<br />

study their methods to<br />

prevent future attacks.<br />

the Canadian border. It appeared that<br />

these men had circumvented the border<br />

crossing and later provided confl icting<br />

information in response to the chief’s<br />

questions. Investigation determined<br />

they were preparing to commit a terrorist<br />

attack in the United States. 1 Months<br />

later, a Japanese Red Army member was<br />

arrested by a New Jersey state trooper<br />

outside New York City en route to<br />

commit terrorist attacks. 2 Th e bombers of<br />

the Murrah Building in Oklahoma City<br />

and the Atlanta Olympic games in 1995<br />

and 1996, respectively, were arrested by<br />

state and local police offi cers just doing<br />

their jobs.<br />

Th ere are many challenges to<br />

preventing terrorism. Th ese include<br />

target displacement, sleeper cells and<br />

the fact the threat is ever-changing. Th e<br />

solution is to understand the threat,<br />

collect information and share it.<br />

<strong>Terrorist</strong> targets have changed.<br />

Historically, most attacks were symbolic,<br />

not designed to cause mass casualties,<br />

but simply send a message that terrorists<br />

could strike at will. Nonmilitary<br />

government institutions have traditionally<br />

been targeted. Police stations in America<br />

were attacked by domestic terrorists<br />

in the 1960s and 1970s. In Iraq, law<br />

enforcement and nonmilitary government<br />

entities are daily targets. Approximately<br />

17 percent of the 25,000 international<br />

terrorist attacks which occurred in<br />

2005-06 were directed against law<br />

enforcement. 3 Th e Murrah Building<br />

was targeted by domestic terrorists.<br />

Military facilities and specifi c individuals<br />

have been targeted by domestic and<br />

international terrorists throughout<br />

history. FBI Director Robert S. Mueller,<br />

in Congressional testimony, stated that<br />

future attacks will be against “economic<br />

targets such as aviation, the energy sector<br />

and mass transit; soft targets such as large<br />

public gatherings; and symbolic targets,<br />

such as monuments and government<br />

buildings.” 4<br />

United States law enforcement has<br />

had the al Qaeda manual or “playbook”<br />

for more than a decade. First discovered<br />

in the mid-1990s, one version says the<br />

best targets for spreading fear in the U.S.<br />

and Europe include skyscrapers, nuclear<br />

plants, and crowded football stadiums.<br />

It discusses hitting sites of sentimental<br />

value, including the Statue of Liberty,<br />

Big Ben and the Eiff el Tower, to generate<br />

intense publicity. Th eir targets include<br />

Jewish organizations and large gatherings<br />

to cause as many deaths as possible.<br />

Th is manual stipulates the strikes must<br />

be strong and have a wide impact on<br />

the population. 5 Th eir tactics are also<br />

outlined in the manual and include<br />

gathering information about the enemy<br />

(intelligence collection), kidnapping<br />

and assassinating enemy personnel, and<br />

how to respond to law enforcement<br />

contacts. Other sections are devoted to<br />

fi nding the ideal apartment and forging<br />

documents, as well as training in making<br />

chemical and biological weapons. 6 Every<br />

law enforcement offi cer should read this<br />

manual, a version of which is available<br />

on the Internet, in order to “know the<br />

enemy.”<br />

<strong>Terrorist</strong>s are opportunistic and<br />

will strike where we are vulnerable<br />

and inattentive, much as we were on<br />

September 11. Th e planning stage is the<br />

best opportunity to prevent attacks, and<br />

it is through the recognition of indicators<br />

that law enforcement can stop an attack.<br />

Just as terrorists learn from previous<br />

attacks, law enforcement can study their<br />

methods to prevent future attacks.<br />

<strong>Terrorist</strong>s surveil their targets. During<br />

an offi cer’s daily work, he or she may see<br />

unusual cameras, night-vision equipment,<br />

maps with targets highlighted, blueprints<br />

and law enforcement or terrorist training<br />

manuals. Offi cers may notice individuals<br />

loitering near or photographing<br />

potential targets. During 2004, offi cers<br />

from Baltimore County, Maryland,<br />

noticed individuals videotaping on the<br />

Chesapeake Bay Bridge, a major eastcoast<br />

route. Th ey tried to conceal their<br />

activities, but the offi cers spoke with<br />

them and shared the information with<br />

the Joint Terrorism Task Force (JTTF).<br />

Investigation determined the driver of<br />

their vehicle was a co-conspirator in a 15year<br />

scheme to fi nance terrorist activities<br />

in Israel for Hamas, a Palestinian terrorist<br />

organization. 7 Although Hamas has<br />

never conducted an attack in the United<br />

States, we have been a major source<br />

of funds for them. However, as the<br />

U.S. Government increasingly restricts<br />

fundraising, groups like Hamas have less<br />

and less reason not to conduct an attack.<br />

During the past several years,<br />

automatic weapons attacks have replaced<br />

bombings as the number one weapon<br />

of choice for international terrorist<br />

organizations. 8 If offi cers receive reports<br />

of thefts or unusual sales of weapons or<br />

ammunition, these should be shared with<br />

the JTTF. Th e same is true for reports of<br />

automatic weapons fi ring, theft or sale of<br />

body armor to non law enforcement, as<br />

well as any unusual paramilitary training.<br />

An alert offi cer in Skamania County,<br />

Washington, investigated reports of<br />

automatic gunfi re shortly after 9/11 and<br />

reported his fi ndings to the JTTF. Th is<br />

resulted in convictions of the “Portland<br />

Seven,” a group of American citizens who<br />

were preparing to go to Afghanistan and<br />

wage war on American troops. 9<br />

Since terrorists still use explosives<br />

to carry out attacks, any theft, sale or<br />

storage of explosive components should<br />

be shared with the JTTF. Vehicles are<br />

used to transport explosives, and reports<br />

about the modifi cation of cars, trucks or<br />

limousines should be shared. Th e same<br />

is true if information is received about<br />

individuals undergoing emergency room<br />

treatment for missing fi ngers, hands or<br />

chemical burns. Th ese may be indicators<br />

of terrorist bomb-making activity.<br />

In the fall of 2005, a University<br />

of Oklahoma student detonated a<br />

homemade bomb outside the school’s<br />

football stadium during a game attended<br />

by more than 80,000 people. It is not<br />

conclusively known whether the bomb<br />

detonated prematurely, whether he<br />

intended to take it into the stadium, or<br />

whether it was his intention to wait until<br />

the game was over and kill passersby. Th e<br />

investigation turned up no connection<br />

to terrorism, yet this young man had<br />

attempted to buy ammonium nitrate<br />

several days before he detonated his<br />

bomb. Th e bomb he made with easily<br />

obtainable items was similar to those used<br />

in the 2005 London subway attacks. 10<br />

Technology has made the creation of<br />

identifi cation documents easier and more<br />

diffi cult to detect. Legal documentation<br />

is often easy to acquire through illegal<br />

means, but others counterfeit driver’s<br />

licenses, vehicle registrations and license<br />

plates, identifi cation cards, social security<br />

cards, as well as immigration documents,<br />

visas and passports. Each document<br />

should be questioned and offi cers should<br />

look for alterations. Compare the<br />

individual with the photograph on the<br />

document presented. Ask where the<br />

document was obtained, and inquire as<br />

to citizenship and place of birth. If the<br />

offi cer is unable to ascertain whether the<br />

documents are legitimate, have an expert<br />

verify them.<br />

Offi cers may come upon evidence<br />

that drug proceeds support terrorist<br />

organizations. Th e Madrid train attacks<br />

in 2004 may have been in part fi nanced<br />

through the sale of drugs. 11 In South<br />

America, there is a close relationship<br />

between drug traffi ckers and terrorist<br />

organizations. 12 Because terrorists<br />

must fi nance their operations and most<br />

governments are making concerted eff orts<br />

to seize assets and shut down fund-raising<br />

mechanisms, “routine” criminal activity is<br />

one way they can earn money.<br />

State sponsors and nongovernmental<br />

organizations have historically funded<br />

terrorist operations. As governments<br />

have clamped down on these activities,<br />

terrorists have turned to various criminal<br />

enterprises. Th ese include credit- and<br />

telephone-card fraud, traffi cking in stolen<br />

property, counterfeiting, bank- and<br />

mail-fraud schemes, as well as selling<br />

counterfeit designer clothing, high end<br />

beauty products, CDs and DVDs.<br />

In the late 1990s, a deputy sheriff in<br />

North Carolina was working security at<br />

a cigarette mart. He noted that some<br />

men were regularly purchasing large<br />

quantities of cigarettes. Engaging them<br />

in conversation, he learned they were<br />

taking them to Michigan where taxes<br />

were ten times those of North Carolina.<br />

26 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 27


He initially reported this information<br />

to the Bureau of Alcohol, Tobacco and<br />

Firearms (ATF). Investigation soon<br />

determined these men were fund raisers<br />

for Hezbollah, an Iranian-backed terrorist<br />

organization, which, before September<br />

11, 2001, had killed more Americans<br />

than any other international terrorist<br />

organization. Th e FBI and ATF worked<br />

together and brought down this group,<br />

a major Hezbollah cell, which had<br />

transferred $8 million to the Middle<br />

East. Th e observations of one alert police<br />

offi cer had disrupted a major terrorist<br />

fund-raising cell. 13<br />

In addition to cigarette smuggling<br />

schemes, law enforcement offi cers should<br />

be alert for baby-formula and grocerystore<br />

coupon fraud, as well as individuals<br />

having connections to foreign charities.<br />

Offi cers should also be aware of<br />

individuals having multiple forms<br />

of identifi cation during car stops,<br />

contacts and searches. In addition, they<br />

should be alert for individuals having<br />

law enforcement or terrorist training<br />

manuals, radical literature, maps which<br />

have possible targets highlighted, as well<br />

as unusual photographs or decals and<br />

bumper stickers.<br />

When interacting with an individual,<br />

the offi cer is the expert on the scene.<br />

Based on his or her experience, the<br />

offi cial may see things that appear to be<br />

unusual. If something appears unusual<br />

to the expert on the scene, it probably<br />

is and should be shared with the JTTF if<br />

it appears to be terrorist related.<br />

We have not seen suicide bombing<br />

in the United States, however, Pakistan<br />

had only one suicide bombing prior to<br />

2007, yet had 59 attacks during that year<br />

alone. 14 Many believe it is only a matter<br />

of time before a suicide bomber strikes<br />

in our country. Th e Israelis have studied<br />

suicide bombers in depth and include<br />

the following as telltale signs of a possible<br />

suicide bomber. Th ey:<br />

• Conduct boundary probing (how<br />

close can they get to the target?)<br />

• Wear heavy clothing to hide<br />

explosives regardless of the season<br />

• Display a robotic gait or nervously<br />

look around<br />

• Show signs of tunnel vision and are<br />

not responsive to commands<br />

• Give the appearance of being<br />

drugged<br />

• Wear too much cologne or have<br />

other unusual smells<br />

• Carry a large backpack<br />

• Have wires protruding from sleeves<br />

or hands in pockets (for detonator)<br />

• Have a fresh shave or make other<br />

15 16<br />

attempts to “blend in.”<br />

While these indicators may be<br />

appropriate to Israel, other suspicious<br />

behavior outlined in this article may be<br />

more applicable to a suicide bomber in<br />

the United States. In 2004, the Capitol<br />

police in Washington believed if suicide<br />

bombers struck America, they would<br />

target the U.S. Capitol. Th at agency<br />

has documented a plan to deal with<br />

suicide attackers. Police offi cers receive<br />

comprehensive training on when and<br />

how to use deadly force. However, few<br />

are trained to deal with a suicide bomber.<br />

Every law enforcement department is<br />

encouraged to develop a plan to deal with<br />

a suicide attacker. Th is plan should be<br />

written and practiced, and every offi cer<br />

should be aware of its contents.<br />

Almost every terrorist attack in<br />

history was presaged by indicators which<br />

should have been recognized and acted<br />

upon by law enforcement. Ahmed<br />

Ressam, the “Millennium Bomber,” was<br />

arrested in December 1999 by a U.S.<br />

Customs inspector. Ressam’s activities<br />

had been noticed by law enforcement<br />

and intelligence offi cials in two countries<br />

before he ever arrived at the U.S. border.<br />

An Algerian, he arrived in Canada via<br />

France in February 1994, and although<br />

he possessed false documentation, he<br />

was welcomed and provided with social<br />

assistance. Ressam failed to appear for<br />

his immigration hearing and became<br />

involved in criminal activity.<br />

A French magistrate, investigating<br />

the al Qaeda threat in France, told the<br />

Canadians about Ressam. Although the<br />

Canadians monitored Ressam and his<br />

colleagues’ telephone conversations, they<br />

did not consider them a threat. Th ey<br />

learned that Ressam, who had acquired<br />

another identity, was on his way to<br />

“camp” in Afghanistan. He spent most<br />

of 1998 there learning to make bombs.<br />

Ressam returned to Canada via Los<br />

Angeles, and despite spending nearly a<br />

year in Afghanistan, and having been the<br />

focus of Canadian and French authorities,<br />

he was on no one’s radar. He drove to<br />

western Canada and began assembling<br />

his bombs at a motel. While there for<br />

several weeks, no one noticed that he left<br />

windows open, did not allow maid service<br />

into his room, and had strange odors<br />

emanating from the room. It took the<br />

last line of defense, an American customs<br />

inspector, to arrest him because numerous<br />

Almost every<br />

terrorist attack<br />

in history was<br />

presaged by<br />

indicators which<br />

should have been<br />

recognized and<br />

acted upon by<br />

law enforcement.<br />

Circle 241 on Reader Service Card<br />

28 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 29


precursors were ignored. 17 She prevented<br />

a signifi cant attack at the Los Angeles<br />

International Airport.<br />

Th e events of September 11th have<br />

been widely detailed. Indicators leading<br />

to this attack began as early as the murder<br />

of Meir Kahane by El Sayyid Nosair in<br />

1990. During their investigation, the<br />

New York City Police Department and<br />

the FBI recovered 47 boxes of documents,<br />

mostly written in Arabic. Th ey were not<br />

translated or analyzed until after the 1993<br />

World Trade Center attack. Some believe<br />

examining them could have prevented<br />

this attack. Ramzi Yousef, a Pakistani,<br />

had entered the United States a few<br />

months before with false documentation.<br />

Like Ressam in Canada, he had been<br />

allowed into the country. Working with a<br />

local cell, Yousef designed the plan which<br />

he hoped would topple both towers,<br />

killing 50,000 people. Following the<br />

attacks he fl ed to Pakistan. 18<br />

In December 1994 terrorists in Algeria<br />

hijacked an Air France plane hoping to<br />

fl y it into the center of Paris (one target<br />

No one can<br />

afford to lose<br />

focus and believe<br />

the prevention<br />

of terrorism will<br />

be handled by<br />

someone else.<br />

in the al Qaeda manual is the Eiff el<br />

Tower). French commandos were able to<br />

kill the hijackers prior to their carrying<br />

out the plan. 19<br />

In January 1995 authorities in the<br />

Philippines encountered Yousef. He<br />

was plotting to destroy 11 airliners<br />

over the Pacifi c using an innovative<br />

liquid explosive. Yousef’s partner later<br />

confessed to wanting to fl y a plane into<br />

CIA Headquarters, among other targets.<br />

Yousef escaped but was arrested two<br />

months later in Pakistan. One of the<br />

plotters in the Filipino plan was Yousef’s<br />

uncle Khalid Sheikh Mohammed, the<br />

mastermind of 9/11. 20<br />

In March 1995 the fi rst of the al<br />

Qaeda manuals was found, which<br />

outlined the targets of the organization.<br />

Other copies were also found: in the<br />

United Kingdom in 2000, and then in<br />

Afghanistan in 2001. Th e manual stated<br />

that among their targets were skyscrapers,<br />

but the information contained in it was<br />

not widely disseminated.<br />

In January 2000 intelligence agencies,<br />

including the CIA, surveilled a meeting<br />

in Malaysia of senior al Qaeda offi cials.<br />

Because information was not shared with<br />

American law enforcement, two of the<br />

men freely traveled to Los Angeles and<br />

San Diego, where they lived, attended<br />

local mosques and took fl ight lessons.<br />

On 9/11, they would be among the 19<br />

hijackers. 21<br />

In July 2001 an FBI agent in Arizona<br />

documented that Middle Eastern men<br />

were taking fl ying lessons and that he<br />

believed they should be investigated. 22<br />

For fear of being accused of racial<br />

profi ling, nothing was done, despite the<br />

information contained in the al Qaeda<br />

manual, the documents seized in New<br />

York, and the events aboard the Air<br />

France fl ight and in the Philippines. A<br />

month later, another pilot, Zacharias<br />

Moussaoui, attracted attention in a fl ight<br />

school in Minnesota and was arrested on<br />

immigration charges. Each of the above<br />

circumstances, taken individually, meant<br />

little. Collectively the entire plot could<br />

be seen. Th e 9/11 Commission report<br />

detailed the failures of American law<br />

enforcement and intelligence agencies<br />

to share information which may have<br />

prevented the attacks.<br />

Since the breakup of the Soviet Union,<br />

Chechens have tried to establish an<br />

independent Muslim state in southern<br />

Russia. In the early 1990s, Chechen<br />

terrorists invaded a school and later<br />

hijacked a school bus. Teachers and<br />

students in both cases were held for<br />

ransom. 23 Chechen terrorists also<br />

assassinated and kidnapped government<br />

offi cials, military leaders and soldiers.<br />

On August 18, 2004, the Russian<br />

security service reported that an attack by<br />

terrorists was imminent in North Ossetia<br />

(near Chechnya). On August 28 there<br />

were specifi c reports that terrorists had<br />

infi ltrated the North Ossetian town of<br />

Beslan. In the week before the raid, three<br />

terrorist attacks, including two airline<br />

bombings, had killed 100 people. At<br />

5:00 am on September 1, an informant<br />

in Chechnya advised authorities that<br />

an attack would take place at one of the<br />

four schools in Beslan that morning.<br />

Although the warning was target- and<br />

time-specifi c, as school opened at<br />

9:30 a.m., 32 armed men and women<br />

overtook the lone, unarmed police offi cer<br />

assigned to guard the facility. Th e offi cer<br />

had no radio or cell phone. Th e siege<br />

ended on September 3 with the deaths<br />

of 31 terrorists and approximately 332<br />

others, including 186 children. 24<br />

Each of these attacks may have been<br />

prevented if there had been proper<br />

analysis and sharing of information.<br />

Ressam should have been stopped before<br />

he reached the Washington-Canadian<br />

border. Two of the 9/11 hijackers<br />

should never have been allowed to live<br />

unimpeded in the United States for two<br />

years. Th e Phoenix memo should have<br />

been perceived as an eff ort to conduct<br />

good solid investigation, not one for<br />

profi ling. If authorities in Russia had<br />

taken the information they received<br />

in August and early September more<br />

seriously, they may have prevented the<br />

terrorists from taking over the school in<br />

Beslan.<br />

Recognition of events before they<br />

occur can prevent acts of terrorism. Just<br />

seeing them will not be enough, however.<br />

Information has to be collected, analyzed<br />

and shared with the appropriate entity,<br />

the JTTF. Th ere are now more than 100<br />

of them in the United States. Th e JTTFs<br />

must also share information with their<br />

local, state and tribal counterparts. It is a<br />

two-way street.<br />

Th ere have been many successes in<br />

America and around the world since<br />

the events of September 11, 2001. Law<br />

enforcement and intelligence agencies<br />

have disrupted dozens of planned attacks,<br />

and many arrests have been made.<br />

However, disruptions get far less attention<br />

than successful attacks, and it would<br />

be incorrect to assume the problem<br />

of terrorism has gone away. No one<br />

can aff ord to lose focus and believe the<br />

prevention of terrorism will be handled<br />

by someone else.<br />

Terrorism aff ects us all, regardless of<br />

whether we live in a major metropolitan<br />

area or a rural state. It is in our national<br />

interest to prevent the next act of<br />

terrorism, before anyone else loses his<br />

or her life, property is destroyed, and<br />

all of us are fi scally impacted. It can be<br />

done if the 800,000 federal, state, local<br />

and tribal law enforcement offi cers see<br />

themselves as a force multiplier and<br />

watch for indicators. In addition to the<br />

police, an informed public can also report<br />

suspicious activities. Once observed,<br />

Buildings are targeted as an opportunity for infl icting mass casualties. Photo: SSI<br />

information should be shared with the<br />

JTTF, as well as with each other.<br />

Law enforcement and intelligence<br />

agencies around the globe should examine<br />

their relationships with each other. Every<br />

agency should put offi cers in a position to<br />

recognize the indicators of terrorism, then<br />

collect, analyze and share information<br />

to keep each of our communities safe.<br />

Federal, state, local and tribal offi cers, the<br />

great force multiplier, are our fi rst line of<br />

defense against future acts of terrorism.<br />

Each can make a diff erence. •<br />

NOTES:<br />

1 Jeff rey J. Martel, “America’s Last<br />

Line of Defense,” interview with Chief of<br />

Police Richard Jewett, 2006.<br />

2 Oliver B. Revell, “International<br />

Terrorism in the United States,” Th e<br />

Police Chief magazine, March 1989.<br />

3 National Counterterrorism<br />

Center reports retrieved 3/29/08 from<br />

nctc.gov.<br />

4 Robert S. Mueller, FBI Director,<br />

testimony before the Senate Select<br />

Committee on Intelligence, January 11,<br />

2007.<br />

5 Hamza Hendawi, “Manual<br />

Teaches How to Kill Th ousands,” Th e<br />

Milwaukee Journal Sentinel, Sentinel February 2, 2002.<br />

6 Al Qaeda Manual, Manual Author<br />

unknown.<br />

7 Gretchen Parker, “Hamas<br />

Suspect Arrested After Wife Videotapes<br />

Chesapeake Bay Bridge,” Th e Milwaukee<br />

Journal Sentinel, Sentinel August 25, 2004.<br />

8 National Counterterrorism Center<br />

“Reports on Incidents of Terrorism 2005.”<br />

9 Terence P. Jeff rey, “<strong>Terrorist</strong><br />

Blamed His Failure on Bush,” February<br />

2006, retrieved March 23, 2007. from<br />

http://www.discoverthenetworks.org/<br />

Articles/<strong>Terrorist</strong>%20Blamed%20His%20<br />

Failure%20on%20Bush.html<br />

10 Nolan Clay and Randy Ellis, “No<br />

Terror Link Seen So Far in Blast; OU<br />

Tightens Security After Death Outside<br />

Stadium,” Th e Daily Oklahoman, October<br />

5, 2005.<br />

11 Mar Roman Associated<br />

Press, “Madrid Train Bombing Trial<br />

Begins,” February 16, 2007, retrieved<br />

March 23, 2007 from http://www.<br />

suburbanchicagonews.com/couriernews/<br />

news/260019.3_1_EL16_A5SPAIN_<br />

S1.article<br />

12 Mark S. Steinitz, “Th e Terrorism<br />

and Drug Connection in Latin America’s<br />

Andean Region,” Policy Papers on the<br />

Americas, Volume XIII, Study 5, July 2002.<br />

13 Author interview with Deputy<br />

30 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 31


Sheriff Robert Fromme, Iredell County<br />

Sheriff ’s Department, North Carolina,<br />

December 11, 2003.<br />

14 Khuram Iqbal, “Drivers of<br />

Suicide Terrorism in Pakistan,” RSIS<br />

Commentaries, February 27, 2008.<br />

15 International Association of Chiefs<br />

of Police Training Key #581, retrieved<br />

on March 23, 2007, from http://www.<br />

theiacp.org/pubinfo/IACP581SuicideBo<br />

mbersPart1.pdf<br />

16 Neil Livingstone, “Th e Detection<br />

and Prevention of Suicide Bombings,”<br />

Total Integrated Preparedness Solutions,<br />

Volume I, Number 10, May 18, 2005.<br />

17 Hal Bernton, Mike Carter, David<br />

Heath and James Neff , “Th e <strong>Terrorist</strong><br />

Within: Th e Story Behind One Man’s<br />

Holy War Against America,” Th e Seattle<br />

Times, June 23-July 7, 2002.<br />

18 Peter Lance, “Triple Cross,” (New<br />

York, Regan , 2006), page 58.<br />

19 Peter Lance, “Triple Cross,” (New<br />

York, Regan, 2006), page 188.<br />

20 Th e 9/11 Commission Report, Report July<br />

2004, page 491.<br />

21 Th e 9/11 Commission Report, Report July<br />

2004, page 182.<br />

22 FBI FD-302 of SA Kenneth<br />

Williams, July 10, 2001, retrieved<br />

March 23, 2007 from http://www.<br />

thememoryhole.org/911/phoenix-memo/<br />

23 Paul Murphy, “Th e Wolves of<br />

Islam,” (Dulles, Virginia, Brassey, 2004)<br />

pages 242-243.<br />

24 John B. Dunlop, “Beslan, Russia’s<br />

9/11?” Th e American Committee for<br />

Peace in Chechnya and the Jamestown<br />

Foundation, October 2005.<br />

ABOUT THE AUTHOR<br />

Richard A. Marquise is a Senior<br />

Research Associate with the Institute for<br />

Intergovernmental Research and teaches<br />

in the State and Local Antiterrorism<br />

Training (SLATT) program. He also<br />

teaches for the U.S. Department of State<br />

in the Anti Terrorism Assistance Program<br />

and has assisted the countries of Pakistan,<br />

Kenya, Serbia and the Philippines in<br />

creating and training their terrorist task<br />

forces. Mr. Marquise is a retired FBI agent<br />

who has had extensive counterterrorism<br />

experience. He led the American task force<br />

that investigated the bombing of Pan Am<br />

Flight 103 over Scotland and is the author<br />

of Scotbom: Evidence and the Lockerbie<br />

Investigation, Algora, 2006.<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

32 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 207 on Reader Service Card<br />

The Counter <strong>Terrorist</strong> The Counter ~ September/October <strong>Terrorist</strong> 2008 33<br />

<br />

<br />

<br />

<br />

Circle 247 on Reader Service Card


How <strong>Terrorist</strong>s and Criminals<br />

EXPLOIT<br />

E-COMMERCE<br />

To Store and Move Money<br />

By Jennifer L. Hesterman<br />

All good investigators know the value of the money trail<br />

to an investigation. Whether tracing a petty fund in a<br />

continuing criminal enterprise or millions of dollars moved by<br />

an international terrorist group, an investigator can learn a<br />

great deal about the unique story of an operation by paying<br />

attention to the origin, path, and destination of the money.<br />

Often, this story yields evidence that allows infi ltration of the<br />

group, identifi cation of its key players, and ultimately, the<br />

eradication of the organization or one of its cells.<br />

Photo: Scott Morrison<br />

A lthough improved technology<br />

has greatly improved the<br />

Alife<br />

quality and ease of daily<br />

life in recent years, it is not without its<br />

problems. One downside to technological<br />

advances is that terrorists and criminals<br />

are users, just like law-abiding citizens.<br />

With this new technology comes<br />

innovative means to move, store, and<br />

liquidate funds, often in ways that<br />

are not transparent or detectable.<br />

Unfortunately, as corporations continue<br />

to rush cutting-edge products to market,<br />

technology is sometimes fi elded without<br />

complementary safeguards to prevent<br />

exploitation by individuals who are<br />

engaged in illegal activities. Th e emerging<br />

nexus between telecommunications<br />

technology and illicit fi nancial<br />

transactions is one such area of concern.<br />

A lthough improved technology<br />

quality<br />

NEW PAYMENT METHODS<br />

Th e Financial Action Task Force<br />

(FATF) is an intergovernmental body<br />

that works internationally to combat<br />

money laundering and terrorist fi nancing<br />

(ML/TF). In recent years, the FATF<br />

has become increasingly concerned over<br />

so-called “new payment methods,” or<br />

NPMs. 1 NPMs, also referred to in the<br />

fi nance industry as “e-money,” “digital<br />

cash,” or “e-cash,” facilitate the transfer<br />

of value between individuals and<br />

organizations by way of the Internet,<br />

cellular phones, or other electronic<br />

methods.<br />

It is important to note that e-cash was<br />

intended to be analogous to physical cash<br />

by design; thus, it off ers unconditional<br />

anonymity and is impossible to trace<br />

because payments are not linked to a<br />

particular customer account. Other<br />

benefi ts associated with the use of e-cash<br />

include rapid transaction times and the<br />

ability to accumulate value. Obviously,<br />

these characteristics make NPMs<br />

appealing to those engaged in nefarious<br />

activity.<br />

Common examples of NPMs include<br />

the following:<br />

• Internet payment services.<br />

Th rough privately held companies labeled<br />

by the FATF as “nonbanks,” Internet<br />

payment services allow users to pay bills<br />

online, make purchases at participating<br />

websites, buy and sell items from auction<br />

sites, and contribute to charities. Niche<br />

companies have also emerged that serve<br />

markets not engaged by larger providers,<br />

such as Internet gambling sites. Setting<br />

up an account with a nonbank is simple<br />

and requires little personal data, most of<br />

which can easily be fabricated. Money<br />

may be accumulated in a nonbank<br />

account; then, when the account’s owner<br />

is ready, the balance can be liquidated<br />

in several ways, including through<br />

untraceable debit cards that can be used<br />

to withdraw cash from ATMs worldwide.<br />

Notably, a few nonbanks operate<br />

globally, and their transactions can cross<br />

borders. Such companies need only<br />

follow licensing and regulatory guidance<br />

in the countries in which they are based.<br />

Th erefore, the regulations that apply to<br />

The ease of<br />

obtaining and<br />

using open system<br />

cards opens the<br />

door for “smurfi ng,”<br />

a money-laundering<br />

activity in which<br />

criminals spread<br />

a great deal of<br />

cash across many<br />

sources, concealed<br />

from regulators and<br />

law enforcement.<br />

34 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 35


individual nonbanks vary and directly<br />

correlate to the strength of the rule of law<br />

in each nonbank’s host nation, as well as<br />

whether ML/TF is an area of concern or<br />

focus in that country. Of further concern<br />

are off shore nonbanks, which off er even<br />

more anonymity to customers and fewer<br />

restrictions on transaction limits.<br />

• Stored value cards. Th is popular<br />

category of NPM includes phone, retail,<br />

and credit cards that can be purchased<br />

with cash at many grocery and drug<br />

stores. Th e owners of these cards remain<br />

anonymous, an unlimited number of<br />

cards may be purchased and held by<br />

one person, and any subsequent use is<br />

virtually untraceable. Stored value cards<br />

can be divided into two types:<br />

• Limited-purpose or closedsystem<br />

cards. Th is category consists of<br />

merchant-issued gift cards and calling<br />

cards. Such cards can only be used<br />

for specifi c purposes, may have an<br />

expiration date, and usually cannot be<br />

reloaded. However, there is still a ML/<br />

TF risk associated with these cards.<br />

In particular, an unlimited amount of<br />

cards can be purchased anonymously<br />

with cash and then sold through online<br />

auction sites, with the value transferred<br />

to a nonbank for subsequent<br />

liquidation through an untraceable<br />

ATM card.<br />

• Multipurpose or open-system<br />

cards. Of much greater ML/TF risk<br />

are multipurpose or open-system<br />

stored value cards, which bear the<br />

name of a major credit card company<br />

and may also be purchased with cash<br />

in unlimited quantities. Value can be<br />

added to these cards through an online<br />

nonbank or with cash at a participating<br />

retailer. Th en, when the cardholder<br />

is ready to cash out, money can be<br />

withdrawn from most ATMs, or these<br />

cards can be sold online with payments<br />

being laundered through the nonbank.<br />

As long as the amount doesn’t exceed<br />

the $10,000-per-day threshold that<br />

necessitates generation of a currency<br />

transaction report (CTR), such<br />

transactions will occur off the radar<br />

screen, with no documentation.<br />

Th e ease of obtaining and using<br />

open system cards opens the door<br />

for “smurfi ng,” a money-laundering<br />

activity in which criminals spread a<br />

great deal of cash across many sources,<br />

concealed from regulators and law<br />

enforcement. Indeed, the multipurpose<br />

card industry is booming; in fact, the<br />

National Drug Intelligence Center’s<br />

2006 threat assessment indicates<br />

there are already more than 7 million<br />

MasterCard and Visa prepaid debit<br />

cards in circulation. 2<br />

• E-purse. Unlike a stored value<br />

card, which has a magnetic strip, an<br />

e-purse stores value directly on a card<br />

itself using a microchip. Currently,<br />

the most popular e-purses are the socalled<br />

“smart cards” used for public<br />

transportation, tollbooths, parking<br />

garages, and vending machines. Th ese<br />

cards can be reloaded with cash at<br />

specialized vending machines and are<br />

also sold through online auctions.<br />

In addition, many cell phones will<br />

soon be transformed into e-purses<br />

through new technology that imbeds<br />

debit or credit card information into<br />

the phones’ SIM cards. Th is method,<br />

dubbed “mobile ticketing,” will<br />

allow users to simply tap their phone<br />

against a terminal to complete a sales<br />

transaction. 3<br />

• Mobile payments. Th e State<br />

Department recently issued its latest<br />

International Narcotics Control Strategy<br />

Report, 4 which includes a new section<br />

entitled “Mobile Payments—A Growing<br />

Th reat.” 5 Th is document sounds the<br />

alarm on a new type of remittance<br />

method with an extremely high ML/TF<br />

risk.<br />

Mobile payments, also known as “mpayments,”<br />

“proximity payments,” or<br />

“micropayments,” are point-of-sale cash<br />

transactions made through a mobile<br />

device such as cell phone or personal<br />

data assistant. Th e sender takes the cash<br />

to a remittance center, which charges<br />

a modest service fee. Th e center then<br />

“sends” the amount to the recipient’s<br />

mobile account, also known as an ewallet.<br />

Th e recipient gets a text message<br />

on his or her mobile device indicating<br />

that the sum has been placed in the<br />

account. Th e cash can then be collected<br />

at any participating remittance center,<br />

retail store, or, if business evolves as<br />

predicted, fast-food outlet. Although the<br />

entire transaction takes mere minutes,<br />

the ML/TF implications are tremendous<br />

and inevitable.<br />

One of the world’s leading<br />

information technology research and<br />

advisory companies, Gartner, Inc.,<br />

predicts that mobile payment services are<br />

just beginning to take hold, with today’s<br />

projected 32.9 million users worldwide<br />

swelling to 103.9 million users by 2011. 6<br />

Th ese services are heavily marketed to<br />

segments of the world population that<br />

are unbanked or underbanked due to the<br />

cost of maintaining accounts or a lack<br />

of access to banking facilities. Consider<br />

the fact that over 3 billion people in the<br />

world have mobile phones, but only 1<br />

billion people have bank accounts; 7 given<br />

these statistics, the market for mobile<br />

payment services is vast.<br />

Th e recent intersection of two popular<br />

NPMs has also led to emerging ML/TF<br />

concerns. Specifi cally, a partnership<br />

between a major Internet payment service<br />

and a global cellular phone company now<br />

allows the instantaneous transfer of funds<br />

directly between nonbank accounts.<br />

Use of a “throw-away” cell phone,<br />

anonymously purchased with cash,<br />

will make any of type of m-payment<br />

transaction even more obscure and<br />

diffi cult to trace.<br />

• Digital precious metals. Finally,<br />

another NPM worth watching is the<br />

emerging practice of using digital<br />

precious metals as a way to store and<br />

move large amounts of currency.<br />

Th rough this service, users create an<br />

account and then secure cash deposits<br />

against gold, silver, and platinum. Th e<br />

major companies engaging in this NPM<br />

actually hold vaulted precious metal in<br />

the name of the investor, employing<br />

major companies such as Brinks for<br />

security. Gold is the most popular<br />

product on the market, with over $1<br />

billion worth of transfers through the<br />

e-gold Ltd., corporation in 2007 alone. 8<br />

Notably, Brinks stores over 48,000 fi ne<br />

troy ounces of gold purchased online in<br />

their vaults located around the world. 9<br />

Similarly, e-dinar, an off shoot and<br />

former partner of e-gold, provides a<br />

unique, niche service. Since 1992, the<br />

company has minted its own gold Islamic<br />

dinar to provide its customers a means<br />

of exchange in line with the religious<br />

specifi cations found in the Koran.<br />

Th erefore, the Islamic dinar retains a<br />

unique fungibility and can be directly<br />

used to pay zakat and dowry as required<br />

by Islamic law. 10<br />

Th e FATF reports that some<br />

companies in this international business<br />

allow investors to remain anonymous. 11<br />

Indeed, a quick Internet query yields<br />

Similarly, e-dinar, an<br />

offshoot and former<br />

partner of e-gold,<br />

provides a unique, niche<br />

service. Since 1992, the<br />

company has minted its<br />

own gold Islamic dinar<br />

to provide its customers<br />

a means of exchange<br />

in line with the religious<br />

specifi cations found in<br />

the Koran.<br />

36 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 37


several sites that indicate metals may be<br />

purchased using a nonbank account and<br />

possibly even with untraceable stored<br />

value credit cards.<br />

CRIMINALS AND<br />

TERRORISTS ARE<br />

TURNING TO NPMS<br />

Evidence shows that those individuals<br />

and groups engaged in criminal or<br />

terrorist-related activities are already<br />

turning to NPMs as a way to move and<br />

store money. In fact, the number of<br />

suspicious wire transfers in previously<br />

heavy markets is down, perhaps as a<br />

result of an increase in the use of NPMs<br />

to move money.<br />

• Ample evidence of exploitation.<br />

Several high-profi le cases confi rm<br />

that NPMs are attractive to criminals<br />

and terrorists. Examples include the<br />

following:<br />

• In 2008, Indonesian police<br />

reported that radical Islamic terrorists<br />

were observed selling phone cards,<br />

generating upwards of $500 per day to<br />

fund operations. 12<br />

• A Mexican criminal caught at the<br />

U.S. border in 2005 was using stolen<br />

credit cards to transfer value to prepaid<br />

cards. 13<br />

• In 2001, a suspicious activity<br />

report (SAR) fi led in the United<br />

States detailed the acquisition of more<br />

than 300 prepaid cards by a single<br />

individual who used them to transfer<br />

almost $2 million to Colombia. 14<br />

• In 2004, German tax investigators<br />

discovered a case of ML through<br />

prepaid cards. Two participants of a<br />

criminal fraud/embezzlement scheme<br />

had transferred parts of their shares<br />

of the criminal proceeds onto several<br />

prepaid cards. In this case, more<br />

than €350,000 were hidden and<br />

laundered. 15<br />

• Members of the criminal<br />

networking site “Shadowcrew” used egold<br />

to send and receive payments for<br />

illicit goods and services. 16<br />

• Cards as a form of payment for illicit<br />

activity. In lieu of traceable currency,<br />

stored value cards are becoming the<br />

preferred form of payment for illegal<br />

services rendered. Some examples in<br />

which these cards were used are as<br />

follows:<br />

• A joint Immigration and Customs<br />

Enforcement/Internal Revenue Service<br />

investigation uncovered a relationship<br />

between a U.S. criminal organization<br />

and a Mexican co-conspirator who<br />

was creating fake credit cards. Th e coconspirator<br />

was paid for his assistance<br />

with retail gift cards. He then sold the<br />

gift cards and moved the cash back<br />

across the U.S. border to buy phone<br />

cards, which were then smuggled into<br />

Mexico in a separate operation. 17<br />

• Th e U.S. Drug Enforcement<br />

Agency uncovered an operation in<br />

which drug dealers were loading cash<br />

onto prepaid cards and then sending<br />

the cards to suppliers outside of the<br />

country, who in turn liquidated the<br />

funds using ATMs. 18<br />

• In 2005, U.S. Immigration<br />

and Customs Enforcement offi cials<br />

initiated an investigation into a state<br />

employee in Ohio who was selling<br />

fraudulent drivers’ licenses and<br />

identifi cation cards in exchange for<br />

prepaid telephone cards. 19<br />

• Stored value cards are a smuggling<br />

risk. Th e smuggling of bulk currency out<br />

of the United States is on the rise, and<br />

according to offi cials, it is “the largest and<br />

most signifi cant drug money laundering<br />

threat facing law enforcement.” 20 Many<br />

experts believe that prepaid stored value<br />

cards are now an attractive alternative<br />

to bulk cash smuggling. 21 Cards are not<br />

subject to the same rules as cash at the<br />

border. For instance, cards cannot be<br />

seized if the amount carried exceeds the<br />

$10,000 threshold and is not properly<br />

declared.<br />

Cards can easily be smuggled without<br />

detection onboard a commercial aircraft,<br />

train, bus, or ship. Th ey are lighter<br />

in weight and more compact than a<br />

bundle of equivalent-value paper bills.<br />

Th ese physical properties, along with<br />

easy, anonymous acquisition and lack of<br />

regulatory guidance, make cards the ideal<br />

smuggling mechanism.<br />

THE BATTLE AHEAD<br />

Th e potential exploitation of NPMs<br />

by criminals and terrorists is a global<br />

problem; thus, it must be addressed<br />

with a comprehensive set of regulatory<br />

guidelines that are adhered to by all<br />

parties. Until this massive undertaking<br />

is realized, self-regulation within the<br />

industry would be a positive step<br />

forward. Most importantly, there must<br />

be ongoing dialogue between counterterrorism<br />

experts who research emerging<br />

ML/TF risks and operators on the front<br />

lines, as each group has information the<br />

other needs to ensure a united, relevant,<br />

and uncompromising strategy in the War<br />

on Terror.<br />

Traditional money laundering makes<br />

“dirty” money “clean” after a crime<br />

has been committed; today, however,<br />

terrorists are increasingly laundering<br />

“clean” money by moving and storing<br />

it for the purposes of fi nancing training<br />

and future operations. No matter<br />

which type of laundering a criminal<br />

organization conducts, that group<br />

stands to benefi t from the nexus<br />

between telecommunications, for-profi t<br />

Circle 205 on Reader Service Card<br />

38 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008


HONOR your<br />

FINEST and<br />

BRAVEST with<br />

QUALITY<br />

www.libertyartworks.com<br />

888-411-7744<br />

Proudly Made in the U.S.A<br />

Circle 195 on Reader Service Card<br />

“nonbanks,” and the banking industry.<br />

Th e lack of physical evidence in mobile<br />

transactions, compounded by the ease<br />

of moving and storing money through<br />

various NPMs, should be of great<br />

concern to policy makers and the law<br />

enforcement community alike. •<br />

ABOUT THE AUTHOR<br />

Jennifer Hesterman is a retired Air Force<br />

colonel. She is currently a senior analyst for<br />

Th e MASY Group, a global intelligence and<br />

risk Management fi rm, as well as a professor<br />

at American Military University, teaching<br />

courses in homeland security and intelligence<br />

studies. Her book, Transnational Crime and<br />

the Criminal-<strong>Terrorist</strong> Nexus was published<br />

in 2005.<br />

NOTES:<br />

1 Financial Action Task Force,<br />

Report on New Payment Methods (Paris:<br />

Author, 2006), http://www.fatf-gafi .org/<br />

dataoecd/30/47/37627240.pdf (accessed July<br />

22, 2008).<br />

2 U.S. Department of Justice National<br />

Drug Intelligence Center, “Prepaid Stored<br />

Value Cards: A Potential Alternative to<br />

Traditional Money Laundering Methods”<br />

(Johnstown, PA: Author, 2006), http://www.<br />

usdoj.gov/ndic/pubs11/20777/20777p.pdf<br />

(accessed July 22, 2008).<br />

3 George Smith Alexander, “It’s Time<br />

to Shop through Cell Phones,” Rediff .com,<br />

December 22, 2003, http://in.rediff .com/<br />

money/2003/dec/22betterlife.htm?zcc=ar<br />

(accessed July 22, 2008).<br />

4 United States Department of State,<br />

International Narcotics Control Strategy Report<br />

(Washington, DC: Author, 2008), http://<br />

www.state.gov/p/inl/rls/nrcrpt/2008 (accessed<br />

July 22, 2008).<br />

5 United States Department of State,<br />

“Mobile Payments—A Growing Th reat,”<br />

in International Narcotics Control Strategy<br />

Report, vol. 2 (Washington, DC: Author,<br />

2008), http://www.state.gov/p/inl/rls/<br />

nrcrpt/2008/vol2/html/101346.htm (accessed<br />

www.gartner.com/it/page.jsp?id=652308<br />

(accessed July 22, 2008).<br />

7 “Mobile Phones to Send Money Home,”<br />

BBC News, February 12, 2007, http://news.<br />

bbc.co.uk/2/hi/business/6353797.stm<br />

(accessed July 22, 2008).<br />

8 e-gold Ltd., “e-gold Benefi ts,” http://<br />

www.e-gold.com/benefi ts.html (accessed July<br />

22, 2008).<br />

9 e-gold Ltd., “Gold Held by the e-gold<br />

Bullion Special Purpose Trust Stored at<br />

Brinks,” http://www.e-gold.com/examiner_<br />

blowup.asp?id=400&metal=1 (accessed July<br />

22, 2008).<br />

10 e-dinar, “What Is the Dinar?” http://<br />

www.e-dinar.com/html/1_2.html (accessed<br />

July 22, 2008).<br />

11 Financial Action Task Force, Report on<br />

New Payment Methods.<br />

12 Eva C. Komandjaja, “Indonesia:<br />

<strong>Terrorist</strong>s ‘Selling Phone Cards,’” Jakarta<br />

Post, Post November 22, 2005, http://www.<br />

asiamedia.ucla.edu/article-southeastasia.<br />

asp?parentid=34173 (accessed July 22, 2008).<br />

13 Chester Dawson, “Prepaid Cards:<br />

Candy for Criminals?” BusinessWeek.<br />

com, December 12, 2005, http://www.<br />

businessweek.com/magazine/content/05_50/<br />

b3963115.htm (accessed July 22, 2008).<br />

14 Financial Action Task Force, Report on<br />

New Payment Methods.<br />

15 Ibid. Ibid<br />

16 Brian Grow, “Gold Rush,” BusinessWeek.<br />

com, January 9, 2006, http://www.<br />

businessweek.com/magazine/content/06_02/<br />

b3966094.htm (accessed July 22, 2008).<br />

17 U.S. Immigration and Customs<br />

Enforcement, “Prepaid Cards an Emerging<br />

July 22, 2008).<br />

Th reat,” Cornerstone Report, Report December 2006,<br />

http://www.ice.gov/doclib/pi/cornerstone/pdf/<br />

CS1206.pdf (accessed July 22, 2008).<br />

18 http://www.ice.gov/doclib/pi/<br />

cornerstone/pdf/CS1206.pdf<br />

19 Financial Action Task Force, Report on<br />

New Payment Methods.<br />

20 U.S. Department of the Treasury, et<br />

al., 2007 National Money Laundering Strategy<br />

(Washington DC: Author, 2007), http://<br />

www.treas.gov/press/releases/docs/nmls.pdf<br />

(accessed July 22, 2008).<br />

6 Gartner, Inc., “Gartner Says Worldwide 21 U.S. Department of Justice National<br />

Mobile Payment Users to Total 33 Million in Drug Intelligence Center, “Prepaid Stored<br />

2008,” press release, April 21, 2008, http://<br />

Circle 197 on Reader Service Card<br />

40 The Counter <strong>Terrorist</strong> ~ September/October 2008<br />

Value Cards.”<br />

Circle 209 on Reader Service Card<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008


BOOK REVIEW<br />

<strong>Terrorist</strong> Recognition Handbook,<br />

Second Edition by Malcolm Nance Reviewed by: Chris Graham<br />

A<br />

fter returning from my<br />

third tour of duty in Iraq,<br />

I generally avoided books on<br />

the ongoing war in that country. I was<br />

extremely unimpressed with the accuracy<br />

and perspective of the accounts that<br />

were provided by major news outlets<br />

and many publishers. It often<br />

seemed to me that the U.S. Central<br />

Command issued orders based on<br />

this fl awed reporting. Th e only thing<br />

I was certain of was that little of<br />

the “conventional wisdom” seemed<br />

consistent with what I observed<br />

on the ground in Iraq, living with<br />

Iraqis, conducting operations, and<br />

patrolling.<br />

Th is changed when I encountered<br />

Malcolm Nance’s book Th e <strong>Terrorist</strong>s<br />

of Iraq. To my surprise, this volume<br />

accurately captured my perspective<br />

on encounters with members of<br />

various terror groups in Iraq and<br />

provided additional information<br />

I was unaware of. Nance’s book<br />

refl ected lessons learned by “grunts”<br />

in the fi eld, even if this knowledge<br />

hadn’t always fi ltered uphill.<br />

Furthermore, Nance went into<br />

signifi cant detail, off ering little<br />

that I could dispute. Th us, when I<br />

learned that the second edition of<br />

Nance’s <strong>Terrorist</strong> Recognition Handbook:<br />

A Practitioner’s Manual for Predicting and<br />

Identifying <strong>Terrorist</strong> Activities (CRC Press/<br />

Taylor and Francis Group, 2008) had<br />

been released, I immediately requested a<br />

copy.<br />

Nance did not gain his insight by<br />

earning a PhD and watching CNN;<br />

rather, he is a 20-year veteran of<br />

intelligence operations in the Balkans,<br />

the Middle East (including Iraq and<br />

Afghanistan), and Africa. As a result, the<br />

<strong>Terrorist</strong> Recognition Handbook is truly<br />

a “practitioner’s manual,” as its subtitle<br />

indicates. Broken into six sections, this<br />

volume off ers a wealth of information for<br />

any security, law enforcement, military,<br />

or intelligence personnel involved in<br />

counter-terrorism and anti-terrorism<br />

operations.<br />

In section one of the <strong>Terrorist</strong><br />

Recognition Handbook, entitled “Know<br />

the <strong>Terrorist</strong>,” Nance begins with<br />

a discussion of critical awareness,<br />

including how to identify operatives,<br />

profi le suspects, and understand terrorist<br />

training, motivation, and beliefs. Th is<br />

section is essential in that it demystifi es<br />

the terrorist from a phantom-like enigma<br />

while simultaneously discouraging the<br />

equally detrimental belief that<br />

terrorists are incompetent human<br />

caricatures.<br />

Later portions of the text<br />

expand on many of the topics<br />

introduced in section one. For<br />

example, section two, “Identifying<br />

the <strong>Terrorist</strong> Group and Its<br />

Cells,” explores how these groups<br />

organize themselves, while section<br />

three, “Detection of Key <strong>Terrorist</strong><br />

Activities,” examines the typical<br />

signatures of terrorist actions.<br />

Discussion of the processes by<br />

which terrorists acquire safe<br />

houses, money, and transportation<br />

reveals the level of coordination<br />

necessary to support their eff orts.<br />

Also of particular note is Chapter<br />

12, which discusses equipment and<br />

other indicators that may reveal<br />

a group’s intended use of nuclear,<br />

biological, or chemical materials.<br />

In section four, “Predicting<br />

an Attack,” the activities of our<br />

opponents are further revealed. After<br />

noting that attacks are preceded by<br />

surveillance, Nance discusses the elements<br />

of surveillance in depth. Infi ltration<br />

techniques, as well as the decision-making<br />

processes used by terrorist groups, are<br />

analyzed. Perhaps the most useful portion<br />

of this section—indeed, of the book<br />

as a whole—is Chapter 17, “Point of<br />

Danger: Law Enforcement Traffi c Stops<br />

and Encountering <strong>Terrorist</strong>s.” Because<br />

the patrol offi cer is far more likely to<br />

encounter militant activity than other<br />

specialized personnel, this chapter<br />

provides a number of detection ideas that<br />

can be implemented in the fi eld. Finally,<br />

this section concludes with Chapter 18,<br />

“Point of Failure: <strong>Terrorist</strong> Operations<br />

and Tactics.” Th is chapter discusses the<br />

types of terrorist action that may unfold<br />

if not detected and interdicted in earlier<br />

stages. In doing so, this piece familiarizes<br />

the reader with a wide range of attack<br />

methods previously employed and likely<br />

to be implemented in the future.<br />

Nance closes out the textual portion<br />

of his book with section fi ve, “Th e New<br />

Field of Terror,” which explores several<br />

key developments in modern terrorism.<br />

Individual chapters are devoted to the<br />

examination of al-Qaeda and related<br />

worldwide movements, to suicide<br />

terror and its implementation, and to<br />

major developments in the Iraq War<br />

between 2003 and 2008. Finally, in<br />

section six, Nance provides a number<br />

of supplemental resources, including<br />

a bibliography, a list of known global<br />

terror groups, and checklists for explosive<br />

materials.<br />

Malcolm Nance has acquired a level<br />

of understanding that surpasses that<br />

of many senior government offi cials<br />

with regard to the topics of terrorism,<br />

Iraq, and Afghanistan, and he shares his<br />

vast knowledge with us in the second<br />

edition of the <strong>Terrorist</strong> Recognition<br />

Handbook. Th ough Nance withholds<br />

some technological details for security<br />

purposes, this book is an excellent<br />

introduction to terrorist methodologies<br />

for both vigilant fi rst responders<br />

and personnel who are preparing for<br />

deployment. •<br />

If you<br />

read one<br />

book on<br />

radical<br />

Islam this<br />

year, read<br />

this!<br />

$12.95<br />

plus shipping<br />

Circle 193 on Reader Service Card<br />

To order go to:<br />

www.wakeupamerica.ws or Amazon.com<br />

Or, call Woodmont Publishers at 561-441-5484<br />

Circle 249 on Reader Service Card<br />

42 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 43


JUST 2 SECONDS<br />

Using Time and Space to Defeat Assassins<br />

By Gavin de Becker,<br />

Tom Taylor, and Jeff Marquart<br />

NOW<br />

This is not the time for thinking. This is not the time for planning.<br />

This is the time for action. It is 2:25 PM on March 30, 1981, and<br />

the system of Presidential appearances is chugging along just<br />

fi ne, at least by all appearances.<br />

A group of people behind a slender cordon is waiting to see<br />

President Reagan walk to his car. Some are waiting to get a<br />

closer look at him, some are waiting to photograph him, others<br />

are waiting to call out questions, and one is waiting to kill him.<br />

T he media reporters and<br />

Tof<br />

technicians are part of the system<br />

of Presidential appearances. Political<br />

promoters like them to be close,<br />

protectors like them to be far away,<br />

and presidents don’t like them at all.<br />

Nonetheless, they are part of the system,<br />

and this afternoon, they are helping to<br />

conceal John Hinckley, who is not part of<br />

the system. Not yet anyway.<br />

In a second or two, Hinckley’s actions<br />

will cause the system’s gears to grind<br />

as they try to digest something new:<br />

bullets. Th e assailant has six bullets in<br />

his handgun, and he’s about to fi re them<br />

all. When this happens, some people will<br />

fl inch and duck, some will fall, others will<br />

stand tall. John Hinckley will become<br />

part of the system, his quality-control test<br />

improving it in the long run, but having<br />

terrible consequences in the short run.<br />

Th e President walks out of the hotel.<br />

Th ough Hinckley glimpses him for just<br />

an instant, he draws the gun and begins<br />

fi ring. At the sound of the fi rst gunshot,<br />

nobody standing on the sidewalk of the<br />

Washington Hilton Hotel recognizes<br />

what is happening—nobody other than<br />

Hinckley, that is. For some, it takes<br />

another shot and seeing people fall. For<br />

others, it will take all six shots to call their<br />

minds into this moment.<br />

Since the attack began and ended<br />

in less than two seconds, it’s easy to<br />

understand how some people who<br />

were right there had no idea what had<br />

happened until afterwards. Just two<br />

seconds, and the shooting was over. Th is<br />

book is entirely about those tiny fractions<br />

of time. Th ese pages do not explore<br />

44 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 45<br />

T he<br />

the planning that precedes attacks,<br />

the rationale behind them, the nature<br />

of conspiracy, the social and cultural<br />

conditions that foment them, or the<br />

psychology of attackers—all important<br />

topics that have been addressed in other<br />

books. We are concerned here only with<br />

events at the scene of the attack, during<br />

the attack.<br />

Th ere are many disciplines that break<br />

events down to their elements. When<br />

judging a guitar, for example, experts<br />

listen for four things in particular,<br />

described by the term ASDR:<br />

Attack ttack (the fi rst sound that comes from<br />

the instrument when a note is played),<br />

Sustain (how long the instrument<br />

body holds the pure sound of the note),<br />

Decay (how long it takes the sound<br />

to die), and Release (the end of the<br />

sound).<br />

Our scrutiny must be as precise, given the<br />

stakes. Were this a book for pilots, it would<br />

be about crashes and near-crashes, not<br />

about routine fl ight, aircraft maintenance,<br />

nor navigation. Instead, it would explore<br />

the lessons that present themselves from<br />

the moment an aircraft comes out of<br />

stable fl ight until the moment the incident<br />

ends—such incidents always ending in one<br />

of two ways: Th e pilot regains control, or<br />

the aircraft crashes.<br />

Th e moment protective operations<br />

come out of stable fl ight is usually<br />

marked by the sound of gunfi re. In most<br />

of the hundreds of incidents we studied,<br />

that sound is what led protectors to know<br />

an attack had commenced. However,<br />

there’s an event before the sound of<br />

gunfi re that actually marks the start of<br />

From the Moment<br />

of Commitment<br />

onward, the<br />

overwhelming<br />

majority of public<br />

fi gure attacks are<br />

over in less than fi ve<br />

seconds. Within just<br />

those few seconds,<br />

all the damage that<br />

will be done has<br />

been done.


an attack: the Moment of Commitment.<br />

Th at’s the instant in which an assailant<br />

fi rst takes an obvious action likely to<br />

reveal intent, an action from which he<br />

cannot easily retreat. It might be his<br />

bringing a gun into view, or pushing<br />

forward through the crowd, jumping<br />

onto the stage, or raising his arm with a<br />

knife, but whatever it is, he knows he’s<br />

not likely going home when his act is<br />

over. It is this Moment of Commitment<br />

that starts the clock on a critical race<br />

between safety and lethality.<br />

Sometime (i.e., some time) after the<br />

Moment of Commitment comes the<br />

Moment of Recognition. Th is is the<br />

instant when protectors get their minds<br />

around what is happening, a prerequisite<br />

to getting their arms around what is<br />

happening—and more signifi cantly,<br />

getting their arms around the assailant<br />

or the protectee. Watch the videos and<br />

fi lms of attacks and the Moment of<br />

Recognition is unmistakable. You will see<br />

a powerful energy bolt through everyone<br />

present. Th e target freezes and recoils,<br />

the bodyguards and the attacker begin an<br />

awkward and disturbing ballet, onlookers<br />

surge forward to see, then backward to<br />

survive. A chorus of screams and gasps is<br />

heard long after the violence has stopped.<br />

Th e extensive study undertaken for<br />

this book has produced many insights,<br />

the most striking of which is also the<br />

simplest:<br />

From the Moment of Commitment<br />

onward, the overwhelming majority<br />

of public fi gure attacks are over in less<br />

than fi ve seconds. Within just those few<br />

seconds, all the damage that will be<br />

done has been done.<br />

Th e fi ve-second statistic could be<br />

discouraging to protectors, because it<br />

grants them very little time to respond<br />

eff ectively. However, embedded within<br />

that fi ve-second statistic is one of the<br />

most encouraging lessons we learned:<br />

Attackers are even more handicapped<br />

by the speeding clock than are<br />

protectors.<br />

Just as an attacker benefi ts from the<br />

narrowness of time in which protectors<br />

can respond, so do protectors benefi t<br />

from the ever-narrowing time the attacker<br />

has to complete his act.<br />

For an attacker like Hinckley, the<br />

choice to bring a handgun into play<br />

carries an enormous and immediate<br />

consequence: Where time served him<br />

before he revealed the gun, afterwards,<br />

it begins to enslave him. Th e gun he<br />

wields as a weapon can also be seen as<br />

the starting pistol for a race. From the<br />

moment he introduces it, he is fi ghting<br />

time, and hopefully (for our purposes), he<br />

is fi ghting capable protectors.<br />

Given such a small window of time,<br />

if the Moment of Recognition is moved<br />

forward by even a fraction of a second,<br />

allowing a protector to respond during<br />

that gained time, the odds of survival<br />

increase profoundly. You are about<br />

to learn concepts that can prepare<br />

your mind to reach the Moment of<br />

Recognition sooner.<br />

Attackers have plenty of time before<br />

the Moment of Commitment, but from<br />

that instant onwards they have almost no<br />

time at all. Th e asset of surprise cannot<br />

sustain its value for it’s spent entirely in<br />

a fl ash. After that fl ash, most attackers<br />

rely so heavily upon speed that it quickly<br />

becomes their greatest weakness. Speed is<br />

an enemy of accuracy and composure—<br />

both necessary components of successful<br />

attacks. If the presence of protectors<br />

doesn’t deter an attack, protective<br />

strategies can at least compel an attacker<br />

to rush.<br />

Th ose intending assassination have<br />

some advantages over their targets, but<br />

many more factors work against them<br />

than for them. Th ousands of opportunities<br />

exist for them to fail, and only one slender<br />

opportunity exists for them to succeed.<br />

Often, both literally and fi guratively,<br />

assassins have one shot at success—and<br />

they know this. Accordingly, though<br />

assassination might be seen as a reckless<br />

act, it is rarely committed recklessly.<br />

Th ere’s a popular belief that<br />

attackers have the advantage, even over<br />

sophisticated protective operations,<br />

because they can choose when to attack.<br />

In reality, however, most attackers do<br />

not get to choose precisely when to<br />

attack. Th ey may select the date or<br />

the general period, but the timing<br />

that really matters—the Moment of<br />

Commitment—is dictated and stimulated<br />

by events attackers rarely control: When<br />

does the target come into view or into the<br />

killing zone? How long will he remain<br />

there? When is the target nearest? Are<br />

protectors close to the attacker? Are<br />

protectors focused on the attacker? Are<br />

bystanders focused on the attacker? Is<br />

the target moving or stationary? When<br />

is the space between attacker and target<br />

most free of obstructions? Is this instant<br />

the best moment for attack, or this<br />

one… or will there be a better one if<br />

I wait? Eff ective protective strategies<br />

can infl uence how an attacker answers<br />

these questions, and often, more often<br />

than we know, the answers cause him to<br />

delay, postpone, or even cancel his plans.<br />

Th ough history off ers many examples of<br />

attackers who aborted their attempts, this<br />

book focuses on those who acted on their<br />

plans—and on the few seconds it took<br />

them to do so.<br />

IT’S ABOUT TIME<br />

Th e cases in the Compendium show<br />

the number of attacks that happened in<br />

the daytime versus at night, and how<br />

many were political versus personal—but<br />

such information is not useful for our<br />

purposes here. If you know, for example,<br />

that 70% of past attacks occurred in the<br />

daytime, it doesn’t mean you give 30%<br />

less attention or preparation during the<br />

night. Similarly, knowing that 75% of all<br />

assassins were mentally ill does not have<br />

much value to a bodyguard intercepting<br />

someone who suddenly charges through a<br />

crowd. Th ere is no time for mental health<br />

diagnosis, and the bodyguard must not<br />

ignore people just because they appear<br />

sane or reasonable, nor focus only on<br />

those who appear deranged.<br />

Some statistics, however, can be useful<br />

to protectors. For example, knowing<br />

that most attacks are launched from<br />

within 25 feet of the target can encourage<br />

protectors to focus most of their attention<br />

and resources on the close range, rather<br />

than watching only for snipers on distant<br />

rooftops.<br />

Th e Compendium cases off er other<br />

useful insights:<br />

• In the U.S., attacks are most<br />

likely to be undertaken by lone<br />

assailants (87% of the time).<br />

Outside the U.S., attacks are most<br />

likely committed by multiple<br />

assailants (71%).<br />

• Attacks in the U.S. are about as<br />

likely to be indoors as outdoors<br />

(53% versus 47%). Outside the<br />

U.S., they are far more likely to<br />

occur outdoors (80%).<br />

• Firearms are the most likely<br />

weapons of attack (71%).<br />

• In the U.S., handguns are more<br />

than twice as likely to be used<br />

than long guns (51% handguns,<br />

20% long guns). Outside the U.S.,<br />

the reverse is true.<br />

• Attacks in the U.S. are most likely<br />

to be at close range, less than 25<br />

feet (81%). Only 19% occurred at<br />

more than 25 feet, with the longest<br />

range being 263 feet. Outside the<br />

U.S., even though long guns are<br />

used twice as often, most attacks<br />

still occur at close range (70%). If<br />

you combine this fact with the less<br />

eff ective emergency medicine found<br />

in most other countries, it’s not<br />

surprising that attacks outside the<br />

U.S. are more likely to be lethal.<br />

• Bombs succeed at killing intended<br />

targets only slightly more often<br />

than they fail (57% of the time).<br />

• Th e most dangerous place to be is<br />

in or around the protectee’s car.<br />

To be present at the<br />

location is one thing,<br />

but to be there in<br />

time is the central<br />

issue of this book.<br />

Sixty-four percent of attacks happen<br />

when the protected person is in or<br />

around the car, and these attacks<br />

succeed an astonishing 77% of the<br />

time.<br />

While this information has value for<br />

developing protective strategies, once<br />

an attack has commenced, almost all<br />

knowledge becomes useless mental<br />

clutter. Perhaps the single most valuable<br />

thing a protector could know is when<br />

future attacks will happen—and that we<br />

do know, precisely:<br />

One hundred percent of all attacks<br />

happen at exactly the same time:<br />

Now.<br />

Th e only time anything can happen is<br />

in the present moment. Everything else<br />

is a memory (the past) or a fantasy (the<br />

future), and nothing in the past or future<br />

can hurt your protectee. An attacker’s<br />

Moment of Commitment is always in the<br />

Now, and if you hope to meet him there,<br />

you too must be in the Now. Focusing<br />

attention on the Now is the surest way to<br />

be present and ready in the event of an<br />

attack, literally to be in the event, and not<br />

just a bystander watching events unfold.<br />

To be present at the location is one<br />

thing, but to be there in time is the central<br />

issue of this book. You could place yourself<br />

in the perfect position for foiling an attack<br />

(many bodyguards have), and yet if you<br />

are not present in the moment, pre-sent as<br />

it were, your body being there is not likely<br />

to be of constructive consequence.<br />

46 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 47


PREPARING TO BE PRESENT<br />

Professional protectors already<br />

know a lot about maintaining physical<br />

readiness, but it’s the mind that must<br />

fi rst be properly prepared, the mind that<br />

controls the hands, arms, eyes, and ears.<br />

Th ere are strategies available to help<br />

prepare warriors, based upon knowing<br />

how the body responds to lethal combat,<br />

what happens to your blood fl ow, your<br />

muscles, judgment, memory, vision, and<br />

your hearing when someone is trying<br />

to kill you. Police offi cers, soldiers, and<br />

protectors can learn how to keep going<br />

even if shot, and how to prepare the<br />

mind and body for survival instead of<br />

defeat. Th is is much more than mere<br />

information; the knowledge itself can be<br />

a kind of armor.<br />

Just as a computer functions best when<br />

loaded with accurate and relevant data,<br />

we encourage protectors to mentally<br />

download the information in this book.<br />

Getting the strategies into practice<br />

begins with getting them into your<br />

mind. Speaking of the mind, imagine<br />

for a moment that your mind is a time<br />

machine able to take you into the past or<br />

the future. Now realize that you need not<br />

imagine this at all, because your mind is<br />

a time machine, one that almost always<br />

takes you out of the present moment.<br />

You might have enjoyable or even useful<br />

journeys, but while you’re on them, you<br />

cannot truly be in the present.<br />

Every thought about anything outside<br />

the Now is a burden that makes you<br />

mentally heavier, while focusing your<br />

perception on the ever-changing Now<br />

makes you lighter and more agile. For<br />

a protector, it all comes down to this<br />

question: Will you be present to recognize<br />

the earliest detectable signs of an attack,<br />

or will you be elsewhere, called back to<br />

the moment by the sound of gunfi re?<br />

Even if a loud sound ends your time<br />

travel and pulls you back to the present,<br />

that doesn’t mean you’ve reached the<br />

Moment of Recognition. You still have to<br />

spend time coming to understand what’s<br />

happening. Your senses can alert you to<br />

danger, but on their own they can’t tell<br />

you what caused that loud noise. In other<br />

words, the gunshot and the Moment of<br />

Recognition are rarely simultaneous.<br />

You might think that all of your<br />

training on how to respond to an attack<br />

automatically kicks in at the sound of<br />

gunfi re. But it doesn’t. Nor should it.<br />

If you’re an experienced protector, you<br />

already know this. You’ve heard many<br />

sounds at public appearances that were<br />

indistinguishable from gunfi re—dropped<br />

trays, fi recrackers, cars backfi ring,<br />

balloons popping—and yet you didn’t<br />

always pull your protectee from the stage.<br />

Th at’s because even a sound like gunfi re is<br />

rarely enough on its own to get you to the<br />

Moment of Recognition and stimulate<br />

the Big Response that might follow. On<br />

hearing such sounds, protectors (for<br />

better or for worse) tend to look for other<br />

indicators to complete the puzzle before<br />

responding.<br />

On the one hand, protectors want to<br />

respond eff ectively at the earliest possible<br />

instant; on the other hand, they dread<br />

acting prematurely. Nobody wants to<br />

charge across the baseball fi eld during<br />

the National Anthem, knock the famous<br />

singing star to the dirt—and then fi nd<br />

out that the gunshot sound was actually<br />

a backfi re in the parking lot. Th is is the<br />

protector’s great confl ict: Act too early<br />

and risk embarrassment. Act too late, and<br />

risk everything.<br />

Th e only way to be fully certain before<br />

responding is to allow more of the event<br />

to unfold. But how many pieces of the<br />

puzzle must you see before you can know<br />

what image is being formed (or at least be<br />

willing to commit to a guess)? Th e answer<br />

might diff er from person to person, but<br />

clearly, in order to see the earliest pieces<br />

of the puzzle, your attention must be<br />

focused on the Now.<br />

Consider the true meaning of the<br />

popular expression, passing the time:<br />

When someone is merely passing the<br />

time, he is passing events that are<br />

occurring right in front of him, passing<br />

the Now. Or another expression, killing<br />

time, which is, quite literally, killing the<br />

one resource a protector needs most.<br />

Imagine that a protector’s mind is<br />

anywhere else when something calls him<br />

back to the present. He’ll then need time<br />

to land, time to assess, time to conclude,<br />

time to respond. But he has been killing<br />

the very time he needs.<br />

Th e concept of spending time is<br />

perfectly apt: Once spent, time is gone,<br />

just like any other resource. In the<br />

economy of public fi gure attack, time is<br />

spent in tiny increments—and each one<br />

is priceless.<br />

Just an instant before confi rming that<br />

the sound of gunfi re actually is gunfi re,<br />

a bodyguard might have been thinking<br />

about the complicated route back to the<br />

car, or whether the protectee’s speech is<br />

almost over, or about the loading dock<br />

door that got stuck at the half-way point<br />

on this morning’s advance. A bodyguard<br />

might have been thinking about staying<br />

on schedule, keeping intact a complex<br />

web of logistics, or he might be even<br />

farther from this moment, thinking about<br />

an upcoming vacation.<br />

But wherever attention might have<br />

been an instant ago, from the Moment<br />

of Recognition onward, bodyguards are<br />

fi rmly rooted in the present, riding a<br />

terrible roller coaster of shifting priorities:<br />

• Cover the protectee<br />

• Stop the attack<br />

• Subdue the attacker<br />

• Get the protectee out of here<br />

Th ough a bodyguard might have the<br />

objective of stopping the gunfi re, that<br />

goal is rarely reached. In most of the<br />

1400 incidents we studied, it was the<br />

gunmen who decided when to stop<br />

shooting.<br />

If the protectee has not been hit by<br />

gunfi re, your priority might be to pull<br />

or push him out of danger, or to cover<br />

him. If you are closer to the attacker, your<br />

priority might be to disrupt the shooter’s<br />

aim or view. If the protectee has just been<br />

shot, your priority shifts again, this time<br />

to ensuring that he is not hit by another<br />

bullet.<br />

If the protectee has been injured<br />

and the attacker is no longer shooting,<br />

your priority likely shifts to stopping<br />

blood loss and getting the protectee to<br />

emergency medical care. Th at priority<br />

doesn’t change even if the protectee<br />

is dead: Protectors rush to the damn<br />

hospital anyway, knowing all along the<br />

awful drive that doctors won’t be able<br />

to do anything more than confi rm the<br />

obvious.<br />

Th is was the experience of protectors<br />

rushing to hospitals with the dead<br />

or soon-to-be-dead bodies of John<br />

F. Kennedy, Israeli Prime Minister<br />

Rabin, and Egyptian President Anwar<br />

Sadat—hoping that time still mattered,<br />

while facing the one situation in which it<br />

doesn’t matter at all. It’s hard to imagine<br />

that gunfi re aimed in one’s direction<br />

is ever desirable, yet the protectors in<br />

these three cases would tell you they<br />

preferred the moments of danger over<br />

the moments that followed, and the years<br />

that followed. •<br />

Th is passage was excerpted from the forthcoming<br />

book Just 2 Seconds: Using Time and Space<br />

to Defeat Assassins. Special advance copies are<br />

available to readers of Th e Counter <strong>Terrorist</strong> at<br />

a discounted price. For more information on the<br />

book, visit http://www.just2seconds.org.<br />

ABOUT THE AUTHOR<br />

Gavin de Becker, is a highly regarded<br />

expert in public fi gure protection, and<br />

his 200-member fi rm provides protective<br />

coverage for many of the world’s most at-<br />

risk people. Mr. de Becker also designed the<br />

MOSAIC threat assessment systems used<br />

by the CIA, the U.S. Supreme Court, and<br />

the U.S. Capitol Police. His bestselling<br />

books, including Th e Gift of Fear, have been<br />

published in 14 languages.<br />

Worldʼs Finest Magazines<br />

“OPTIMUM”... THE WORLDʼS BEST MAGAZINES<br />

MEC-GAR is proud to offer “Optimum” - our new<br />

and unique series of high capacity flush-fit pistol<br />

magazines.<br />

The new design of the magazine housing and<br />

interlinked magazine components, together with<br />

a special Anti-Friction Coating offer far superior<br />

performance even in difficult operational<br />

environments.<br />

The increased firepower of MEC-GAR “Optimum”<br />

magazines can be further raised by an optional “Plus<br />

Two” adapter. “Plus Two” is a new set of hollow<br />

butt-plate and inner base to raise the capacity of the<br />

MEC-GAR “Optimum” magazine by 2-rounds and<br />

stick out only 5/8” from the butt of the pistol!<br />

Circle 243 on Reader Service Card<br />

Available For: Beretta 92FS 9mm 18rd / 20rd<br />

Beretta 96FS .40S&W 13rd / 15rd<br />

Para-Ordnance P14 .45ACP 14rd<br />

SIG P226 9mm 18rd / 20rd<br />

SIG P226 .40S&W 13rd / 15rd<br />

Springfield XD 9mm 18rd<br />

Springfield XD .40S&W 13rd<br />

Taurus PT92 9mm 18rd / 20rd<br />

Taurus PT100 .40S&W 13rd / 15rd<br />

Mec-Gar USA, Inc., 905 Middle Street, Middletown, CT 06457<br />

Tel: (800) 632-4271 Fax: (860) 635-1712 www.mec-gar.com<br />

Circle 235 on Reader Service Card<br />

48 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 49


CIVILIAN STANDBY<br />

CT GROUPS PART 1<br />

By Mickey Hargaash<br />

sraeli governmental security<br />

organizations had much experience<br />

with terror attacks in the 20th Israeli governmental<br />

organizations had much experience<br />

with terror attacks in the 20 century,<br />

especially outside the country’s borders.<br />

Th e same could not (previously) be said<br />

within community settlements.<br />

Th e Israel Defense Force (IDF)<br />

had only a few experiences with terrorist<br />

killing attacks until recent years, and no<br />

professional doctrine was formed to face<br />

the threats. Th e military CT tactics and<br />

special forces activities were directed solely<br />

Photo: SSI International<br />

TEST CASES: FOUR TERRORIST KILLING<br />

ATTACKS THAT SHAPED ISRAELI TACTICS<br />

towards the well-known hostage terrorist<br />

takeovers, like the famous Entebbe rescue<br />

operation in 1976.<br />

During the “hang gliding night” in<br />

1987 and the “pitch forks night” in 1992,<br />

terrorists infi ltrated military compounds<br />

and killed numerous soldiers until they<br />

were shot at on one occasion and ran<br />

away with stolen M16s on the other.<br />

Lessons learned included very long<br />

summaries focusing on personal blame.<br />

Th e HIC (High Intensity Confl ict) was<br />

the only relevant interest, and there was<br />

no decision made to form any doctrinal<br />

knowledge in relation to the LIC (Low<br />

Intensity Confl ict), in particular the<br />

terror killing attacks.<br />

Civilian community settlements<br />

had little experience either, though they<br />

had the ambition to prepare for terrorist<br />

threats, along with volunteers. Th e threats<br />

materialized in the year 2000 with the<br />

Palestinian General Security Police, but<br />

expertise was not yet available.<br />

Defeating suicide bombers by using<br />

basically trained civilians in an urban<br />

environment on three diff erent occasions<br />

at the beginning of 2002 established<br />

a new eff ort. Local eff orts to combat<br />

terrorism could be helpful, but somebody<br />

had to take responsibility.<br />

In 2002 the IDF made a decision<br />

to “adopt” the combatant local-eff ort<br />

approach and opened a special CT<br />

school for civilian groups in community<br />

settlements. It also pushed for a crossorganizations<br />

exchange of knowledge<br />

in order to develop the proper doctrine<br />

needed. Th is was the beginning of<br />

establishing civil defense to combat terror<br />

in the community environment in Israel.<br />

ELEY SINAI, 2001<br />

Basic data: A terrorist attack in a small<br />

neighborhood at a civilian settlement<br />

near Gaza. Two terrorists; approximately<br />

three hours of ongoing killing; many<br />

military forces, including special forces,<br />

with no organized or trained civilian force<br />

around at the time.<br />

Timetable: Taken by the division’s<br />

operations room and made available to<br />

the public:<br />

19:25 hours: Two terrorists infi ltrated<br />

a military-secured civilian settlement.<br />

Th ey shot a soldier and walked around<br />

for about an hour shooting and throwing<br />

many grenades in between the houses.<br />

Military teams did not make any contact<br />

with them.<br />

20:30: After a local civilian called the<br />

operations room and directed authorities<br />

to the precise location, military forces<br />

started to close on the two.<br />

20:50: A cordon was placed around the<br />

house where the terrorists shut themselves in.<br />

22:50: Th e terrorists were hit by snipers<br />

after trying to escape by pretending to be<br />

a terrorist kidnapping a civilian.<br />

Outcome: Two killed; 16 wounded;<br />

two terrorists killed.<br />

Disadvantages were the endless time<br />

needed for engagement, the large military<br />

employment, and the lack of knowledge<br />

to enable effi cient use of combat forces.<br />

Lessons learned were written at<br />

all levels and included very long lists,<br />

though the focus was not on personal<br />

blame. Th e basic understanding was<br />

that the conservative equation of<br />

<strong>Terrorist</strong>s=hostage situations does not<br />

work, and time until engagement (of<br />

terrorists) is highly important.<br />

MARGANIT, 2002<br />

Basic data: A terrorist attack on a small<br />

military compound near Gaza, only 30<br />

meters in length. Th e attack lasted for<br />

15 minutes. Th ere were two terrorists –<br />

policemen of the General Security Police<br />

Force, 11 infantry trained soldiers with no<br />

CT training asleep, three guards on duty.<br />

Timetable: taken by the division’s<br />

operations room and made available to<br />

the public:<br />

02:50: A last warning was given<br />

following a few others of a fence cut a few<br />

hundred meters from the compound. No<br />

one bothered to check the warning.<br />

03:01: Shooting and grenade explosions<br />

were heard from the compound. Two<br />

terrorists shot at the guard at the gate<br />

Like many tough<br />

issues, private<br />

police, jurisdiction<br />

and responsibilities<br />

are ones that have<br />

to be faced and<br />

will eventually rise<br />

to a critical point,<br />

from either needs or<br />

liability or both.<br />

50 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 51


from a distance of 15 meters. He was<br />

not hurt, and in fact he ran to call his<br />

commander. Th e other two guards did<br />

not initiate any contact, as they were<br />

afraid to leave their posts. No contact<br />

by sight or fi re was initiated by the<br />

awakening soldiers. Th e terrorists walked<br />

around and kept shooting in all directions<br />

in the compound.<br />

03:10: Reinforcement arrived with<br />

the major, second in command of the<br />

battalion, who found that no one was<br />

actually doing anything, aside from some<br />

aimless shooting. He was the only one to<br />

move around in the compound, and was<br />

hit while fi ghting.<br />

03:16: After local soldiers started to<br />

aim and shoot from static posts, one<br />

terrorist was hit and the other one ran<br />

away.<br />

Outcomes: Th ree were killed, seven<br />

wounded; two terrorists killed, including<br />

one at the end of a pursuit at 07:00.<br />

Disadvantages start with the near<br />

endless time that was needed to shoot the<br />

terrorists at virtually no distance. Th is is<br />

added to the “on-guard team” available<br />

inside the compound, which had the best<br />

starting point, even better than that of a<br />

“stand-by team” located nearby.<br />

Lessons learned were written at all<br />

levels and included very long lists. Focus<br />

was on personal blame, and still no<br />

connection was made to the method of<br />

fi ghting and training of combatants.<br />

ITAMAR, 2002<br />

Basic data: A terrorist attack on a<br />

civilian settlement in Samaria, starting<br />

with shooting in the neighborhood and<br />

fi nally shooting civilians inside one of<br />

the houses. One terrorist was involved<br />

as were many military and police forces,<br />

with no civilian trained force available.<br />

Timetable: Not available.<br />

21:00: One terrorist infi ltrated, fi red<br />

rounds and threw grenades while he<br />

walked around the neighborhood. Finally<br />

he entered a house and shot the children<br />

and parents inside.<br />

A police special operations unit<br />

performed a cordon around the house<br />

and started rescuing the victims. Th e unit<br />

had to improvise since the scenario did<br />

not meet any hostage situation that was<br />

familiar at that time; thus, the unit went<br />

in using grenades. Th ree kids were saved<br />

though injured, and the terrorist who<br />

tried to escape through a window on the<br />

second fl oor was shot by a sniper.<br />

Outcomes: Five were killed, three of<br />

them children, and three children were<br />

wounded.<br />

Disadvantages were the excessive time<br />

needed to shoot the terrorist and the<br />

inappropriate combat tactics used by the<br />

on scene police unit.<br />

Lessons learned focused on the<br />

improvements needed with the CT<br />

combat tactics. At a diff erent level, a<br />

military decision was made to create<br />

a designated school for local civil<br />

combatant groups.<br />

ITAMAR, 2004<br />

Basic data: Multiple terrorist actions<br />

started with shooting at civilian vehicles.<br />

Th ey were driving along a road located in<br />

an orchard contour that connected two<br />

separate neighborhoods of the settlement.<br />

Timetable: Was measured according to<br />

a reconstruction of the event I conducted<br />

in the fi eld.<br />

10:30: A report was heard of local<br />

civilians being shot at on the inner road<br />

mentioned above. Four members of the<br />

local civilian combat team heard it on the<br />

military radio, along with several shots<br />

they could hear from the mentioned<br />

direction.<br />

A military team on a logistics mission<br />

with a vehicle nearby also heard it. Th ey<br />

were asked to observe until the standby<br />

team of the military company in charge<br />

and the commander would join them.<br />

10:40: Four civilian members<br />

mentioned above took their weapons and<br />

rushed towards the observing military<br />

vehicle to get more information. Th ey<br />

saw a civilian vehicle on the road and<br />

thought it might be a car being attacked.<br />

10:45: Th ey spread into a square<br />

formation and, under the orchard’s<br />

cover, ran towards the car. From this<br />

distance they managed to see a civilian<br />

shooting another civilian lying next to<br />

the car while trading his rifl e for one on<br />

the ground. Th en, after he shot at them<br />

and they made a brief attempt to identify<br />

The nation's best source for current, open<br />

Federal, State, Local law enforcement<br />

and Private Security positions.<br />

www.LawEnforcementJobs.com<br />

Find Criminal Justice degrees at:<br />

You've chosen your career,<br />

Now find<br />

your JOB!<br />

Employers:<br />

Contact us at 703-351-5565 or<br />

info@LawEnforcementJobs.com<br />

for more information<br />

52 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 53<br />

Circle 199 on Reader Service Card<br />

........


themselves, they determined it was the<br />

terrorist.<br />

10:48: Th ey shot and killed him. As<br />

the military standby team arrived, they<br />

passed on command for a secondary<br />

search around the entire orchard area.<br />

Outcomes: One terrorist killed, one<br />

civilian killed – the new security offi cer in<br />

charge of the settlement who rushed into<br />

the orchards when he heard the shots.<br />

Advantages were the relatively short time<br />

needed for engagement, even though the<br />

terrorist was distant and ambushing, and<br />

the absence of need for large military<br />

employment. It was a local civilian<br />

combatant standby team, which pursued<br />

contact and shot the terrorist.<br />

Lessons learned were written very<br />

briefl y. It appeared that both civilian<br />

and military forces can supplement<br />

each other, along with the eff ectiveness<br />

of combatant civil groups. Urgent<br />

development of contact emphasized for<br />

an actively shooting terrorist, not when<br />

the terrorist is quiet, ambushing and not<br />

NHDF has issued a<br />

CALL FOR PAPERS.<br />

Papers selected will be presented at<br />

Symposium VI and archived<br />

in the NHDF actively killing. Library.<br />

Th e tragic killing attacks portrayed<br />

above presented a new challenge, which<br />

emphasized the logic and importance of<br />

local combatant groups.<br />

Securing the Future of Liberty<br />

October 27-30, 2008 • Colorado Springs, Colorado<br />

The theme of Symposium VI is “Securing our Homelands Through<br />

International Collaboration; Neighbors Helping Neighbors.”<br />

Presentations will include key officials from the US, Canada,<br />

Mexico, Australia, and other nations. This annual conference is the<br />

nation’s leading public forum on homeland defense and security<br />

matters and offers valuable networking opportunities.<br />

Plan to exhibit and attend by registering at www.nhdf.org<br />

The world class 5<br />

Star 5 Diamond<br />

Broadmoor Hotel is<br />

the host location for<br />

Symposium VI.<br />

For more information, visit www.nhdf.org<br />

NHDF has issued a CALL FOR PAPERS. Papers selected will<br />

be presented at Symposium VI and archived in the NHDF Library.<br />

CHARACTERISTICS<br />

OF THE AREA THE<br />

ATTACKERS CHOOSE<br />

Wherever helpless victims can be<br />

attacked and killed, defensive ability is<br />

needed – whether on the streets or inside<br />

houses, whether on a military compound<br />

or in a soldier’s bed room, or in an<br />

ambush on an orchard side road.<br />

Implications: Defense of, and coverage<br />

of, an entire area is problematic,<br />

especially against terrorists. A possible<br />

solution would be to form available local<br />

standby combat groups.<br />

CHARACTERISTICS OF<br />

THE THREAT<br />

Th e number of terrorists in a single<br />

attack is usually somewhere between one<br />

and a few. Th e backgrounds of terrorists<br />

range from no professional training to<br />

police level. Th eir professional ability is<br />

generally very low. Th ey usually need a<br />

great deal of time to “achieve deaths,”<br />

even when the helpless don’t fi ght back,<br />

despite their possession of assault rifl es<br />

and grenades and the close ranges they<br />

use. Th eir advantages include the ability<br />

to operate as excellent hunters, their<br />

ability to use the element of surprise, and<br />

their ability to get as close as possible<br />

to their targets. Th e sacrifi cing element<br />

varies; sometimes they tried to run away,<br />

but generally they didn’t even try.<br />

Implications: Th e average terrorist is<br />

not a demon. It would be reasonable to<br />

marshal effi cient resistance against him<br />

by using locally designated and trained<br />

combatant groups.<br />

FRIENDLIES: KNOW-<br />

HOW, LEARNING ABILITY<br />

AND COOPERATION<br />

Knowledge of how to combat a<br />

specifi c threat is highly important. Th e<br />

availability of such knowledge is generally<br />

not obvious and even special forces<br />

units in the area will not necessarily help<br />

2008 NATIONAL CALENDAR OF EVENTS SPONSORED BY:<br />

Counter<br />

Th e<br />

Th e Counter <strong>Terrorist</strong><br />

magazine is proud<br />

to sponsor the<br />

following events as<br />

part of its ongoing<br />

mission to provide<br />

the most current and<br />

relevant information<br />

on Homeland<br />

Defense Security:<br />

Offi cial Journal of the<br />

Homeland Security Professional<br />

An SSI ®<br />

Publication<br />

Register for these and other events at: www.thecounterterroristmag.com<br />

Circle 245 on Reader Service Card eff ectively. At Eley Sinay two terrorists<br />

54 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ Circle September/October 255 on Reader Service 2008 Card<br />

55


EMSExpoAd_4.75x7.5.qxd:Layout 1 7/31/08 4:41 PM Page 1<br />

CO-LOCATED WITH:<br />

1988 1990 1992 1994 1996 1998 2000 2002 2004 2008<br />

CELEBRATING 20 YEARS Y<br />

OF SERVING THE EMS COMMUNITY<br />

OCTOBER 13-17, 2008<br />

LAS VEGAS CONVENTION CENTER<br />

LAS VEGAS, NEVADA<br />

VISIT WWW.EMSEXPO2008.COM<br />

FOR EXCITING CELEBRATION UPDATES!<br />

at<br />

P r e s e n t e d b y E M S E X P O<br />

MAGAZINE<br />

Circle 231 on Reader Service Card<br />

kept more than fi ve diff erent military<br />

forces busy while shooting for several<br />

hours (some of them were special forces<br />

designated for hostage situations) and the<br />

whole scenario was limited to only a small<br />

neighborhood. At Marganit, well-trained<br />

infantry combatants were attacked, but<br />

that did not help them save themselves.<br />

Flexibility and learning during combat is<br />

not limited to military forces. In Itamar,<br />

2002, a police force had improvised<br />

according to the goals and the situation,<br />

and succeeded to a certain degree. In<br />

Itamar, 2004, the civilian combatant<br />

group had to improvise in relation<br />

to the non-familiar orchard contour,<br />

without waiting for the military force.<br />

It actually succeeded well in initiating a<br />

swift engagement and neutralizing the<br />

ambushing terrorist.<br />

Th e idea of the need for special units<br />

in order to fi ght terrorists is not always<br />

justifi ed. Local civilian combatants can<br />

act more effi ciently in certain contexts.<br />

Cooperation between local civilians<br />

and combat forces is essential. Th is<br />

includes civilians directly confronting<br />

terrorists and coordination / deconfl<br />

iction between the various<br />

forces. In Itamar, 2004, mutual radio<br />

frequencies shortened the response time,<br />

as implemented by the civilian standby<br />

combatant group.<br />

Implications: Properly trained local<br />

civilian combatant groups could be a<br />

highly valuable part of the defense puzzle<br />

when terrorist attacks take place in their<br />

own community environment. •<br />

ABOUT THE AUTHOR<br />

Mr. Hargaash served in Israeli<br />

governmental and military organizations,<br />

and specialized in counter terrorism and<br />

guerrilla operations for the last 25 years.<br />

Th e above is based on three years of work as<br />

the military professional liaison to the new<br />

CT school for civilian standby teams. Next<br />

month, Mr. Hargaash further develops the<br />

concepts behind the Israeli civilian standby<br />

CT teams in part two.<br />

DID YOU KNOW?<br />

SATGIN Organization formed to<br />

Counter Organized Crime<br />

S<br />

outh American Th eft Groups<br />

Intelligence Network (SATGIN)<br />

Sestablished<br />

is a not-for-profi t organization<br />

established to facilitate a networking<br />

platform for law enforcement, corporate<br />

and the private sector for the sharing<br />

of intelligence information relating to<br />

organized theft crimes, with a specifi c<br />

and unique focus on the South American<br />

Th eft Groups (SATG). Th is transnational<br />

criminal network has operated worldwide<br />

for decades virtually unknown to the<br />

public and to much of law enforcement<br />

until now.<br />

SATGs are recognized by the Federal<br />

Bureau of Investigation as a violent,<br />

organized criminal syndicate who<br />

travel the world conducting crimes<br />

ranging from pick pocketing to violent,<br />

commando-style carjacking of jewelers.<br />

Th e SATGs are a loosely knit, laterally<br />

structured crime syndicate unlike the<br />

historical, pyramidal structures of the<br />

well-studied Italian mafi a.<br />

Everyone is already an indirect victim<br />

of their crimes with regard to the costs<br />

in losses to the retailers and insurance<br />

companies who then pass them on to the<br />

general consumer. Someone becomes a<br />

potential target every time they purchase<br />

jewelry or a big ticket item, make a sales<br />

call visit, travel to and from the airport,<br />

rent a car, use public transportation, or<br />

withdraw money from the bank.<br />

SATGIN’s basic premise of<br />

communication, awareness, education,<br />

and training has already made a diff erence<br />

in deterring these criminals from their<br />

on-going criminal enterprises.<br />

South American Th eft Groups<br />

Th e SATGIN organization is<br />

comprised of retired and active law<br />

enforcement offi cers from federal,<br />

state and local agencies who specialize<br />

in the SATG’s. Collectively, we have:<br />

participated in numerous tack forces;<br />

investigated, arrested prosecuted and<br />

deported hundreds of SATG members;<br />

published manuscripts and articles on<br />

the SATG; and, trained hundreds of<br />

law enforcement offi cers and corporate<br />

security personnel throughout the world.<br />

We provide verifi ed law enforcement<br />

offi cers access to specifi cally designed,<br />

secured areas of our website for them<br />

to remain updated on the most recent<br />

criminal activities of the SATG, as well<br />

as to communicate among themselves<br />

on a secured platform in order to share<br />

intelligence on crimes and suspects. Th ey<br />

also share contact information so that the<br />

more sensitive aspects of the cases may be<br />

discussed off -line.<br />

Our Corporate and Professional<br />

SATGIN Team Members, for a low-cost<br />

annual membership, enjoy access to their<br />

own secured areas of the site where they<br />

will also be kept updated on the latest<br />

criminal activities of the SATG. Th ey are<br />

also provided a secured forum with which<br />

to communicate with other SATGIN<br />

Corporate Team members on a variety of<br />

topics.<br />

Most of the crimes committed by<br />

the SATG go either unreported or are<br />

not properly attributed to having been<br />

committed by an organized theft group.<br />

Rather, these crimes are concluded to<br />

have been “random”. SATGIN feels that<br />

Someone becomes<br />

a potential target<br />

every time they<br />

purchase jewelry<br />

or a big ticket<br />

item, make a<br />

sales call visit,<br />

travel to and from<br />

the airport, rent<br />

a car, use public<br />

transportation, or<br />

withdraw money<br />

from the bank.<br />

these forums will provide a way for the<br />

Law Enforcement and private sector to<br />

exchange, share, and provide the needed<br />

information to locate, apprehend and<br />

convict these organized crime members.<br />

Th ese forums allow for the immediate<br />

dissemination of facts, leads or losses<br />

occurred by the victims.<br />

SATGIN allows for the interactive<br />

participation in the website design,<br />

forums and changes that will benefi t all<br />

members.<br />

With these basic types of<br />

memberships, SATGIN allows for<br />

anyone who may be a potential target<br />

to get involved, become informed, and<br />

participate in an active forum.<br />

You can visit our website at<br />

www.SATGIN.org. •<br />

Circle 239 on Reader Service Card<br />

56 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 57


Call to register for OCTOBER 7TH - 10TH, 2008 at CAMP BLANDING, FL<br />

TRAINING REVIEW<br />

<strong>onPoint</strong> <strong>Tactical</strong>’s Urban Escape<br />

and Evasion<br />

O<br />

n February 13, 2003, a single<br />

engine, propeller-driven<br />

Othe<br />

Cessna 206 crashed into<br />

the lush jungle of Colombia’s Caquetá<br />

Province. Revolutionary Armed Forces<br />

of Colombia (FARC) guerrillas quickly<br />

apprehended the fi ve survivors. Two<br />

of these men—pilot Tom Janis and a<br />

Colombian soldier—were immediately<br />

executed. Pilot Th omas Howes, fl ight<br />

engineer Keith Stansell, and systems<br />

analyst Marc Gonsalves were quickly<br />

marched into the bush. 1<br />

Survival, evasion, resistance, and escape<br />

(SERE) training has long been taught<br />

to military and intelligence personnel.<br />

Unfortunately, even within the<br />

military and intelligence communities,<br />

opportunities for formal school-based<br />

training are available to only a minority<br />

of individuals. Moreover, military<br />

SERE training has historically focused<br />

on conventional warfare scenarios;<br />

soldiers have been taught to adhere to<br />

Geneva Convention requirements and<br />

seek the permission of senior personnel<br />

before attempting escape, for example.<br />

Unfortunately, in an unconventional<br />

setting, adversaries do not uphold legal<br />

niceties, and individuals are unlikely to<br />

be taken to a prisoner-of-war camp where<br />

seeking permission from senior personnel<br />

may be practical.<br />

Not only soldiers are at risk in regard<br />

to terrorists. Contractors, the hidden<br />

multiplier behind many government<br />

agencies, also face signifi cant danger.<br />

Whether driving logistics convoys<br />

in Iraq, serving on personal security<br />

Must be an active member in a SRT Team or SWAT Team<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 179 on Reader Service Card<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 59<br />

O<br />

n<br />

engine,<br />

Cessna<br />

details for State Department personnel<br />

in Afghanistan, or fl ying surveillance<br />

planes in South America, contractors are<br />

frequently targeted by terrorists. While<br />

it is common knowledge that FBI, DEA<br />

and other federal agents work overseas,<br />

local law enforcement agencies such as<br />

the New York and Los Angeles police<br />

departments increasingly pursue their<br />

own international interests and send<br />

offi cers abroad.<br />

By Chris Graham<br />

Photo: Courtesy Wade Heninger and <strong>onPoint</strong> <strong>Tactical</strong><br />

Th us, there is ultimately a growing<br />

number of people in need of SERE<br />

training, as well as a need to supplement<br />

existing training with threat-specifi c<br />

capabilities and relevant enhancement.<br />

In the course of pursuing supplemental<br />

training, I had the opportunity to attend<br />

<strong>onPoint</strong> <strong>Tactical</strong>’s urban escape and<br />

evasion (E&E) course.<br />

Day one of <strong>onPoint</strong>’s E&E course<br />

began in the classroom with PowerPoint


Alamo Alamo City City Gold Gold & & Silver<br />

Silver<br />

Over 1500 Agencies on File<br />

Gold and silver chains available<br />

Badges available in sizes from 3/4 in. to 1-1/2 in.<br />

Earn Extra Money!<br />

Distributors Wanted!<br />

950 N.E. Loop 410<br />

San Antonio, Texas 78209<br />

Telephone: (210) 930-3900<br />

Toll Free: (866) 333-3715<br />

Fax: (210) 930-3903<br />

Owned and operated by retired police<br />

detective, David Putnam<br />

We customize badge<br />

pendants and rings.<br />

Call for current prices or visit our<br />

website.<br />

Bracelet shown is actual size.<br />

Sizes available in 7 in. or 8 in. lengths.<br />

E-Mail: acgse@swbell.net<br />

Website: www.sadiamonds.com<br />

Check our website for most current prices<br />

Earn Extra Money!<br />

Distributors Wanted!<br />

presentations on several topics, including<br />

training, planning, and the body’s<br />

reaction to stress. We also discussed E&E<br />

priorities, diff erent types of useful gear,<br />

urban caches, knowledge of terrain, and<br />

the use of intelligence. Th e instructors<br />

emphasized the value of creating a<br />

briefi ng book that contains various<br />

types of data relevant to escape, such<br />

as locations of transportation systems,<br />

communications resources, governmental<br />

services, military/paramilitary<br />

installments, commercial establishments,<br />

fi nancial/medical services, and major<br />

industrial facilities. Next, we examined<br />

the importance of tracking the locations<br />

and volume of hostile activity in an area<br />

and preplanning safe houses and hides.<br />

Th e second half of day one was<br />

dedicated to the topic of urban<br />

movement. Discussion focused on the<br />

uniqueness of neighborhoods, including<br />

baselines of normal activity and the<br />

value of matching a given baseline.<br />

We considered the use disguises and<br />

possibilities for constructing fake<br />

identity documents and credentials.<br />

Th e instructors then moved on to issues<br />

of “social engineering,” elicitation,<br />

and improvised weapons. Finally, they<br />

presented us with techniques for urban<br />

climbing, ideas for dealing with dogs, and<br />

considerations for moving at night and<br />

fi nding hiding places.<br />

Day two of the course also began<br />

with PowerPoint presentations in the<br />

classroom. Th is time, however, our fi rst<br />

topic was lock picking. While on the run,<br />

the ability to pick locks can aid in escape<br />

and/or the acquisition of resources. We<br />

discussed lock picking tools, methods<br />

for concealing these tools, and methods<br />

for improvising them. We also talked<br />

about characteristics of pin tumbler locks,<br />

including the benefi ts and disadvantages<br />

of “raking” versus “feel picking” to defeat<br />

these locks. Next, participants spent<br />

several hours practicing these skills and<br />

defeating various locks.<br />

Th e discussion of lock picking led<br />

into the next major topic covered on day<br />

two: how to escape from captivity. Th e<br />

fi rst series of lectures related to this topic<br />

described how to defeat various restraints,<br />

including handcuff s, fl ex cuff s, and ropes.<br />

We improvised picks and shims and used<br />

these devices to get out of both single-<br />

and double-locked handcuff s. Ultimately,<br />

we practiced this process with our hands<br />

behind our backs and while locked in<br />

the trunk of a car. Th e instructors then<br />

introduced an ingenious technique for<br />

defeating fl ex cuff s and ropes that I had<br />

never seen before.<br />

Following our exploration of how<br />

to overcome cuff s and ropes, we spent<br />

some time talking about methods for<br />

negotiating fences, including those made<br />

of barbed and razor wire. We also talked<br />

about sensors, lighting considerations,<br />

and methods of dealing with television<br />

cameras, and the instructors delivered a<br />

presentation on night vision and thermal<br />

imaging.<br />

Finally, day two concluded with a<br />

discussion of how to fi nd transport<br />

following escape. We received a lecture<br />

on defeating car locks and ignition<br />

systems. We also talked about evasive<br />

driving techniques and linking back up<br />

with friendly forces without instigating a<br />

violent confrontation.<br />

Th e third and fi nal day of <strong>onPoint</strong>’s<br />

urban E&E training began on the<br />

outskirts of Chicago. Th is was fi nal<br />

exercise day. As the morning began, I<br />

stood blindfolded and handcuff ed. I took<br />

my blindfold off to discover that I was<br />

in an upstairs bathroom, and my leg was<br />

shackled to one of the stalls. As I surveyed<br />

the debris in my environment for possible<br />

tools, fi rst one of my teammates and<br />

then the other showed up; they had<br />

already escaped. I was in the process of<br />

improvising a pick when my partners<br />

went to work on my cuff s. Before I even<br />

had time to access my hidden cuff key,<br />

Captain F had my ankle free. Meanwhile,<br />

Photo: Courtesy Wade Heninger<br />

and <strong>onPoint</strong> <strong>Tactical</strong><br />

While it is common<br />

knowledge that<br />

FBI, DEA and other<br />

federal agents work<br />

overseas, local law<br />

enforcement agencies<br />

such as the New<br />

York and Los Angeles<br />

police departments<br />

increasingly pursue<br />

their own international<br />

interests and send<br />

offi cers abroad.<br />

60 The Counter <strong>Terrorist</strong> ~ September/October 2008 Circle 219 on Reader Service Card<br />

The Counter <strong>Terrorist</strong> ~ September/October 2008 61


Circle 253 on Reader Service Card<br />

EOD EQUIPMENT<br />

SUPPLY<br />

WWW.IDEALSUPPLYINC.COM<br />

800-533-0144 or 828-274-0140<br />

Major B inadvertently cinched my left<br />

handcuff down to the point of cutting off<br />

circulation, but quickly freed my right<br />

hand, then returned to the left. After the<br />

fact, I would regret that we made noise<br />

ratcheting a cuff and plodding across<br />

the fl oor. We fl ew down a set of stairs<br />

and exited a side door of the building, as<br />

people came up the primary staircase.<br />

Exiting the building, we passed several<br />

people. Either our blighted warehouse<br />

was a popular site on Saturday mornings,<br />

or we were bumping into the opposition’s<br />

surveillance. Th rowing subtlety out the<br />

window, we ran and took a few turns. As<br />

we encountered our playmates again in<br />

diff erent clothes, it became clear that they<br />

were the opposition.<br />

After dropping my external shirt<br />

and trying some other minor attempts<br />

at misdirection, my teammates and I<br />

drifted apart from each other and took<br />

a circuitous route toward the site of our<br />

fi rst task. As we traveled, we discovered<br />

that we were in a poor neighborhood and<br />

did not match the racial norm for the<br />

area. As we moved on, trying to get out of<br />

the area in which we stood out so badly,<br />

I observed a young black man fl ashing<br />

gang signs behind Captain F’s back.<br />

Our challenge was enhanced by the<br />

presence of police. Police vehicles seemed<br />

to be pre-positioned at neighborhood<br />

boundaries. Even though my teammates<br />

and I were blending in as best as possible,<br />

we still stood out. In addition, I was<br />

uncertain whether law enforcement<br />

was in play. I didn’t know whether I<br />

was being scrutinized for participation<br />

in the exercise or simply for appearing<br />

suspicious. Either way, I needed to<br />

maintain a low profi le and avoid<br />

apprehension. As I turned onto a side<br />

street, a grey Crown Victoria paralleled<br />

me at a distance. I took another logical<br />

turn and was back in distant trail of<br />

Maj B in what I hoped appeared to be a<br />

natural chain of events.<br />

After several hours and several more<br />

tasks, our exercise was complete. My<br />

teammates and I had demonstrated most<br />

of the skills we were taught in the course.<br />

We had picked handcuff s and locks;<br />

hidden and moved through unfamiliar<br />

neighborhoods without money or<br />

transport; and acquired water and food.<br />

Finally, we rendezvoused with the other<br />

teams and instructors at the Chicago<br />

House of Blues. Frosty beer in hand, we<br />

relaxed after accomplishing our E&E<br />

mission.<br />

Exercise complete, it is apparent<br />

how many types of individuals would<br />

benefi t from this sort of training.<br />

Th omas Howes, Keith Stansell, and<br />

Marc Gonsalves endured more than<br />

fi ve years of humid, mosquito-fi lled<br />

days, shivering nights, and constant<br />

uncertainty as hostages before they were<br />

rescued by Colombian intelligence and<br />

special operations personnel on July 2,<br />

2008. 2 Numerous other contractors and<br />

soldiers have been captured, tortured,<br />

and executed around the world. Clearly,<br />

law enforcement offi cers and security<br />

personnel face similar risks. Ironically,<br />

civilians are targeted even more<br />

frequently.<br />

Each of these groups would benefi t<br />

from training that enhanced their ability<br />

to evade and resist capture. Any person<br />

involved in counter- or anti-terrorism<br />

work must evaluate the risks they face.<br />

Each individual must decide whether<br />

their skills and training are suffi cient or<br />

whether they need to be supplemented.<br />

One source of useful SERE skills is<br />

<strong>onPoint</strong> <strong>Tactical</strong>’s urban escape and<br />

evasion course. •<br />

1 Juan Forero, “Private U.S. Operatives<br />

on Risky Missions in Colombia,” New<br />

York Times, February 14, 2004.<br />

2 Tim Padgett, “Colombia’s Stunning<br />

Hostage Rescue,” Time, July 2, 2008.<br />

Stabilization Through Innovation<br />

The Bishop EMR-100<br />

Robotic directed energy stabilization tool designed for EOD and Bomb Technicians<br />

Impedes motion sensors and electronic devices without causing pre-detonation<br />

or destroying the circuitry<br />

www.pslhq.com<br />

info@pslhq.com<br />

China Lake, CA<br />

(760) 377-4400<br />

(760) 793-2449<br />

Circle 233 on Reader Service Card<br />

Circle 223 on Reader Service Card<br />

62 The Counter <strong>Terrorist</strong> ~ September/October 2008 The Counter <strong>Terrorist</strong> ~ September/October 2008 63


The Counter <strong>Terrorist</strong> ~ September/October 2008<br />

Circle 225 on Reader Service Card

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!