the counter terrorist magazine - october/november 2012

76
The Counter Terrorist ~ October/November 2012 1 An SSI ® Publication OCTOBER/NOVEMBER 2012 USA/CANADA $5.99 Volume 5 • Number 5 SELF-INFLICTED WOUNDS: COUNTER-PRODUCTIVE COUNTER-TERRORISM ALAMOUDI INFILTRATION TF50 RESCUE FARC'S IEDS NON-STATE ECONOMIC WAR Journal for Law Enforcement, Intelligence & Special Operations Professionals www.thecounterterroristmag.com OCTOBER/NOVEMBER 2012 e Counter

Upload: solomon

Post on 01-Apr-2016

219 views

Category:

Documents


0 download

DESCRIPTION

Journal for Law Enforcement, Intelligence & Special Operations Professionals

TRANSCRIPT

Page 1: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 1

An SSI® Publicationoctober/November 2012

USA/cANADA $5.99

Volume 5 • Number 5

SELF-INFLICTED WOUNDS:COUNTEr-PrODUCTIvE COUNTEr-TErrOrISm

AlAmoUDi iNfiltrAtioN • tf50 reScUe • fArc'S ieDS • NoN-StAte ecoNomic WAr

Journal for Law Enforcement, Intelligence & Special Operations Professionals

www.thecounterterroristmag.com

october/November 2012

TheCounter

Page 2: The Counter Terrorist Magazine - October/November 2012

2 The Counter Terrorist ~ October/November 2012

FirstDefender RMX and FirstDefender RMNext generation Raman instruments enable rapididentification of unknown chemicals in the field.

Every second matters.

When time and safety are critical, military and civilian first responders

use Thermo Scientific handheld chemical identification instruments to

rapidly identify explosives, precursors, narcotics and other chemical

hazards directly at the point of need.

With more than 5,000 handheld chemical identification instruments

deployed worldwide, we understand what first responders demand of

their equipment—and why every second matters. These insights were

key as we developed FirstDefender® RM and FirstDefender RMX, our

next generation Raman instruments, which are even faster and easier

to use than ever before.

For rapid, accurate analysis of a wide range of potential chemical hazards,

turn to Thermo Scientific handheld instruments, formerly sold under the

Ahura Scientific brand. To schedule a demonstration of our newest solutions,

visit www.thermoscientific.com/mil-chemID or call +1 (978) 642-1132.

© 2

011

Ther

mo

Fish

er S

cien

tific

Inc.

All r

ight

s re

serv

ed.

Moving science forward

Circle 254 on Reader Service Card

Page 3: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 3Circle 340 on Reader Service Card

The Counter Terrorist_Lenco_2010.indd 1 1/28/2010 10:50:42 AM

Circle 13 on Reader Service Card

Page 4: The Counter Terrorist Magazine - October/November 2012

4 The Counter Terrorist ~ October/November 2012 Circle 29 on Reader Service Card

Page 5: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 5

Counter Thec

ON

teN

ts

60

Journal for Law Enforcement, Intelligence & Special Operations Professionals

october/November 2012Volume 5 • Number 5

8

cOVeR stORy: 34 Self-iNflicteD WoUNDS: coUNter-ProDUctive coUNter-terroriSm By J.S. Mill

FeAtURes:

8 Firsthand: tf50 HoStAge reScUe oPerAtioN iN AfgHANiStAN By“Siwy” and Andrew Balcombe

20 Case Study: tHe iNfiltrAtioN of AbDUrAHmAN AlAmoUDi By Dean Olson

50 fArc’S evolviNg ieD tActicS By Glenn McGovern

60 ecoNomic WArfAre AND tHe NoN-StAte Actor By Kevin D. Freeman

depARtmeNts:

6 from the editor Change We Can Believe In

48 book review The Weight of the Poor: A Strategy to End Poverty

69 innovative Products BCM Recce Carbine, TruNarc, XRS-4 X-Ray Machine

72 training review VxL Seven-Gun

cover: President Obama. Photo: Wikimedia Commons • Pete Souza

50

34

Page 6: The Counter Terrorist Magazine - October/November 2012

6 The Counter Terrorist ~ October/November 2012

t

From The ediTor:

Change We Can Believe Inby chris graham

Counter The

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Volume 5 • Number 5 october/NoVember 2012

EditorChris GrahamDirector of OperationsSol bradmanDirector of AdvertizingCarmen ArnaesProduction Assistantmelissa berneContributing Editorseeben barlowJennifer Hestermanrichard marquisetom NypaverSteve YoungGraphic Designmorrison creative companyCopy EditorLaura TownOffice SupportGiselle Manassalily ValdesPublisher:Security Solutions International13155 SW 134th St. • Ste 204miami, Florida 33186

ISSN 1941-8639 The Counter Terrorist Magazine, Journal for Law Enforcement, Intelligence & Special Operations Professionals is published by Security Solutions International llc, as a service to the nation’s First responders and Homeland Security Professionals with the aim of deepening understanding of issues related to terrorism. No part of the publication can be reproduced without permission from the publisher. The opinions expressed herein are the opinions of the authors represented and not necessarily the opinions of the publisher. Please direct all editorial correspondence related to the magazine to: Security Solutions International SSI, 13155 SW 134th Street, Suite 204, miami, Florida. 33186 or [email protected] The subscription price for 6 issues is $34.99 and the price of the magazine is $5.99. (1-866-573-3999) Fax: 1-786-573-2090.For article reprints, e-prints, posters and plaques please contact:PArS International corp.Web: www.magreprints.com/quickquote.asp email: [email protected]: 212-221-9595 • Fax: 212-221-9195Please visit the magazine web site where you can also contact the editorial staff:

www.thecounterterrroristmag.com© 2012 Security Solutions International

hose of us who have taken the oath to “support and defend the constitution of the united States against all enemies, foreign and domestic” as a condition of employment have grown

accustomed to hearing a consistent assertion over the past four years. We have listened to our seniors and co-workers refer to President barack obama as a neo-socialist. Not an advocate of state ownership of the means of production where his administration would logically be held responsible for the inefficiency of central planning and inevitably oppressive bureaucracy, but a man on a quest for control of the means of production with little respect for privately owned property or individual liberty.

They say that he pursues a system by which free-market traits could be strangled through regulation with waivers and grants held out as incentives for organizations willing to publicly embrace his agenda; an arrangement that would permit the ability to claim credit for anything popular and shift blame to a no-longer existent free-market for anything not.

Just like you, I have no way of knowing if they are correct or not. unfortunately, I cannot deny the concerning nature of many of this administration’s key policies. They have insinuated themselves into unprecedented direction of: medical, banking, energy, auto and housing sectors. members of this administration have promoted anti-constitutional united Nations initiatives (e.g. Agenda 21, the Small Arms treaty, law of the Sea treaty, etc.).

In June 2010, mr. obama’s chairman of the Joint chiefs, Admiral michael mullen admitted that “The most significant threat to our national security is our debt.”1 concurrently, mr. obama championed policies that have exploded the national debt to $16 trillion.2

today, nothing backs the dollar but the reputation of the uS government and on August 5, 2011 Standard and Poore’s unsurprisingly downgraded the uS government’s credit rating.3 rather than placing responsibility for a deteriorating credit rating on the incomprehensible volume of spending made possible by currency debasement and debt, mr. obama rebuked the agency itself.4 even as wealth is poised to flee the european debt debacle, world markets have been incentivized to find alternatives to the dollar. under the obama administration, discussion of the country’s ability to repay this monstrous debt has been abandoned entirely and replaced by assessments of how long interest payments may be sustained. mr. obama has demonstrated severe confusion regarding what actually constitutes an investment rather than an expense.

In a matter of days we will choose between barack obama and mitt romney to serve as President of the united States. of course fiscal negligence is not the only basis to make a choice. one must ask: which candidate is more likely to sue your state on behalf of a foreign nation?5 Which is more likely to sue your state to prevent checking identification to vote?6 Which went to war in libya after mistakenly consulting the u.N. and e.u. rather than congress?7

It is also worth asking: who is more likely to allow the exploitation of domestic energy sources for the achievement of energy independence? Which has inhibited domestic resource use and instead thrown billions of tax-payer dollars at “green” companies that entirely fail to deliver? 8, 9

mr. obama’s political party controlled all branches of government for his first two years in office. They control two-thirds to this day. on the 6th of November I will cast my Independent vote against barack obama for President of the united States. If the obama administration’s great leap forward is not the change you had hoped for you may wish to do the same.

Semper Fidelis,

Chris Grahameditor, The Counter Terrorist

*ENd NoTES: 1http://articles.cnn.com/2010-08-27/us/debt.security.mullen_1_pentagon-budget-national-debt-michael-mullen?_s=Pm:uS accessed 8/10/12.

2http://www.usdebtclock.org accessed 8/10/12.3http://www.standardandpoors.com/ratings/articles/en/us/?assetID=1245316529563 accessed

8/10/12.— End notes for this article are continued on page 73.

Page 7: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 7Circle 301 on Reader Service CardCircle 337 on Reader Service Card

Circle 275 on Reader Service Card

Page 8: The Counter Terrorist Magazine - October/November 2012

8 The Counter Terrorist ~ October/November 2012

Counter The TF 50 operators with suspect. All photos courtesy of POLSOCOM.

Firsthand:

by “Siwy” and Andrew balcombe

tF50 HOstAge RescUe OpeRAtiON iN AFgHANistAN

Page 9: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 9

In 2009, the Polish armed forces contingent in Afghanistan increased to about 2,600 personnel. The Polish government took control of the Ghazni Province, and the Polish special operations task force, TF49 was moved from Kandahar to forward operating base (FoB) Ghazni.

Prc unit for Pakitka Province. So a tF50 detachment was deployed to Fob Sharana.

efforts to build good relations have been the mainstay of tF50’s working partnership with the Afghan security forces and local population. While the Poles are reluctant to kick down doors, they have been busy training the Afghans to take the lead in their own counter-insurgency operations. Their work has achieved high success rates for high value suspect arrests and raiding IeD factories. each step is taken with their Afghan partners.

The Deputy commander of tF50 said, “The Afghans have a long fighting tradition, and we knew that if they

i

Operator with PKM.

n the beginning of 2010, another Polish Special operations command (PolSocom) unit, tF50, rotated into Ghazni, the “Polish province.” It was created by special operations troops from 1PSK (JWK), known in english as “Special commando regiment.” They were stationed in two main Polish bases—Fob Ghazni and Fob Warrior—and their main role was to mentor and train special units of the Afghan police, the Province response company (Prc), from Ghazni Province. tF50’s mission sets are: recon ops, direct action, and high value target arrests (with their Prc partners). In 2011, the decision was made that tF50 would take over the mentoring role of another

Page 10: The Counter Terrorist Magazine - October/November 2012

10 The Counter Terrorist ~ October/November 2012

trusted and respected us because we showed the same trust and respect in them, then they would follow us into very dangerous situations.” He also said, “If the Afghan fighters are motivated, then they will fight hard for you and take great personal risks if necessary.”

In the Paktika Province earlier this year, tF50 was called upon to assist in the resolution of a complex hostage rescue situation. The operation was conducted with the close support of the Afghan security officers they had been training.

ThE MISSIoNProVINcIAl GoVerNmeNt comPouND, SHArANA cItY PAKtIKA ProVINce,10 JANuArY 2012

on the 10th of January, a meeting of local Afghan VIPs was scheduled in Sharana city. The list of guests included the Governor of the Shoran Province, chief of the NDS intelligence service, Provincial commander of Police (PcoP), and the regional commander of the Afghan Army. militants found out about the meeting and decided to attack and kill all who were present. The attackers included suicide bombers wearing explosive vests (five months before, they had managed to kill seventeen policemen in the same way).

During the meeting of VIPs, a group of five insurgents dressed in military and police uniforms approached one of the vehicle control points (VcPs) in a military vehicle. one of the policemen on duty at the VcP noted something was wrong and started a detailed inspection of the group. The insurgents realized they had been discovered and went overt.

They turned left and headed toward the governor’s building. Afghan policemen from the VcP, armed with AK-47 rifles and PK medium machine guns, opened fire but were unable to

Circle 191 on Reader Service Card

Circle 311 on Reader Service Card

Zistos CorporationPh 631.434 .1370E-mail: [email protected]

The Complete Tactical Video Tool System!

� Night Vision Monocular Pole Camera� 2-20ft Pole Cameras� Fiberscopes & Videoscopes � Under Door Cameras� Listening Devices� Thermal Imaging� Robotic Remote Control Cameras � Digital/Analog Wireless Video

An array of technology-basedvideo surveillance tools that

allow a team to safely assess anypotentially dangerous situation

FOR MILITARY & LAW ENFORCEMENT OPERATIONS

All products are interchangeable and new tools can be added at any time!

Page 11: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 11Circle 101 on Reader Service Card

Page 12: The Counter Terrorist Magazine - October/November 2012

12 The Counter Terrorist ~ October/November 2012

AdAms IndustrIes, Inc.

Penetrating the night...

nIght vIsIon/thermAl monoculArs, goggles And weApon sIghts.

www.AdAmsIndustrIes.com

[email protected]

west: (310) 472-3017

eAst: (540) 815-1421

Circle 308 on Reader Service Card

Page 13: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 13

stop them. two policemen who were sentries at the communications center tried to block the car, but the insurgents shot them and rammed the main gate of the building. They were unable to achieve their objective—the governor’s building—so they decided to attack the communications center. They succeeded in penetrating the building and took the people inside hostage.

The incident took place close to our

location; our tF50 detachment was training Prc personnel on the Fob, and we were close to the provincial center buildings. We spoke to a policeman from the VcP and quickly learned what had happened. We also received information from the Chief of the NDS. The insurgents had suffered no casualties to this point, had seized the communications center, and had taken four hostages.

Scoping for the enemy.

AdAms IndustrIes, Inc.

Penetrating the night... The insurgents had killed two

civilians during the initial attack on the communications center. How this happened is not clear, but we suspect they had tried to escape. The Afghan Prc from Sharana was tasked to be the quick reaction force for the meeting. When the crisis started, the Prc was ordered to establish a cordon surrounding the communications center.

The insurgents began firing small arms and rPGs from the building’s windows and managed to damage an mrAP vehicle. At the same time, we heard another group of insurgents were trying to support the five inside the building by attacking the Prc from outside the cordon. We didn’t have detailed information about how many insurgents were in the second group. We only knew there were a number of “civilians” from the city and individual insurgents joining them in an apparent attempt to distract the attention of the coalition forces away from the terrorists in the building. They fired a couple of rPGs and AK-47s.

The uS Army quick reaction force (QrF) from Fob Sharana was called to strengthen the Prc. two AH-64 Apaches arrived as well. The uS commander of Fob Sharana took over responsibility for the operation. He decided to use the helos to clear the roof of the building with their 30mm guns. At that time, all of the VIPs from the meeting had gathered in the operations coordination centre of the Provincial Governor’s building.

The Governor of Paktika Province then decided to attempt to rescue the hostages with an assault. because the Prc was involved in providing cordons, Afghan National Police (ANP) and NDS officers were chosen instead. They conducted two attacks. During the first attack, the enemy threw hand grenades and used direct fire; the assaulters withdrew from the ground floor.

Page 14: The Counter Terrorist Magazine - October/November 2012

14 The Counter Terrorist ~ October/November 2012

Circle 146 on Reader Service Card

TF 50 overwatch.

During the second attack, the assault group was able to seize the stairs to the first floor. The insurgents then killed one of the policemen by throwing a grenade into the stairwell. The officer was struck in the face by shrapnel and the second assault withdrew. During the turmoil and with support from inside the cordon, two hostages were able to successfully escape. After the second failure, the Governor and PcoP decided to use the Prc as an assault group.

because we had been in the area conducting live-fire training with elements of the Prc that day, we heard the shots and explosions and went to Fob Sharana to find out what was happening. We also received a phone call from the Prc commander. He described the situation in detail and asked for our help.

Due to the complex situation, the tactical operations center (toc) wasn’t eager to give us permission to get in to the action. but after we communicated and negotiated with those involved, we eventually received the green light.

The compound was only 500 meters away. So we first established sniper posts 100 meters from the building. These were positioned on the roof of the NDS intelligence building and equipped with trG 22 (7.62x51mm) rifles. We then joined the Prc commander on the building next door.

Since the Prc wasn’t directly involved in the assaults, we had time to start planning our assault with them. At that time, the coalition forces didn’t have permission to take part in the hostage rescue, but we started preparing our equipment and studying the layout of the building anyway.

We realized the insurgents had very strong positions to defend. They expected that attacks would come at the main entrance, so we found a small set of stairs

Military EquipMEnt &tEchnology ExpoMilitary EquipMEnt &tEchnology ExpoOctOber 1–3, 2012 Hosted on Joint Base Lewis-McChord, WA

w w w . m i l i t a r y e q u i p m e n t e x p o . c o m

w w w . C a r g o S e c u r i t y S u m m i t . c o m

Cargo SecuritySummitFocus Day: November 12, 2012Main Summit: November 13-14, 2012Washington, DC

Tackling Supply Chain Vulnerabilities with Industry Capabilities & Government Programs

SAVE 20% OFF standard fees with promo code “HS2012_CS” when you register by September 28!

Circle 162 on Reader Service Card

Page 15: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 15Circle 333 on Reader Service Card

Sponsored by:

Exhibitors:

Venue Partner:Official Freight Forwarder:Official Airline Partner:Knowledge Partners:Event Partner:

Organised by

• Attend the largest and only dedicated C-IED event in Asia

• Gain insight into the tendering process in India during the pre-conference procurement session led by the Indian Ministry of Defence and Indian Ministry of Finance

• Network with 200 delegates from India, Asia and the rest of the world

• Visit the industry-leading exhibition where you will see the latest products, technologies and solutions for the C-IED community

• Obtain a global perspective during case studies from military, government, academic and commercial speakers from India, Asia, Europe, Middle East and the USA

• See the latest C-IED equipment used in live product demonstrations and speak to the operators

• Exchange your opinions with the people that matter during the pre-conference networking drinks reception and end of day two gala dinner open to all attendees.

www.c-iedindia.com

Counter IED India brings together Asia’s leading experts in C-IED, EOD, Land EW and Counter Terrorism for three days of high level discussions, exhibition and demonstrations. It is the largest and only dedicated C-IED event in Asia and offers the chance for those in business to learn from experts, share their perceptions and learn about the related issues concerning this most important threat to Indian and Asian cities, infrastructure and people.

ITC Grand Maratha, Mumbai, India

In Full Partnership with the Centre for Asia Studies

To keep up-to-date with the Latest Programme Updates, Developments and Announcements Visit:

Sponsored by:

Exhibitors:

Venue Partner:Official Freight Forwarder:Official Airline Partner:Knowledge Partners:Event Partner:

1/25 Stryker Brigade Combat Team

The National Guard

Book by 29th Juneand

Save S$300

Official US Navy Imagery The National Guard

Circle 194 on Reader Service Card

Page 16: The Counter Terrorist Magazine - October/November 2012

16 The Counter Terrorist ~ October/November 2012

from the left side of the building that seemed to be a better alternative. These stairs gave us the possibility to attack from an unexpected side.

After the two failed assaults, the Governor and the PcoP decided to establish an assault group consisting of Prc policemen. They also asked us to support them. The Governor was determined to attack as soon as possible because he believed that after dark, the insurgents would kill the hostages and try to break out.

We asked the ISAF SoF commander and PolSocom commander via

tF50 toc for permission to get into the action and received the green light. The Prc unit we had been training closely with was relieved of their cordon duty by the ANP officers and they joined us.

We established two groups. each group consisted of four JWK operators and 12 Prcs. We were able to covertly take our starting positions. We had information that the corridor behind the door on the side of the building was empty and we decided to use a 40mm grenade from an HK under slung launcher to blow the doors at the end of the stairs. The range between our position and the door was so

TF 50 on patrol.

the grenade hit the door and breached it,

so we climbed the stairs to seize the corridor. As

we rounded the edge of the corridor, one of the insurgents opened fire from the second room

on the left side and halted us.

Page 17: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 17Circle 205 on Reader Service Card

Page 18: The Counter Terrorist Magazine - October/November 2012

18 The Counter Terrorist ~ October/November 2012

13th Annual U.S.N.S.T.A. Training Seminar

2012 INSTRUCTORS ACADEMY

U n i t e d S t a t e S n a t i o n a l S t a n d a r d S o f t r a i n i n g a S S o c i a t i o n

GREAT TRAINERS ARE NOT BORN.

theY are made here.

Integrate your Use of Force Training Systems* Defensive tactics* Small Team Tactics* Counter-Terrorism* IED - Bomb Detection* Tactical K9 Deployment* Active Shooter* Non-Lethal Tactics* High-Risk Arrest* Dignitary Protection* Room Extractions

WWW.USNSTA.COM

Call 630-365-1400 for More Information

Presented WITH

Biloxi Police Department

December 10-13, 2012Biloxi, MS

Discount Room Rates Available

Controlled F.O.R.C.E. M.A.C.H.™ Arrest Control Tactics

DepartmentalInstructor

Certification

short that we thought the grenade might not arm and we might have to knock the door out with breaching tools.

The grenade hit the door and breached it, so we climbed the stairs to seize the corridor. As we rounded the edge of the corridor, one of the insurgents opened fire from the second room on the left side and halted us. He used the doorframe for

cover while he fired, and we were unable to hit him with our fire.

We threw a flash bang grenade and he hid himself for a second; we used this moment to take rooms on the right side of the entrance. one of our operators had a good position to wait for the insurgent to appear. When he showed his weapon and shoulder and started shooting

again, the operator eliminated him. our two groups were then able to seize the corridor and we started to clear rooms on the left and the right side.

As clearing continued, the remaining terrorists were eliminated. two wore suicide vests, but were prevented from detonating them. In the same room one of the suicide bombers had occupied, we found the bodies of two other terrorists. They were probably killed during the previous assaults, or had died from their wounds. two hostages were also located in the room and released. We checked the rest of the building, but there wasn’t any more enemy activity.

During all of the operations, four hostages were released (two of them ran out before the assaults, two were released by the JWK and Prc third assault.) Three policemen were killed. During the third assault, we killed three insurgents (two of whom had suicide vests); the insurgents also killed two civilians earlier in the day.

The suicide vests were rigged to be detonated by mobile phone signal. They might have been detonated after receiving a signal from an outside group. before one of the terrorists died, he managed to arm his suicide vest.

two days after these events, a uS eoD team of engineers tried to move the body of an insurgent who had hidden himself under blankets. He had armed his suicide vest to explode as a booby trap. two of the eoD team members were wounded (one seriously). •ABouT ThE AuThoRS

“Siwy” (pseudonym) is a veteran of the Polish 1st Special Commando Regiment (1PSK) with more than ten years of experience.

Mr. Balcombe is an Australian freelance journalist based in the Netherlands. He reports on international justice, defense and security issues.

Circle 247 on Reader Service Card

Page 19: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 19

Protecting the Homeland Together ®

®

SSISSI

Fin

d ou

t mor

e at

: ww

w.h

omel

ands

ecur

ityss

i.com

Take your Training To a higher level...

SECURITY SOLUTIONS INTERNATIONAL

SSI ElEvatEd tactIcS traInIngEnhance the tactical flexibility of your SWAT or SOP team with elevated training using specialized equipment and tools such as those manufactured by Patriot3. Improve your tactical surprise and force protection with additional operational options provided through elevated, special-use vehicles. In this two-day introduction and awareness training, you’ll learn:

• Vehicledrivingandoperatingtechniquesinavarietyofsituations• Globalcasestudiesofreal-worldoperationsusingthespecificequipment• Usingvehicleplatformsforobservation,structuremultipleentrytechniques,andlinearassaults• Elevatedobstaclenegotiationandfiringplatforms• Emergencyevacuations,climbinganddescendingoptions• Distractionanddeceptiontechniques• andmuchmore...

Elevated Tactics Training provided in partnership with Patriot3.

Call now for more information. Phone: 866-573-3999

Fax: [email protected]

Circle 313 on Reader Service Card

Page 20: The Counter Terrorist Magazine - October/November 2012

20 The Counter Terrorist ~ October/November 2012

Case Study:

by Dean olson

ThE INFILTRATIoN oFAbdURAHmAN AlAmOUdi

Page 21: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 21

ne particularly pernicious and effective tactic in modern warfare is the deceptive influence operation. This can be defined as a deceptive and concerted effort focused on affecting the perceptions and behaviors of political, social, religious, and military leaders, groups, or entire populations. The overarching goal is to shape attitudes, emotions, objective reasoning behaviors, and decisions of those targeted that further the interests and objectives of the practitioner.

law enforcement agencies around the world have identified numerous deceptive influence operations launched by the muslim brotherhood. An FbI informant stated: “…as members of the Ikhwan (Arabic shorthand for the muslim brotherhood), they are involved in organizing external political support which involves both influencing public opinion in the United States as well as the United States Government.”1 One of the most noteworthy muslim brotherhood

influence operations uncovered to date involved one of the group’s preeminent figures in America during the 1990s, Abdurahman Alamoudi.

Abdurahman Alamoudi immigrated to the united States from eritrea in 1979 and became a naturalized uS citizen in 1996. During the 1990s, he parlayed his role as founder and executive director of the American muslim council (Amc) and his involvement with nearly two dozen other muslim organizations in this country into access to the White House itself. Alamoudi was regarded by both republican and Democratic administrations as the “go-to guy” on issues that affected muslim America. He was an honored guest at the White House under both the clinton and bush administrations, posed for photographs with American Presidents and their families, and rubbed elbows with the power players of both political parties.2 He was a man the government believed represented moderation. He

O

Abdurahman Alamoudi. Photo: Dennette

"A nation can survive its fools, and even the ambitious. But it cannot survive treason from within. An enemy at the gates is less formidable, for he is known and carries his banner openly." -Cicero

He was a man the government believed represented moderation.

Page 22: The Counter Terrorist Magazine - October/November 2012

22 The Counter Terrorist ~ October/November 2012

even represented the muslim American community at memorial services held at the National cathedral to honor the victims of the 9/11 attacks.

Alamoudi assisted President clinton and the American civil liberties union (Aclu) in 1995 to develop a presidential guideline entitled “religious expression in Public School.” In November of that year, Alamoudi and 23 other muslim leaders met with President clinton and Vice President Al Gore. on December 8, clinton’s National Security Adviser, Anthony lake, met with Alamoudi and several other Amc board members. on February 8, 1996, then First lady Hillary clinton reportedly penned a newspaper column based on talking points provided by Alamoudi. later that month, mrs. clinton asked the Amc to draw up a guest list for a reception that was to be held at the White House marking the end of ramadan.3

Alamoudi parlayed his access at the highest levels of the uS government into playing a lead role in establishing the Muslim Chaplain Program for the Department of Defense. He served as the certifying authority for muslim chaplains serving American armed forces. He was also the founder and leader of the American muslim Armed Forces and Veterans Affairs council (AmAFVAc).4 In 1993, the Defense Department certified AmAFVAc as one of two organizations, (the other being the Graduate School of Islamic and Social Sciences) authorized to approve and endorse muslim chaplains. He publicly boasted to reporters that he was the first person authorized by the uS military to recruit Islamic clerics.5 chaplains vetted by Alamoudi’s group came under scrutiny after the FbI arrested Army chaplin capt. James Yee in 2003, one of the chaplains Alamoudi personally recruited, on charges he was supporting the jihadis

detained at Guantanamo bay, cuba. men working with Yee at Guantanamo, both uniformed and contract employees, were convicted on charges including mishandling classified information and espionage.6

In 1998, Alamoudi provided at least $20,000 in checks enabling republican activist Grover Norquist to establish what would apparently become a muslim brotherhood front organization targeted at penetrating GoP circles and the campaign of then-Governor George W. bush.7 called the Islamic Free market Institute but better known as the Islamic Institute, or II, it was firmly under the control of Alamoudi and the brotherhood; he appointed his long-time deputy, Khaled Saffuri, to serve as II’s first executive director, with Norquist as the chairman of the board.

Alamoudi succeeded until 2003 when he was detained at Heathrow Airport in london trying to enter the united States with $340,000 of libyan money. He was arrested on his arrival at Dulles and ultimately charged with making multiple illegal trips to libya in violation of uS law. He surrendered an estimated $910,000 that he had received from the libyan government and acknowledged his role in a plot to assassinate then-crown Prince, (now King) Abdullah of Saudi Arabia.8

Alamoudi is now serving a 23-year sentence in federal prison. In a secretly recorded conversation after the 1998 bombing of two US embassies in Africa, Alamoudi called the attacks by al Qaeda “wrong” but then added: “What is the result you achieve in destroying an embassy in an African country? I prefer to hit a Zionist target in America or Europe ... I prefer, honestly, like what happened in Argentina ... The Jewish community center. It is a worthy operation” a reference to the July 18, 1994, car-

James Yee at Lancaster University showing a photo of Guantanamo. Photo: Jaqen

Page 23: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 23

For more information please visit www.preventivestrategies.net or www.ruraltraining.org

Rural Domestic Preparedness Consortium

Homeland SecurityCERTIFICATE PROGRAM

Courses for Public Safety Practitioners Courses include:

Law Enforcement Professionals Available Now!

Fire Service Professionals Available Now!

Emergency Management Professionals Coming Soon!

Enroll in a course today.No fees! No cost!

DISCLAIMER: This project was supported by Cooperative Agreement Number 2006-GD-T6-K001 administered by the U.S. Department of Homeland Security/FEMA, Training and Exercises Integration Secretariat. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the U.S. Department of Homeland Security.

Circle 265 on Reader Service Card

bombing of a Jewish community center in buenos Aires that killed 86 people.9 In 1994 he said: “Hamas is not a terrorist group.... I have followed the good work of Hamas.” In march 1996, Alamoudi said he was “honored to be a member of the committee that is defending” Islamic Association for Palestine (IAP) founder musa Abu marzook, who in 1997 would be deported from the united States because of his Hamas-related activities. “I really consider him to be from among the best people in the Islamic movement,” Alamoudi added. “Hamas ... and I work together with him.” And in December 1996, Alamoudi told a meeting of the IAP: “I think if we were outside this country, we can say, ‘oh, Allah, destroy America,’ but once we are here, our mission in this country is to change it… You can be violent anywhere else but in America.”10 As part of his plea agreement,

Alamoudi acknowledged membership in the muslim brotherhood. The treasury Department reports that he had raised a million dollars for al Qaeda.11

before his fall, Abdurahman Alamoudi was a key proponent of the global Islamic supremacist movements. Alamoudi’s fall revealed brotherhood influence operations in America supporting a long-term, persistent, pre-violent threat that can be thought of as a form of “soft” jihad. His high profile and access to the nation’s political leaders indicate a highly successful agent-of-influence. For decades, highly trained, dedicated Islamists of the brotherhood have been operating successfully and with significant effect on American soil.12 His loss no doubt was a blow to the muslim brotherhood. Despite the nature and scope of this complex internal threat, it is rarely addressed in public forums,

For decades, highly trained, dedicated islamists of the brotherhood have been operating successfully and with significant effect on American soil.

Page 24: The Counter Terrorist Magazine - October/November 2012

24 The Counter Terrorist ~ October/November 2012

prompting some to describe it as a “third rail” of American political discourse.13

muslim organizations affiliated with the brotherhood operate on two levels. They present a public face of reasonableness, openness, and tolerance, seeking only the right to peacefully practice their faith as guaranteed under the uS constitution. The public face masks a hidden agenda as part of a calculated effort to dissemble and mislead.14

The case of Huma Abedein, Deputy chief of Staff to Secretary of State Hillary clinton and wife of former rep. Anthony Weiner (D-NY) is another interesting situation. multiple sources indicate that her late father, brother, and mother belong to, or have ties to, muslim brotherhood groups.15 Abedin’s mother, Dr. Saleha S. mahmood Abedin, is an influential member of the muslim

brotherhood’s division for women, the muslim Sisterhood. She is also a zealous advocate of shariah law’s oppression of women.16 Saleha Abedin is a board member of the International Islamic council for Dawa and relief (IIcDr). The IIcDr has long been banned in Israel for supporting the terrorist group Hamas. It is also part of the union for Good, which is formally designated under federal law as an international terrorist organization. The union for Good is led by Sheikh Yusuf al-Qaradawi, the Chief Shariah Jurist of the Muslim brotherhood. He is one of the world’s most influential Islamic clerics, and has issued fatwas endorsing suicide bombings against Israel and terrorist attacks against American forces in Iraq.17

Huma Abedin was, until late 2008, a member of another of her mother’s Islamist organizations, the Institute of

Circle 285 on Reader Service Card

308.278.3131 www.golight.com [email protected]

LEADING THE WAY LED Lighting by Golight inc

» Long Life LED’s

» Low Amp Draw

» Remote Controlled or Fixed

» Portable or Permanent Mount

Page 25: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 25

muslim minority Affairs (ImmA). The center for Security Policy, a private think tank, has reviewed past mastheads of the ImmA’s journal.18 They report that Huma Abedin was listed as an assistant editor (to her mother, the editor-in-chief ) as far back as 1996, the year she began interning at the clinton White House. The ImmA was started in Saudi Arabia in the 1970s by Huma Abedin’s parents, with the backing of Abdullah omar Naseef. Naseef is a former secretary-general of the muslim World League, which has long been a Muslim brotherhood vehicle for the international propagation of Islamic supremacist ideology.19

Huma Abedin’s brother, Hassan Abedin, besides also being part of the ImmA, was a fellow at the oxford center for Islamic Studies. on the board at the oxford center when Hassan Abedin was a fellow were the aforementioned brotherhood heavyweights and terror promoters, Sheikh Qaradawi and Abdullah omar Naseef.20

Since ms. Abedin assumed this position, the State Department has supported abandoning the federal government’s prior policies regarding dealing with the muslim brotherhood.21 The State Department has embraced a number of surprising positions relevant to the muslim brotherhood:22

• Secretary clinton personally intervened to reverse a previous administration’s barring tariq ramadan, grandson of the brotherhood’s founder and son of one of its most influential early leaders, from entering the united States.23

• The State Department has collaborated with the organization of Islamic Cooperation, a bloc of governments heavily influenced by the brotherhood, in seeking to restrict

American free-speech rights in deference to shariah proscriptions against criticism of Islam.24

•The State Department has excluded Israel, the world’s leading target of terrorism, from its Global Counterterrorism Forum, a group that brings the united States together with several Islamist governments, prominently including its co-chair, turkey—which now finances Hamas and avidly supports the flotillas that seek to break Israel’s blockade of Hamas. At the forum’s kickoff, Secretary clinton decried various terrorist attacks and groups, but she did not mention Hamas or attacks against Israel—in apparent deference to the Islamist governments, which follow the brotherhood’s position that Hamas is not a terrorist organization and that attacks against Israel are not terrorism.25

• The State Department and the administration recently hosted a contingent from egypt’s newly elected parliament that included not only muslim brotherhood members, but a member of the Islamic Group, Gama’at al Islamiya, which is recognized by the uS government as a foreign terrorist organization. The State Department has refused to explain the process by which it issued a visa to a member of a designated terrorist organization, about how the members of the egyptian delegation were selected, or about what security procedures were followed before the delegation was allowed to enter our country.26

• on a recently-completed trip to egypt, Secretary clinton pressured General mohamed Hussein tantawi, head of the military junta currently governing the country, to surrender power to the newly-elected parliament, which is dominated by the muslim brotherhood, and the newly-elected president, mohamed morsi, who is a

“i think if we were outside this country, we can say, ‘Oh, Allah, destroy America,’ but once we are here, our mission in this country is to change it… you can be violent anywhere else but in America.”

Page 26: The Counter Terrorist Magazine - October/November 2012

26 The Counter Terrorist ~ October/November 2012

top brotherhood official. She also visited with morsi immediately after his victory, during which morsi proclaimed that his top priorities included pressuring the united States to release the “blind Sheikh” (omar Abdel rahman), a convicted terrorist.27

Another apparent success for brotherhood influence operations is the case of mohamed elibiary, who serves on the Department of Homeland Security, Homeland Security Advisory committee. elibiary is accused of leaking restricted documents to the press to paint then-republican presidential candidate texas Governor rick Perry as having an anti-muslim bias.28 elibiary is a member of the Department of

Homeland Security’s countering Violent extremism Working Group and the only member of that group with access to the Homeland Security State and local Intelligence community of Interest (HS SlIc), which contains restricted law enforcement counterterrorism intelligence.29 30 31

elibiary is also President and ceo of the Freedom and Justice Foundation (FJF), an organization with ties to the uS muslim brotherhood and the uS Hamas infrastructure.32 A bio page from the FJF website, which has since apparently been sanitized to remove elibiary’s information, stated that he had earned several certifications from an unidentified Islamic university on issues related to Islamic law and Governance and that trustee Abdulhakim mohamed, also no longer listed on the site’s webpage, was a graduate of the university of medina (known to be a center of muslim brotherhood activity in Saudi Arabia). The older FJF webpage went on to describe mr. elibiary’s occupation:

Since 2005, Mohamed, as a National Security Policy Analyst, has been advising Intelligence and Law Enforcement agencies (e.g. FBI, DHS, NCTC, ODNI, etc.) on various Counter-Terrorism (CT) issues (e.g. Domestic Intelligence, Strategic Intelligence Analysis, Information Sharing and Radicalization). He currently is: pursuing a Certification in Homeland Security Studies at the Michigan State University (MSU) School of Criminal Justice a 2008-2009 Fellow at the University of Southern California (USC) American Muslim Civic Leadership Institute (AMCLI). AMCLI is a joint program through USC’s Center for Religion and Civic Culture and Georgetown University’s Prince Alwaleed Bin Talal Center for Muslim-Christian Understanding.33

The center for muslim-christian understanding at Georgetown is directed

Minaret at the Islamic Association of North Texas. Photo: Mang9

Page 27: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 27Circle 83 on Reader Service Card

by long-time global muslim brotherhood supporter John esposito.34 35 36 mr. elibiary’s current FJF biography omits all of the above information pertaining to Islamic universities and to his role in advising intelligence and law enforcement agencies, reporting only that:

Mohamed Elibiary wears two hats, one as the Founder of Lone Star Intelligence LLC, a Security Crisis Consulting Firm, and the other as President of The Freedom and Justice Foundation (F&J), a Texas Muslim interfaith community relations and state public policy educational nonprofit.

elibiary is on record in 2008 criticizing the Hamas terrorism financing convictions of the Holy land Foundation (HlF) defendants. He referred to the federal trial as “a policy of denying our civil liberties”:

The U.S. government won a resounding court victory last Monday, convicting all

the Palestinian HLF defendants on all “material support” charges leveled against them. Yet in the grand scheme of things, our government’s policy of denying our civil liberties and privacy at home while pursuing a cold war “containment” policy that often turns into a hot war for “regime change” has left thousands of Americans dead, tens of thousands maimed, trillions of taxpayer dollars squandered and our homeland more vulnerable than ever. A myopic view might wish to celebrate the HLF verdict, but the big picture clearly shows a continuing loss for America. 37

elibiary’s position on the Holy land Foundation case is not surprising given the composition of the FJF Advisory council, many of whose members were listed in the earlier FJF webpage, since sanitized by replacing it with a page omitting the council altogether. many of the Advisory council members are

Page 28: The Counter Terrorist Magazine - October/November 2012

28 The Counter Terrorist ~ October/November 2012

Helping You Protect Us

Karlstad, MN / 877-436-7800 Mattracks.com

RUBBER TRACK

CONVERSION SYSTEMS,

76 MODELS TO

CHOOSE FROM !

12SM00000149

Circle 297 on Reader Service Card

associated with the Islamic Association of North texas, which operates the Dallas central mosque (Dcm). both organizations are known to be associated with the uS muslim brotherhood and the Hamas infrastructure in the united States, including the now defunct HlF.38

revealing his true leanings, elibiary has written admiringly of Sayid Qutb, one of the most important thinkers and writers behind modern Islamic supremacist movements.39 The motives of the brotherhood are cleverly cloaked by the brotherhood tactic of muruna, or flexibility.40 This tactic is extremely effective because it sanctions behavior normally proscribed by shariah that Western observers sometimes see as a more moderate version of Islam when such prohibitions are suddenly permitted. Qaradawi wrote the series entitled,

Preparing the Atmosphere under the title, The Workings of Al-Si’a (Inclusion) and Muruna (Flexibility): “…it was made lawful for them to have exceptions from the law (shariah) that are appropriate for them since these exceptions match their general goals…”41 Qaradawi continues:

…if the interests of the Brotherhood and harms/evils conflict, or benefits conflict with evils, what is then to be decided is to review each benefit and each harm/evil and its consequences, so the minor evils are forgiven for the sake of the greater long-term benefit. The evil is also accepted even if that evil is extreme and normally considered deplorable.

According to this tactic, Huma Abedin, a practicing Muslim, can engage in what is deplorable and forbidden under shariah, and can marry Jewish (now-former) congressman Anthony Weiner.42 by “sanctioning prohibitions,” the

by “sanctioning prohibitions,”

the brotherhood sanctions breaking

shariah laws for the sake of

necessities.

Page 29: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 29Circle 211 on Reader Service Card

“knowledge is critical to deter the threat of terrorism.”

Elena Mastors, Ph.D. | Dean, School of Security & Global Studies

Dr. Mastors represents the caliber of AMU scholar-practitioners, combining in-depth field research with academic rigor. A foremost expert in political-psychology pertaining to counter-terrorism, she taught at the U.S. Naval War College and frequently lectures on subjects of conflict, terrorism, and political leadership. A published author, her works include, Breaking al-Qaeda: Psychological and Operational Techniques and The Lesser Jihad: Recruits and the al-Qaida Network.

Learn More at www.amuonline.com/counter-terrorist

Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Page 30: The Counter Terrorist Magazine - October/November 2012

30 The Counter Terrorist ~ October/November 2012

Circle 273 on Reader Service Card

Circle 148 on Reader Service Card

brotherhood sanctions breaking shariah laws for the sake of necessities. This type of deception is an effective tool in the muslim brotherhood’s soft jihad against America and the west.

revelation of the extent of success of the brotherhood’s misleading of media, and wielding influence through pundits, civil rights organizations, political fronts, charities and agents-of-influence, along with insinuation into decision making processes in government, would likely raise the public’s concern. The one inarguable element in this controversy is the ideology of the brotherhood and confiscated documents that are akin to a “playbook.”43 44 45 Armed with muruna, and well-entrenched agents of influence like Abdurahman Alamoudi, the muslim brotherhood is positioned to pursue the achievement of their stated goal of defeating the united States to impose Islam and shariah on the West in time. •ABouT ThE AuThoR

Mr. Olson is a retired law enforcement commander. He was in charge of his department’s participation in the regional Joint Terrorism Task Force. His most recent book is tactical counterterrorism: The Law Enforcement Manual of terrorism Prevention (Charles C. Thomas, 2012).

ENd NoTES1“An Analysis of religious Divisions

in the muslim community of toronto, (December 27, 1987): Investigative Project on terrorism (IPt), Document #159, http://www.investigativeproject.org/documents/misc/159.pdf.

2michael Isikoff, . “terror Watch: Who, And What, Does He Know?” Newsweek (September 30, 2003): http://www.thedailybeast.com/newsweek/2003/09/30/terror-watch-

HUMANGeographySUMMIT

w w w . H u m a n G e o g r a p h y E v e n t . c o m

Social and Cultural Human Geography and Intelligence Focus Day : November 12, 2012Main Summit: November 13-14, 2012Washington, DC

Next Generation Light ArmoredVehicles Summit

11th Annual

of

Emerging Priorities for New and Legacy Platforms

w w w . L i g h t A r m o r e d V e h i c l e s S u m m i t . c o m

Engineering Solutions within Platform Reliability Focus Day: November 12th, 2012Main Summit: November 13th & 14th, 2012 Washington DC

Circle 168 on Reader Service Card

Page 31: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 31

who-and-what-does-he-know.html.3Andrew mccarthy . “Huma Abedin

and the muslim brotherhood: closely connected,” PajamasMedia.com (July 24, 2012): http://pjmedia.com/andrewmccarthy/2012/07/24/huma-abedin-and-the-muslim-brotherhood-closely-connected/?singlepage=true.

4“Abduraham Alamoudi,” DiscoverTheNetwork.org, http://www.discoverthenetworks.org/printindividualProfile.asp?indid=1311.

5“military Probes Hiring of clerics,” Washington Times (September 25, 2003): http://www.washingtontimes.com/news/2003/sep/25/20030925-115141-6122r/?page=all.

6 Ibid.7center for Security Policy’s team b

report, Shariah: The Threat To America, 76.

8Department of Justice. “Abdurahman Alamoudi Sentenced to Jail in terrorism Financing case,” Department of Justice (DoJ) Announcement # 04-698, (october 15, 2004): http://www.justice.gov/opa/pr/2004/october/04_crm_698.htm.

9Dean olson, “ungoverned Areas Pose Transnational Threats,” Eurasia Review, December 2010.

10“Abdulrahman Alamoudi—Head of American Muslim Council Goes to Jail for 23 Years,” Militant Islamist Monitor (MIM) (october 29, 2004): http://www.militantislammonitor.org/article/id/306.

11Ibid.12Peter Probst, “Political Warfare, the

muslim brotherhood, and the targeting of America,” Family Security Matters (December 11, 2008): http://www.familysecuritymatters.org/publications/detail/exclusive-the-many-forms-of-radical-islam-all-threaten-america-part-1-of-3.

13Ibid.14Ibid.

15Walid Shoebat, “Proof: Huma has ties to muslim brotherhood—countless Documents Surface, Shoebat.com (July 23, 2012): http://www.shoebat.com/wp-content/uploads/2012/07/bachmann-Final_072312.pdf.

16Andrew mccarthy, “Huma Abedin and the muslim brotherhood: closely connected,” PJ Media (July 24, 2012): http://pjmedia.com/andrewmccarthy/2012/07/24/huma-abedin-and-the-muslim-brotherhood-closely-connected/?singlepage=true.

17“Apologies or extremists: Yusuf al-Qaradawi,” The Investigative Project on terrorism (July 9, 2008): http://www.investigativeproject.org/profile/167.

18 ties That bind? The Views and Agenda of Huma Abedin’s Islamist mother,” Special report by the center for Security Policy, (July 22, 2012): http://supportsecurefreedom.org/wp-content/uploads/2012/07/cSP-Analysis-of-excerpts-from-Women-in-Islam-and-IIcWc-IIcDr-relationship.pdf.

19Ibid., 16.20Ibid., 16.21Ibid., 16.22Ibid., 16.23Sarah lyall, “In Shift, u.S. lifts

Visa curbs on Professor,” The New York Times (January 20, 2010): http://www.nytimes.com/2010/01/21/world/europe/21london.html?_r=1.

24Patrick Goodenough, “religious tolerance resolution backed by obama Administration Aligns with Islamic bloc’s Interests,” CNSNews.Com (December 16, 2011): http://cnsnews.com/news/article/religious-tolerance-resolution-backed-obama-administration-aligns-islamic-bloc-s.

25Adam Kredo, “Israel’s Plight Ignored: counterterrorism Forum excludes Israel Despite State’s record of Suffering terrorist Attacks, The Washington Free Beacon (July 10, 2012): http://freebeacon.

com/israels-plight-ignored/.26Shane Wolfe, “King calls on

Secretary Napolitano for explanation about Granting of Visa to Hani Nour eldin, member of Designated terrorist organization,” committee for Homeland Security (June 24, 2012): http://homeland.house.gov/press-release/king-calls-secretary-napolitano-explanation-about-granting-visa-hani-nour-eldin-member.

27Andrew mccarthy, “on egyptian President-elect’s Vow to Work for blind Sheikh’s release,” National Review Online (June 30, 2012): http://www.nationalreview.com/corner/304490/egyptian-president-elects-vow-work-blind-sheikhs-release-andrew-c-mccarthy.

28Patrick Poole, “Alleged DHS leaker elibiary the only Adviser Given Access to Sensitive law enforcement Database,” PJ Media (November 3, 2011): http://pjmedia.com/tatler/2011/11/03/alleged-dhs-leaker-elibiary-the-only-adviser-given-access-to-sensitive-law-enforcement-database/.

29“u.S. Immigration Policy and enforcement Session, House Judiciary committee, rayburn office buliding,” Texas Congressman Louie Gohmert (r-tX01), c-Span 3, C-Span.Org. and DHS, n.d. Homeland Security Advisory council members, mohamed elibiary, Foundation, Founder, lone Star Intelligence, LLC, Department of Homeland Security (oct 26, 2011): http://www.dhs.gov/files/committees/editorial_0858.shtm#9.

30“mohamed elibiary, Foundation, Founder, lone Star Intelligence, llc,” Homeland Security Advisory council Members, Department of Homeland Security, http://www.dhs.gov/files/committees/editorial_0858.shtm#9.

31“u.S. Homeland Security Advisor Alleged to Have leaked Sensitive law enforcement Documents,” Global Muslim

Page 32: The Counter Terrorist Magazine - October/November 2012

32 The Counter Terrorist ~ October/November 2012

Brotherhood Daily Report (November 8, 2011): http://globalmbreport.org/?p=5257.

32“exclusive: New uS Homeland Security Advisor Head of organization with ties to Global muslim brotherhood/Hamas,” Global Muslim Brotherhood Daily Report (october 30, 2010): http://globalmbreport.com/?p=3577.

33Ibid.34“u.S. muslim brotherhood boycotts

NYPD ramadan conference; John esposito Joins boycott,” Global Muslim Brotherhood Daily Report (July 16, 2012): http://globalmbreport.com/?p=6516.

35“muslims in American Public Square,” center for muslim-christian understanding, DiscoverTheNetwork.org, http://www.discoverthenetworks.org/printgroupProfile.asp?grpid=6620

36“Prince al Waleed center for muslim-

christian understanding,” Georgetown university, DiscoverTheNetwork.org, http://www.discoverthenetworks.org/printgroupProfile.asp?grpid=6460.

37“exclusive: New uS Homeland Security Advisor Head of organization …” http://globalmbreport.org/?p=3577.

38Ibid.39rob mattiza, “Sayyid Qutb’s

Purpose-Driven life,” Dallas Morning News (August, 6, 2006): http://dallasmorningviewsblog.dallasnews.com/2006/08/sayyid-qutbs-pu.html/.

40Dean olson, Perfect Enemy: The Law Enforcement Manual of Islamist Terrorism, (Springfield, Il: charles c. Thomas Publishing), 212.

41Ibid., 15.42Ibid., 15. 43Patrick Poole, “The muslim

brotherhood ‘Project,’”

FrontPageMagazine.com (may 11, 2006): http://archive.frontpagemag.com/readarticle.aspx?artid=4476.

44The muslim brotherhood “Project,” InvestigativeProject.org, http://www.investigativeproject.org/documents/misc/687.pdf.

45“‘A Suggested Work Paper’—‘re-arranging Frame of Work on the Inside,’” NineelevenFoundation, http://nefafoundation.org//file/FeaturedDocs/Ashqar_suggestedworkpaper_trial2.pdf.

Circle 166 on Reader Service Card

Page 33: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 33

TheCounter Journal for Law Enforcement, Intelligence & Special Operations Professionals

7th Annual

presents:

This year’s conference will focus on the partnership between the Public and Private sector; a partnership that is vital if we are to confront the many threats from both criminal and terror networks over the next decade.With eight exciting speakers over three days, you will learn about:

• LArGE SCALE PubLiC EvEntS SECurity – How to protect hotels, stadiums, celebrations, and parades

• intELLiGEnCE – How the private and public sectors can work together

• thrEAtS – Gang threats and new groups that could impact our way of life

• tEChnOLOGiES – to protect against crowd violence and to protect spectators

• hOw – law enforcement and other First responders can make the transition to the private sector

• FinAnCinG tErrOriSm – How public and private sector can work together to effectively combat this threat

• AnD muCh mOrE…

Cost: $399 RegistrationThis conference is approved for graduate and undergraduate credits through Saint leo university

HomelAND SecurItY ProFeSSIoNAlS coNFereNce AND eXPoSItIoNNovember 5-7, 2012 • orlando, Florida

NEW DATES & LOCATION

FOR 2012!

LEARN MORE at: www.thecounterterroristmag.com/conference SECURITY SOLUTIONS INTERNATIONALSSI

®

SSICall now for more information. Phone: 866-573-3999

Fax: [email protected] Protecting the Homeland Together ®

Circle 35 on Reader Service Card

Page 34: The Counter Terrorist Magazine - October/November 2012

34 The Counter Terrorist ~ October/November 2012

Counter The

selF-iNFlicted WOUNds:

Counter-Productive Counter-Terrorism

by J.S. mill

Page 35: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 35

USMC guardtower, Guantanamo, 2002 Photo: Jonathan Rashad

A CLoSING oR uPGRAdING GuANTANAMo

long before the 2008 presidential elections, the Guantanamo detention procedures were criticized daily by mainstream media. many described the facility as something similar to an American “gulag.” However, when the International committee of the red cross (Icrc) visited Guantanamo on January 22, 2002, the organization found no credence to those allegations. media generally stopped publishing articles about the alleged horrendous conditions

A retrospective analysis of the scope and significance of recent questionable policies demonstrates how the current civilian leadership at the highest levels of the Executive and Legislative branches of our government have taken actions that are quickly forgotten. however, the consequences of those actions continue to play a significant role in how the united States deals with increasingly sophisticated emerging threats.

dispassionate logical and legal analysis of prior decisions

made at the highest levels of our government reveals a number of self-defeating decisions and their direct effect on the ability of our military and intelligence agencies to perform their mandated functions. each example, while not exhaustive, is predicated on verifiable facts. The analysis is not designed to suggest that one wound is greater than another. However, individually and cumulatively they mandate further scrutiny because we do not yet know their full consequences.

Page 36: The Counter Terrorist Magazine - October/November 2012

36 The Counter Terrorist ~ October/November 2012

at Guantanamo and shifted focus.1 • FAct: The first major act of the

current presidential administration was to sign three executive orders that mandated the closure of Guantanamo; limited interrogation techniques to those in the “Army manual,” and summarily halted all actions by congressionally constituted military tribunals. However, recently it was revealed that instead our government spent $744,000 to build a new soccer field on the $39 million facility housing the remaining detainees at Guantanamo.2

• FAct: Guantanamo far exceeds every standard that has previously existed during any war in any country for detention of prisoners of war.

VIoLATIoN oF ThE GENEVA CoNVENTIoN, ThE NuREMBERG PRINCIPLES ANd ThE LAW oF WAR

• FAct: The masterminds of 9/11, Khalid Sheik mohammad et al, have yet to be tried before a military tribunal that was specifically authorized by the uS congress. Yet, with the stroke of a pen, the President of the united States summarily halted all proceedings of every type before the duly constituted congressionally mandated military tribunals.3 only recently have military tribunals begun to review cases and hold the proceedings they were constituted to hold in 2007.

• FAct: chinese uighur prisoners captured in Afghanistan and Iraq fighting alongside al Qaeda and the taliban were not returned to their home country of china even though the uS Supreme court specifically mandated that the united States follow common Article 4 of the Geneva conventions. It appears that the united States paid

the government of Palau $200 million to accept 17 uighur prisoners from Guantanamo. Four uighurs were transferred to bermuda, but the amount of uS payments to bermuda has not been released4 However, the payment of $200 million to Palau equates to $11,706, 000 per uighur and was designated as “uS development funds”.5 Further, the failure to return the Chinese Uighurs to their home country constitutes a direct violation of Article 109 of the Third Geneva convention.6

• FAct: Notwithstanding that congress specifically created the military tribunals to try prisoners in accordance with the laws of War, uS Attorney General eric Holder sought to try enemy combatants in uS Federal District courts even though they were captured abroad. The ensuing firestorm of controversy brought strict limitations regarding what congress intended and was made enforceable through a series of legislative restrictions that provided that no funds could be spent to transfer any detainee at Guantanamo to the united States.

• FAct: The Department of Justice (DoJ) has consistently taken the position that detainees at Guantanamo and elsewhere who are defined as prisoners by the Geneva convention were to be tried in uS Federal District court. However, when congress stopped the funding for transfer of those prisoners to the united States for trial, the already long-established military tribunals were allowed to proceed. The fact remains that Khalid Shaikh mohammad and the other masterminds of 9/11, each of whom has openly admitted his role in the terrorist attacks of September 11, 2001 in open court before a military tribunal in 2008, have yet to be held accountable. Justice has yet to be done.7

the damage inflicted on ciA operational personnel and other

intelligence agents is incalculable and not subject to quantified

analysis because of the clandestine

nature of operations.

Secretary of State Hillary Clinton, Secretary of Defense Robert M. Gates, and U.S. Attorney

General Eric Holder. Photo: Cherie Cullen

Page 37: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 37

• Motion activated trigger as fast as 1/10th of a second.• 1080P High Definition color images by day, NoGlowTM Covert

Infrared illumination by night.• Compact size (5.5” x 4.5” x 3”) aids in concealment.• On-board memory and power with a battery life of up to one

year or 40,000 images.

• Completely weatherproof housing designed forextreme duty usage.

• General surveillance and license plate capturemodels available.

• Made in the U.S.A.

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areaswhere no power or communication lines exist.

Visit www.reconyx.com for more information.

CovertInfrared

CovertInfrared

NoGlow

Circle 303 on Reader Service Card

CIA oPERATIVES INVESTIGATEd FoR ThE ThIRd TIME

Shortly after the President signed the three executive orders relating to closing Guantanamo, placing restrictions on interrogation techniques, and halting all military tribunals from proceeding, Attorney General eric Holder announced another Department of Justice investigation into the actions of certain CIA interrogators, who are some of the most effective personnel employed by the cIA. 8 of significance is the fact that those same cIA personnel had been the target of two prior comprehensive investigations launched by a uS Attorney and the Inspector General cIA, both of which exonerated them. Those

investigations, like the third Holder DoJ investigation, focused specifically on the use of “enhanced interrogation techniques,” including ”waterboarding.”

to accurately place waterboarding in context, one must understand that uS military pilots, air crew, special operations troops, and some DoD civilian contractors routinely undergo waterboarding during survival, evasion, resistance, and escape (Sere) training. Waterboarding does not cause death, mutilation, physical injury, or drowning, nor does it cause any permanent impairment, except perhaps to the ego of the person who disclosed information. unfortunately, that fact was not widely reported. of greater significance is that waterboarding was only used on three of the highest value prisoners, including

Khalid Shaikh mohammed; Abu Zubayadh, and Abd al-rahim al-Nashiri.9

The Aclu, The National lawyers Guild, and a host of activist organizations argued that waterboarding constitutes torture, which is prohibited by the Geneva convention and by uS Federal criminal law. The fact is that only because of waterboarding were uS Intelligence operatives able to obtain the names of bin laden’s courier, which allowed them to track back to the bin laden compound in Abbottabad, Pakistan.10

• FAct: Details of two prior investigations concluded that the so-called enhanced interrogations in the form of waterboarding were allowed only under very specific legal authority, which had been requested by former President

Page 38: The Counter Terrorist Magazine - October/November 2012

38 The Counter Terrorist ~ October/November 2012Circle 180 on Reader Service Card

• Dozens of critical training topics • Learning and records management system options

• Ideal for in service/roll call training

• Easy-to-use video navigation

• Lesson plans and quizzes

• Tracking and reporting features • Mobile data computer accessibility

The PoliceOne Academy is available to law enforcement departments for an annual subscription based on agency size.

Contact us today at 800-323-0037

[email protected] your FREE department preview!

www.policeoneacademy.com

In partnership withis a Praetorian Group Company

With the PoliceOne Academy’s innovative applications, your organization can meet its unique online training and records management needs like never before.

Circle 335 on Reader Service Card

Page 39: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 39

George W. bush.11 The secret memo was dated August 1, 2002, and was authored by John Yoo and signed by Jay S. bybee. A later memo was authored and signed by Steven G. bradbury in 2005. The three Department of Justice former employees were the subjects of a five-year DoJ office of ethics investigation, which finally exonerated them from all ethical charges, including legal malpractice.

• FAct: A uS Attorney previously found that those same cIA officers acted under color of law and followed the detailed legal opinion by the uS Department of Justice office of legal counsel.

• FAct: No evidence of any type or kind was found that indicated any of the cIA officers acted other than in strict compliance with legal opinions rendered before the enhanced

interrogations were applied. • FAct: only three of the highest-

value detainees were subjected to the enhanced interrogation technique of waterboarding. Not one individual subjected to enhanced interrogation died or was maimed or permanently injured in any way. That fact is consistent with the Department of Justice, office of legal counsel secret legal opinions.

• FAct: even after the killing of osama bin laden, in response to a question from NBC News Anchor brian Williams, Director of central Intelligence leon Panetta confirmed: “enhanced interrogation techniques including waterboarding were used to extract information that led to the mission’s success.” 12

• FAct: on June 30, 2011, nearly two months after the successful bin

Circle 175 on Reader Service Card

All Armor. All The Time.

Armored Vehicles - From simple cargo transport to dignitary protection, we have the skills needed to manufacture or acquire the right vehicle for your needs.

Military Vehicles and Systems - Whether you are looking for chassis up design and build, or are looking to protect systems on existing platforms, our people and skills will provide a quality solution.

Armored SUVs Armored Tactical and Riot Trucks Armored Buses.

We provide the following products and services:

Armored Passenger Vehicles Designed and Engineered Armored Solutions Fleet Management, Parts and Service Contract Production Training and Education

www.heat-armor.com 1.773.938.1030 [email protected]

laden raid, Attorney General eric Holder announced a new federal criminal investigation into cIA personnel arising from the deaths of two detainees while they were being held in cIA custody at foreign secret sites.13 The Aclu issued a press release charging that the new DoJ Investigation was “too narrow.”

The effect on all intelligence officers in every intelligence agency was to reduce the aggressiveness of operations or risk facing yet another Department of Justice investigation. The damage inflicted on cIA operational personnel and other intelligence agents is incalculable and not subject to quantified analysis because of the clandestine nature of operations. unfortunately, during the past three and a half years, the primary emphasis appears to have shifted from doing what is legal and necessary to “Is this

Page 40: The Counter Terrorist Magazine - October/November 2012

40 The Counter Terrorist ~ October/November 2012

“Dr. Jasser is one of the most courageous and relentless pursuers of truth and freedom in the Muslim world. A BATTLE FOR THE SOUL OF ISLAM takes you beyond the sound bites to

-verted your religion.” —Glenn Beck, New York Times bestselling author of Being George Washington

“Zuhdi Jasser is a brave American patriot, a faithful Muslim and a good man. Dr. Jasser’s A BATTLE FOR THE SOUL OF ISLAM proposes a cure for one of the greatest prob-lems facing the world today: the violence and extremism of radical Islam.” —Mark R. Levin, #1 New York Times bestselling author of Ameritopia

“Dr. Jasser is an American hero in the war radical Islam has declared on us. Whether we prevail in this long war may very well depend on how closely we listen to him.” —William J. Bennett, New York Times bestselling author of The Book of Man and former U.S. Secretary of Education

FINALLY! A MUSLIM SOLUTION TO THE ISLAMIST THREAT.

Learn more about Dr. Jasser’s work at www.aifdemocracy.org

CT.ad.8 v2.indd 1 8/24/2012 7:52:55 AM

Available for purchaseat your favorite online retailers

Circle 152 on Reader Service Card

Page 41: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 41

politically correct?” Harassment does not accurately describe what these cIA officers have been subjected to by their own government. Fortunately, many continue to serve.

RELEASE oF NATIoNAL SECuRITy INFoRMATIoN ANd CLASSIFIEd INFoRMATIoN oF ouR ALLIES

The old WWII adage that some of us vividly remember, “loose lips sink ships,” is as applicable today as it was when it was coined. Wiki leaks’ hacked cables enlightened the public to the highest levels of our government, giving up our own nation’s secrets, as well as those of our strongest allies, specifically the united Kingdom.

• FAct: A State Department cable published by Wiki leaks confirmed that the President, as part of the Strategic Arms reduction talks (StArt), released the scope of the british nuclear arsenal and capacities to the russians, including the serial numbers on the trident missiles given to the united Kingdom by the united States. Wiki leaks’ published cables indicated that the presidential disclosure was detailed and disclosed the vessels, both surface and undersea, that are armed with nuclear weapons. 14

• FAct: In the Defense Authorization and Appropriation Act of 2012, congress inserted specific language that strictly prohibited the President from disclosing any of the details of uS missile defense to russia. However, the President has announced that he will “construe” whether the Act of Congress, with its restrictions, infringes on his executive authority as President.

For the first time in the history of our

nation, we have as president a former lawyer who has arrogated to himself the right to pick and choose which laws to enforce and not enforce and to decide without regard to Article I courts whether Acts of congress are valid or constitutional and applied to him. That action constitutes a clear violation of the most fundamental core of our constitutional form of government—the constitutional doctrine of the separation of powers—and usurps the clear and unequivocal authority vested in his office.

Who LoST EGyPT?on his last visit to the united States,

egyptian President Hosni mubarak and President barack obama made joint statements praising each other and pledging peace in the middle east. That joint press appearance occurred on August 18, 2009.15

• FAct: When the “Arab Spring” became visible in tahrir Square in

cairo, President obama sent the former Ambassador to egypt, Frank Wisner, as his special envoy to egypt to report back to him and make recommendations. Subsequent to the trip to cairo, Ambassador Wisner attended a security conference in munich, Germany. on February 5, 2011, Ambassador Wisner said: “President mubarak must stay for now and continue to serve the remainder of his term until September 2011.” Wisner explained that President mubarak had been a uS ally for more than 30 years, following the Assassination of Anwar al Sadat (by elements of the muslim brotherhood) because Sadat had signed a peace treaty with Israel. He further declared that President mubarak would not seek another term as president. However, he would remain in power until egypt held free elections in September 2011 to assure an orderly transfer of power following the September elections.

• FAct: contrary to the announced

Mohamed Morsi at the press conference on June 18, 2012 as he announces himself president, after the second round of Egypt's presidential elections. Photo: Jonathan Rashad

Page 42: The Counter Terrorist Magazine - October/November 2012

42 The Counter Terrorist ~ October/November 2012

Circle 343 on Reader Service Card

recommendation of Frank Wisner, the former uS Ambassador to egypt, The Washington Post reported: “obama said he had told the egyptian President in a telephone call that this was a ‘moment of transformation’ in egypt and that the status quo is not sustainable. ‘The key part of the statement was now,’ an administration official said, speaking on the condition of anonymity disclosed.”16

• FAct: The muslim brotherhood (which had been banned as an organization in egypt since Gamal Abdul Nasser became president in 1956) became a dominant influence. on February 10, 2011, in testimony before the House Permanent Select Committee on Intelligence (HPScI), the Director of National Intelligence, James Clapper, in response to a question about the muslim brotherhood stated: “The term ‘muslim brotherhood’… is an umbrella term for a variety of movements, in the case of egypt, a very heterogeneous group, largely secular, which has eschewed violence and has decried al Qaeda as a perversion of Islam… there is no overarching agenda, particularly in the pursuit of violence…”

• FAct: The stated credo of The Society of muslim brothers (known as the muslim brotherhood) is: “Allah is our objective; the Quran is our constitution, the Prophet is our leader; Jihad is our way; and death for the sake of Allah is the highest of our aspirations.”

• FAct: egyptian elections were not held in September 2011. The elections were not held until June 16 and 17, 2012. mohammad morsi, a member of the muslim brotherhood, was declared the new president on June 24, 2012.

• FAct: The muslim brotherhood now holds the majority of seats in

the egyptian Parliament, as well as the Presidency.

• FAct: The muslim brotherhood are actively seeking to sabotage the more than 30-year-old peace treaty between egypt and Israel, attempting to tie the treaty to the formation of a Palestinian State and a pullback of Israel’s borders to its pre-1967 borders. The peace treaty has been a stabilizing force in the middle east for more than 30 years, but now appears endangered.

• FAct: egypt is turning from a secular state to an Islamic state with all of the implications for the people of egypt, including the possible imposition of shariah law.

LIByA: ThE duTy To PRoTECT

International law as specifically set forth in the Nuremburg Principles and the Third Geneva convention, and federal law contains no provision that the united States or any sovereign nation has a so-called “duty to protect,” the citizens of another sovereign nation. In his 1527 seminal treatise, “The law of War and Peace,” Hugo Grotius wrote in detail what facts and circumstances led a nation to go to war with another nation. Among those circumstances for a “Just War,” Grotius enumerated “Self Defense, Defense of citizens or Interests of the State.” The uS-led war against mohammar al Gadhafi appears not to have basis in International law and appears also to have violated the Nuremberg Principles, which are the same as uS federal law.

• FAct: In their sworn testimony before the House and Senate, Secretary of Defense robert Gates and Director of central Intelligence leon Panetta testified that libya posed no threat to the national security of the united States or to the

Page 43: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 43Circle 339 on Reader Service CardCircle 178 on Reader Service Card

security of uS citizens or uS interests abroad.17

• FAct: Notwithstanding the testimony of Secretary Gates and Director Panetta, the President, without the consent of Congress, in what appears to be direct violation of the uS constitution Article I, Section 8 clause 11, proceeded to commit American military resources in an undeclared war against the duly empowered government of libya, who posed no threat to the united States, our citizens, or our foreign interests.

• FAct: In 2011, the President of the united States acted solely on the authority of a narrow uN resolution that had as its essential purpose the imposition of a no-fly zone over libya, ostensibly to protect the libyan population from air attacks.

• FAct: The united States launched a missile and air attack on libya, firing more than 193 tomahawk missiles on a country that posed no threat to uS national security.

• FAct: The united States and its coalition NAto partners supplied libyan rebels with arms and armaments. more than 20,000 shoulder-fired surface-to-air missiles in libya are lost, and no one knows who has possession of them.18 This number is believed to include the latest generation of man-portable SAms, which are extremely difficult to defeat. 19

• FAct: russia and china have charged that the united States far exceeded the limited role enumerated by the uN resolution and caused the deaths of innocent women, children, old men, and young men who were not fighting for either side in what may be best characterized as a “civil war,” which culminated with the execution of mohammar al Gadhafi after he was taken into custody.

• FAct: The Nuremberg Principles,

ratified by the uS Senate on February 19, 1986, are the same as federal law. The Nuremberg Principles specifically provide prohibitions for crimes against the peace and crimes against humanity.

• FAct: In direct contravention to Article I, Section 8, clause 11, which provides “The Congress shall have power To Declare War, grant Letters of Marque and Reprisal, and make Rules concerning Captures on Land and Water,” the President not only did not consult with congress, nor did congress pass a formal declaration of war or a resolution authorizing the use of force to establish a no-fly zone in libya. The only legal authority upon which the President acted was a uN Security council resolution. one need not be a constitutional scholar or an attorney to understand that a uN resolution does not trump the uS constitution. The constitutional implications could not be clearer.

ABdICATIoN oF uNITEd STATES SoVEREIGNTy To ThE uNITEd NATIoNS ANd REGIoNAL oRGANIzATIoNS

• FAct: on march 8, 2012, in testimony before the uS Senate, Secretary of Defense leon Panetta said, “we needed to obtain permission from The Arab league and the united Nations before we stopped the slaughter in Syria.” Senator Sessions (r. Alabama) immediately questioned Secretary Panetta about when he would consult with congress. libya is a prime example of an apparently unconstitutional and extra-constitutional war. even though Secretary of Defense robert Gates and chairman of the Joint chiefs of Staff Admiral michael mullen long ago took an oath to support and

Page 44: The Counter Terrorist Magazine - October/November 2012

44 The Counter Terrorist ~ October/November 2012 Circle 81 on Reader Service Card

Protective security equiPmentAt ICOR, we understand that the outcome of your mission depends on the performance of our products. That’s why we design rugged, high-quality, competitively priced EOD / SWAT equipment, backed by our unlimited technical support.

• CALIBER® Robot• Hook&LineKits• SearchMirrors• EODHandTools• SearchKits

ICOR Technology Inc. I 5459 Canotek Road, Unit 1, Ottawa, ON K1J 9M3Tel: 613.745.3600 I Fax: 613.745.3590 I Email: [email protected] Toll Free: 1.877.483.7978 www.icortechnology.com

defend the constitution of the united States of America, it appears that neither challenged President obama about the constitutionality of his orders without the specific consent of congress, which is mandated by Article 1, Section 8, clause 11, of the uS constitution.

• FAct: uS actions in libya were, from a legal standpoint, a violation of the mandates of the uS constitution. President obama was acting solely on the basis of a resolution passed by the uN Security council. No congressional resolution or declaration of war was ever sought or passed. In the case of libya, uS participation was de jure unconstitutional and de facto a “crime against the Peace,” as defined by the Nuremberg Principles, which have been ratified by the uS Senate and have the full force and effect of federal law.

• FAct: In addition to violation of the constitution for purposes of exercising war powers, the President has urged passage of the law of the Sea treaty (loSt), which would severely restrict movement of uS men of war and the capacity to limit passage of our navy and coast guard. on July 16, 2012, the uS Senate had 34 republican Senators indicate their intention to vote against ratification of the treaty if it comes to a vote. Since at least two thirds of the 100-member Senate (at least 67 Senators) is required to ratify a treaty, consideration of the treaty was deferred again.20

• FAct: on october 14, 2009, the obama administration announced in a statement released by Secretary of State Hillary clinton that the State Department was overturning the position of former President George W. bush’s

administration, which had opposed a proposed Arms trade treaty on the grounds that national controls were better.21 The uN treaty on Small Arms is directly inconsistent to the Second Amendment of the uS constitution, the ratification of which would be a flagrant violation of the oath of office for every elected official who has taken an oath to support and defend the constitution of the united States. manifestly, as demonstrated by the uN resolution relating to establishing a no-fly zone over libya, this administration proceeded to involve the united States in a war that was never discussed, debated, or authorized by the uS congress. If the united States loses its national sovereignty, we will have, de facto, lost the protections, freedoms, and liberties guaranteed to us by the constitution. •

Page 45: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 45

Circle 279 on Reader Service Card

Page 46: The Counter Terrorist Magazine - October/November 2012

46 The Counter Terrorist ~ October/November 2012

ABouT ThE AuThoRMr. Mill (pseudonym) is a Senior

Attorney who has served as Chief Counsel of the US Congress. The author has practiced law in Washington, D.C., for more than thirty years, during which the author represented individuals, corporations, and organizations before Congress and its committees. The author has also represented individual members of Congress in highly sensitive matters, such as congressional ethics investigations. The author is a recognized expert in all aspects of congressional and legislative procedures and is recognized as an authority on constitutional and international law. The author is not affiliated with either political party.

ENd NoTES1“First Icrc Visit to Guantanamo bay

Prison camp,” International committee of the red cross (February 2003): http://www.icrc.org/eng/resources/documents/misc/57jrk6.htm.

2carol rosenberg, “Some in congress call Foul on New $744K Soccer Field” Miami Herald (March 4, 2012): http://www.miamiherald.com/2012/03/04/2675325/some-in-congress-call-foul-on.html.

3u.S. constitution, Article I, Section 8, clause 9.

4“bermuda rebuked over Guantanamo Inmates,” The National (June 12, 2009): http://www.thenational.ae/news/world/americas/bermuda-rebuked-over-guantanamo-inmates.

5richard Friedman, “trying terrorists,” The National Strategy Forum Review 18, no. 3 (Fall 2009): http://www.nationalstrategy.com/NSFreview/Fall2009Vol18Issue3uSmexico/reFcommissarontryingterrorists.aspx.

6“convention (III) relative to the treatment of Prisoners of War. Geneva, 12 August 1949,” International Humanitarian Law—Treaties & Documents, International committee of the red cross: http://www.icrc.org/ihl.nsf/7c4d08d9b287a42141256739003e63bb/6fef854a3517b75ac125641e004a9e68.

7“Khalid Shaikh mohammed (Guantánamo 9/11 Attacks trial),” times Topics in The New York Times (may 7, 2012): http://topics.nytimes.com/top/reference/timestopics/people/m/khalid_shaikh_mohammed/index.html.

8“cIA Interrogations,” times topics in The New York Times (July 1, 2011): http://topics.nytimes.com/top/reference/timestopics/organizations/c/central_intelligence_agency/cia_interrogations/index.html.

9Ibid.10michael b. mukasey, “The

Waterboarding trail to bin laden,” The Wall Street Journal (may 6, 2011): http://online.wsj.com/article/Sb10001424052748703859304576305023876506348.html.

11“cIA Interrogations.”12cIA chief: Waterboarding Aided

bin laden raid: Attorney General Tells Congress that Operation into Pakistan Was legal,” NBC News (may 3, 2011): http://today.msnbc.msn.com/id/42880435/ns/today-today_news/t/cia-chief-waterboarding-aided-bin-laden-raid/.

13Ateqah Khaki, “DoJ to Investigate Deaths of two Detainees in cIA custody” American civil liberties union (June 30, 2011): http://www.aclu.org/blog/national-security/doj-investigate-deaths-two-detainees-cia-custody.

14multiple media carried the story about President obama’s release of u. K. Nuclear secrets on February 5, 2011. In 2009 he had failed to gain the permission of the u.K. to release their

highly classified nuclear capabilities but proceeded to do so to get the russians to sign the StArt treaty. See also: http://www.telegraph.co.uk/news/worldnews/wikileaks/8304654/Wikileaks-cables-uS-agrees-to-tell-russia-britains-nuclear-secrets.html

15“remarks by President obama and President mubarak of egypt During Press Availability,” The White House, office of the Press Secretary (August 18, 2009): http://www.whitehouse.gov/the-press-office/remarks-president-obama-and-president-mubarak-egypt-during-press-availability.

16Karen DeYoung, “obama Presses mubarak to move ‘Now,’” The Washington Post, (February 2, 2011): http://www.washingtonpost.com/wp-dyn/content/article/2011/02/01/Ar2011020106860.html.

17Susan crabtree, “Senate Hawks berate Gates over Handoff of libya to NAto,” talking Points memo (tPm) (march 31, 2011): http://tpmdc.talkingpointsmemo.com/robert-gates/2011/03/.

18Karen brannen, “u.S. Still Hunting for missing libyan mANPADS,” Defense News (February 2, 2012): http://www.defensenews.com/article/20120202/DeFreG02/302020009/u-S-Still-Hunting-missing-libyan-mANPADS.

19“man-Portable Air Defense System (mANPADS) Proliferation,” Federation of American Scientists accessed (February 2, 2012) http://www.fas.org/programs/ssp/asmp/mANPADS.html.

20http://en.wikipedia.org/wiki/united_Nations_convention_on_the_law_of_the_Sea#Signature_and_ratification

21http://en.wikipedia.org/wiki/Arms_trade_treaty#u.S._overturns_former_position

Page 47: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 47Circle 308 on Reader Service Card Circle 136 on Reader Service Card

SECURITY SOLUTIONS INTERNATIONALSSISSI Protecting the Homeland Together ®

® Call now for more information. Pricing dependent on quantity

and delivery location. Call: (305) 401-6906 or email [email protected]

( portable vehicle barrier )

When Law Enforcement in Dallas wanted a product to protect the greatest sporting event in the US they chose SSI’s PVB.

The reason the PVB is used by agencies and militaries across the globe is that it transfers the momentum of the threatening vehicle upwards and stops it in its tracks. Two adults can deploy the barrier in minutes, and there is no need for electricity whatsoever.

The Portable Vehicle Barrier comes with several customized configurations:

• Youcanputwheelsonitsothatitactsasaswingbarrier and easily opens a road

• Youcantoughenthelinebyaddinganchoringcables or place the PVB’s in one single row or even three rows to stop anything

• Additionalsafetyfeaturescanbeadded

PVBs can be folded down quickly –moved and stored with ease – the PVB is reusable and durable.Best of all NO maintenance is required.

MadeintheUSAmeansjobsintheUSAandsupporting our national economy. Ordering is quick and easy allowing us to make the PVB available to your agencies immediately. Besides being the most cost effective barrier in the business today, the PVB isaVBIEDkiller.CALLNOW.

Or visit our website: www.SSIPVB.comCircle 226 on Reader Service Card

New and improved

Page 48: The Counter Terrorist Magazine - October/November 2012

48 The Counter Terrorist ~ October/November 2012

Book review

i s it possible for insurgents to manipulate a government into destroy-

ing itself? Is it possible to provoke deficit governmental spending that collapses an existing system? columbia university professor richard cloward and bos-ton university professor Frances Piven thought it was. These college professors articulated a strategy to eradicate the

the poor. If this strategy were implement-ed, a political crisis would result…”, and “A series of welfare drives in large cities would, we believe, impel action on a new federal program to distribute income…” They add, “Widespread campaigns to reg-ister the eligible poor for welfare aid, and to help existing recipients obtain their full benefits, would produce bureaucratic

existing free-market traits of the uS economy and end adherence to the uS constitution in the 1966 document, “The Weight of the Poor: A Strategy to end Poverty.” 1

The authors state, “It is our purpose to advance a strategy which affords the basis for a convergence of civil rights organiza-tions, militant anti-poverty groups and

The Weight of the Poor: A Strategy to End Poverty

reviewed by: chris grahamby richard clower and frances Piven

October 6, Day 21 of Occupy Wall Street. Photo: David Shankbone

Page 49: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 49

disruption in welfare agencies and fiscal disruption…” and “considering the real needs of families, the successful demand for full entitlements could multiply these expenditures tenfold…”

They arrive at the conclusion that “moreover, this kind of mass influence is cumulative because benefits are continu-ous. once eligibility for basic food and rent grants is established, the dram on local resources persists indefinitely.”

cloward and Piven write, “Advocacy must be supplemented by organized demonstrations to create a climate of militancy… As the crisis develops, it will be important to use the mass media to inform the broader liberal community…” They state, “…by the collapse of current financial arrangements, powerful forces can be generated…” They believe that “…throughout the crises, the mass media should be used to advance arguments for a new federal income distribution program.”

The writers state: We tend to overlook the force of crises

in precipitating legislative reform, partly because we lack a theoretical framework by which to understand the impact of major disruptions.

By crisis, we mean a publicly visible dis-ruption in some institutional sphere. Crisis can occur spontaneously (e.g., riots) or as the intended result of tactics of demonstration and protest which either generate institu-tional disruption or bring unrecognized dis-ruption to public attention. Public trouble is a political liability, it calls for action by political leaders to stabilize the situation. Because crises usually creates or exposes conflict, it threatens to produce cleavages in a political consensus which politicians will ordinarily act to avert.

Although crisis impels political action,

it does not itself determine the selection of specific solutions. Political leaders will try to respond with proposals which work to their advantage in the electoral process.

These writers created a template for ac-tivists and malefactors to employ against the united States. one may logically wonder: where are the authors today? cloward passed away in 2001. Piven currently serves as a professor at the city university of New York and is a vocal proponent of the “occupy” riots.

The combination of “lawfare” and economic warfare advocated by cloward and Piven is worthy of study. on August 1, 2011, chairman of the Joint chiefs of Staff, Admiral michael mullen, acknowl-edged that the uS government’s debt was the nation’s single greatest vulnerability. 2

Whether due to malice or incompetence, spending to the point of catastrophe is within the grasp of today’s politicians and their appointees. All who have taken the oath to “…support and defend the constitution of the united States against all enemies, foreign and domestic…” must be aware of the strategy articulated in “The Weight of the Poor.” •ENd NoTES

1 richard cloward and Frances Fox Piven, “The Weight of the Poor: A Strat-egy to end Poverty,” The Nation (may 2, 1966): http://www.thenation.com/article/weight-poor-strategy-end-poverty.

2 ed o’Keefe, “mullen: Despite Deal, Debt Still Poses the biggest Threat to u.S. National Security,” checkpoint Washington, The Washington Post, (Au-gust 2, 2011): http://www.washington-post.com/blogs/checkpoint-washington/post/mullen-despite-deal-debt-still-a-risk-to-national-security/2011/08/02/gIQAh-Sr2oI_blog.html.

Circle 349 on Reader Service Card

Page 50: The Counter Terrorist Magazine - October/November 2012

50 The Counter Terrorist ~ October/November 2012

Counter TheA wig used by the suspected FARC attacker of the 2012 Bogota, Colombia car bombing, targeting the former minister,

Fernando Londono. Photo: David Maiolo

50 The Counter Terrorist ~ October/November 2012

Page 51: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 51

FARc’s eVOlViNgied tActicsby glenn mcgovern

t he lead vehicle was a black, bullet-resistant toyota 4runner with tinted windows. officer José ricardo rodriguez was driving, seated next to him was 34-year-old Sergeant rosemberg burbano ramos. both were members of the police protective directorate. Fernando londoño, the former minister of Interior and Justice for the colombian Government occupied the back seat. The second vehicle, a white mitsubishi SuV, followed closely behind, with three additional members of londoño’s protective detail.

As the motorcade approached the Avenida caracas intersection, the traffic signal lights switched to red. The motorcade, still in the middle lane, came to a stop at the limit line with no vehicles in front or to the rear. A public bus was stopped in the lane to their left and to their right, in two lanes of traffic, several other cars waited for the light to switch to green. When the light for the opposing traffic switched to green, a large number of pedestrians began to cross in the crosswalk directly in front of the motorcade.

At approximately 11:15 a.m. on Tuesday, May 15, 2012,1 two SuVs traveled eastbound in the middle lane of Calle 74 in downtown Bogotá, Colombia.

The Counter Terrorist ~ October/November 2012 51

Page 52: The Counter Terrorist Magazine - October/November 2012

52 The Counter Terrorist ~ October/November 2012

motorcycle, which fled the area. A moment later, the object detonated (possibly injuring the bomber3). The blast instantly killed both burbano and ricardo, decapitating one and throwing the other out of the SuV and over the car stopped in the right lane. londoño was struck in the face and chest by a large amount of glass, debris, and shrapnel, and suffered severe blast pressure damage.

A man described as being in his late teens to early twenties, wearing a wig and sunglasses2 with the appearance of a street vendor, was among the mass of pedestrians. The man suddenly stepped toward londoño’s vehicle and hastily slapped an object on the SuV’s driver side door near the center post separating it from the rear passenger door, before darting off and jumping onto a waiting

2012 Car Bombing in Bogota Colombia targeting the former minister, Fernando Londono. Photo: David Maiolo

Page 53: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 53

the blast instantly killed both burbano and Ricardo, decapitating one and throwing the other out of the sUV and over the car stopped in the right lane.

However, while dazed and temporarily deafened, he survived. The blast severely injured approximately thirty-nine others, including those seated in the adjacent bus and cars, as well as pedestrians in the immediate vicinity.4

Within a short time following the attack, authorities, overseen by commander of Police, General luis eduardo martinez, were pointing to Fuerzas Armadas revolucionaries de colombia (FArc) as being responsible.5 This was primarily due to a bombing attempt earlier in the day, where police bomb technicians successfully deactivated an IeD cached inside a renault 9 car in another part of bogotá. The device was constructed with 120 kilos of the high explosive known as Indugel (used by the colombian government and by FArc) and was believed to be targeting the nearby police station. one of the individuals arrested immediately implicated FArc. both of these events occurred on the same day the uS-colombia Free trade Agreement went into effect.

londoño had long been public in his disdain of FArc and the various narco-groups operating in colombia. Since leaving the government, londoño had carried on with his legal practice, as well as his journalism, including hosting a radio show called “la Hora de la Verdad” or “The Hour of truth,” and had been vocal in his opposition of legislation dealing with FArc.6 As such, he had often been the recipient of threats.

two days after the attack, bogotá mayor Gustavo Petro announced that the explosive material used in the attack on londoño was a homemade compound that had not been used before in colombia. Further, he stated investigators were looking into the possibility that the signal lights had been controlled remotely. on the following

monday, the National liberation Army (elN) claimed responsibility for the attempted assassination on its website. colombian Attorney General eduardo montealegre initially stated there was no evidence implicitly linking FArc to the attack.7 However, on June 15, 2012, he announced that there was serious evidence indicating FArc was behind the bombing, including the tentative identity of the bomber, which they did not release beyond that he is a known FArc member and was currently being sought.8

CoNCLuSIoNSThe most recent previously reported

2012 Car Bombing in Bogota Colombia targeting the former minister, Fernando Londono. Photo: David Maiolo

Page 54: The Counter Terrorist Magazine - October/November 2012

54 The Counter Terrorist ~ October/November 2012Circle 252 on Reader Service Card

attempted assassination to employ explosives occurred just over five years earlier in bogotá. In that incident, a vehicle-borne improvised explosive device (VbIeD) was triggered against cielo Gonzalez on march 1, 2007. Prior to that, there were two explosive based attacks perpetrated in late 2005.

Circle 50 on Reader Service Card

yet it runs in a straight line for at least a half mile back from the intersection with caracas Avenue. This provided any adversary the ability to blend into the crowds while maintaining surveillance of the street over a considerable distance.

The positioning of the public bus next to the motorcade appears to be a stroke of luck that benefited the adversary. Positioned as it was, it provided the bomber the opportunity to close the initial distance down to within approximately five feet before exposing himself to the protective team. Secondly, the bus’ proximity to the lead SuV and explosive charge could have served to reflect some of the blast pressure back onto the SUV,9 thus increasing the damage. Through the use of a disguised assassin, a traffic intersection at a busy location, an easily deployed and powerful explosive device, and the use of a motorcycle for escape, these individuals

From the perspective of the adversary, the location selected for the ambush provided ample operational camouflage; there was a significant presence of pedestrian traffic. calle 74 is a medium-sized street consisting of 3 to 4 lanes all running in an easterly direction. All told, the roadway is only 42 feet in width,

IED discovered in Eastern Baghdad and disarmed it before it could be detonated.Photo: U.S. Military

Page 55: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 55Circle 275 on Reader Service CardCircle 125 on Reader Service Card

PLATESMART’S LPR TECHNOLOGY IS THE MOST IMPORTANT PRODUCT NOW AVAILABLE TO U.S. SECURITY AGENCIES TO FIGHT DOMESTIC AND INTERNATIONAL TERRORISM ON AMERICAN SOIL.

•PlateSmart®’S SOFTWARE-ONLY LICENSE PLATE RECOGNITION (LPR) technology can be used to identify vehicles with license plates of interest at BORDER CROSSINGS, ON ROADWAYS, AND FOR SITE SECURITY (SUCH AS AT GOVERNMENT FACILITIES, AIRPORTS, NUCLEAR POWER PLANTS, AND OTHER SITES OF INTEREST), ALL EFFORTLESSLY AND WITHOUT HUMAN INTERACTION.

•PlateSmart® is the ONLY LPR TECHNOLOGY CAPABLE OF READING A LICENSE PLATE’S STATE JURISDICTIONAL DATA AND ALPHANUMERIC CHARACTER STRING WITH THE HIGHEST ACCURACY RATES IN THE INDUSTRY, AS INDEPENDENTLY VERIFIED BY LPR INDUSTRY EXPERT LEE J. NELSON.

•PlateSmart®’S LPR technology is the most versatile Anti-Terrorism tool currently available to U.S. security agencies due to its TOTALLY COVERT NATURE, FUNCTIONALITY IN ALL LIGHTING AND WEATHER CONDITIONS, AFFORDABILITY, INTEGRABILITY WITH THIRD-PARTY TECHNOLOGIES, and ability to be utilized with PRE-EXISTING OR NEWLY INSTALLED LEGACY, STATE-OF-THE-ART, OFF-THE-SHELF, OR PROPRIETARY VIDEO AND COMPUTER EQUIPMENT.

•PlateSmart®’S LPR software is THE MOST AFFORDABLE LPR TECHNOLOGY AVAILABLE ON THE MARKET. ITS COST IS A FRACTION OF THAT OF COMPETITORS’ SYSTEMS, AND IT IS TOTALLY SCALABLE, ALLOWING A RANGE OF INSTALLS FROM SINGLE SYSTEMS TO HUNDREDS. THIS CAPABILITY IN TURN ALLOWS AGENCIES TO SCAN HUNDREDS, THOUSANDS, OR EVEN MILLIONS OF VEHICLES PER YEAR.

•PlateSmart®’S NEW DATABASE CONTROL CENTER offers the user the ability to monitor or to manipulate its LPR systems from a central location. The data collected by the system is stored and can be data mined to find BOLOs in real-time or to track a vehicle’s movement over days, weeks, months, or even years. Data is available with GPS coordinates, date- and time-stamps, and map overlays, all invaluable tools to help officers track movement patterns of suspect vehicles.

•PlateSmart® can be utilized as EITHER A STAND-ALONE OR ENTERPRISE SOLUTION IN EITHER FIXED OR MOBILE APPLICATIONS (SUCH AS UAVs).

•PlateSmart® instantly checks all BOLOs in highly sensitive databases from Federal (NCIC) to State (SUCH AS FLORIDA’S FDLE) and local databases as well as other unnamed Federal BOLO lists at the same time and returns a hit within milliseconds of the plate entering the camera’s viewfinder. SEVERAL MILLION BOLOs CAN INSTANTLY BE CHECKED IN THESE DATABASES.

www.platesmart.comFor More Information

Call (813) 749-0892Copyright ©2012 Cyclops Technologies, Inc., d/b/a PlateSmart.All Rights Reserved.

HIGHWAY MONITORING BORDER CONTROL

LAWENFORCEMENT

SITE SECURITY

ANTI-TERRORISM

PLATESMART’S VERSATILITY, AFFORDABILITY, ROBUSTNESS, AND EASE OF USE ALLOW FOR MASS DEPLOYMENT TO A DEGREE PREVIOUSLY UNATTAINABLE.

PLATESMART DELIVERS THE HIGHEST ROI IN THE LPR INDUSTRY.

Counter Terrorist Ad.indd 1 7/2/12 4:05 PM

Page 56: The Counter Terrorist Magazine - October/November 2012

56 The Counter Terrorist ~ October/November 2012

Featuring the world renowned 7-Day Providing Executive Protection Program Established in 1978 by Dr. Richard W. Kobetz

Over 100 hours with 20 plus instructors

5-Day LEO Dignitary Protection Program

Other Specialized and Custom

Perfect for Military, Government, Police and

America’s Top EP Training School

www.personalprotection.com 16 Penn Plaza Suite 1570, New York, NY, 10001 (212)268.4555 [email protected]

We are not the Best because we are the oldest…

We are the oldest because we ARE the Best!

Training Courses

Private Security Protective Services

Circle 281 on Reader Service Card

carried out a successful and well-planned operation.

According to bogotá mayor Gustavo Petro, there were indications that the adversaries may have had some form of control of the traffic signal lights. If this ultimately proves true, it would indicate a considerable amount of sophistication on their part and account for the second publicly documented attack to employ such a tool. While attacks have frequently occurred on numerous streets around the world at signal light controlled traffic intersections, generally speaking, the ambush site is a gamble. unlike a stop sign-controlled intersection, there is no way for an adversary to know if his target will catch a specific light unless, of course, the adversary can control the light.

Assuming the lack of such control, an initial analysis of this attack would suggest the motorcade might have been

followed for an unknown period of time.This attack highlights the continued threat that motorcycles represent to targeted individuals.

From 1950 to the present, many attacks occurred worldwide wherein a motorcycle hit team (most often with two individuals riding tandem on the bike) was used as a means for the attacking force to strike its victim. In those attacks, most of the targets were killed.10

PARASITIC IEdSThere have been a number of attacks

worldwide involving parasitic IeDs, in which an IeD was placed on a targeted vehicle prior to detonation. earlier attacks shared some commonalities with the attempt on londoño:

• october 1986, San Sebastian, Spain, a motorcycle team rapidly rides up to the targeted vehicle stopped for red light at intersection.

• April 1989, San Salvador, el Salvador, a lone man runs up to a targeted vehicle stopped for a red light at an intersection.

• october 1999, St. Petersburg, russia, two men run up to a targeted vehicle stopped for a red light at an intersection (remote control of lights confirmed).

• August 2003, makhachkala, Dagestan, two men run up to a targeted vehicle in the process of leaving a residence.

• April 2004, moscow, russia, a motorcycle (carrying one individual) rides up to a targeted vehicle stopped for a red light at an intersection.

The tactic of using either magnets or some other type of adhesive to attach a device first began to see widespread use during the Iraq War in 2004, increasing until 2008.11 However, the majority of these device placements occurred on static vehicles or locations. In November 29, 2010, in tehran, Iran, on a monday morning, two separate motorcycle teams,

Unlike a stop sign-controlled

intersection, there is no way

for an adversary to know if his

target will catch a specific light

unless, of course, the adversary can

control the light.

Page 57: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 57Circle 301 on Reader Service Card

Page 58: The Counter Terrorist Magazine - October/November 2012

58 The Counter Terrorist ~ October/November 2012

each with two riders, simultaneously attached IeDs on two separate vehicles in attacks on two nuclear scientists.

This method of operation offers an adversary several advantages. The first benefit is the lack of any obvious “offensive move” on the part of the adversary. For any group or individual conducting an ambush, regardless of the goal (kidnap or assassination), the first objective is to quickly overcome any possible resistance. Hence, the two critical aspects of any successful ambush are the element of surprise and violence of action. In line with the common conception of the “classic” ambush, firearms are often the weapon of choice.12

However, in attacks using parasitic IeDs, one of the key elements—violence of action—may not be immediately recognizable or not recognized with sufficient clarity to justify appropriate action. It is the loss of those precious seconds that a bomber is counting on. As the targeted individual is still processing what occurred, the bomber is moving to a safe distance prior to detonation. If the target does not see the suspicious object attached to his vehicle, this just serves to further hinder recognition (during the Iraq War, insurgents progressed to camouflaging devices by painting them similar colors to the objects they were affixed to13).

unlike an IeD concealed in a nearby object such as a trash can or debris, or cached inside a nearby vehicle, where there is a measureable distance between the detonation point and the target, the use of a parasitic IeD enables the adversary to get the device to within mere inches of the target. considering one pound of tNt produces over 10,000 psi at less than one inch in distance from the detonation point and 1,050 psi at one foot, the importance of placement,14 from

the perspective of the adversary, becomes clear even though blast pressures at 200 psi and above are considered 100 percent fatal.

While the exact composition of the device has yet to be released, it may be likely that the explosive consisted of between three and ten pounds of an energetic material. Interestingly, in the recovered devices from bangkok, the amount of energetic material was three to four pounds of c-415.

How the device was made to be “sticky” also needs consideration. In the recently attempted assassinations in India and bangkok, widely rumored to be by Iranian-backed operators, magnets were affixed to devices constructed out of the bodies of transistor radios. This would obviously allow for placement on the metallic portion of a vehicle’s body. In the attacks in Iran, the device was reportedly attached to windows. This would require some other form of adhesive, of which there is a wide variety. As modern vehicles increasingly move toward more plastic and/or carbon fiber bodies, the use of magnets will be diminished (perhaps even lessening the amount of noise generated during placement).

CouNTERMEASuRES once a device is attached, those

inside may have only seconds to make a determination of the threat and react. The fundamental rules when dealing with any potential explosive device are prevention, distance, and shielding.

In the ideal circumstance, the targeted vehicle would be armored against explosive-based attacks, while also employing electronic countermeasures (ecm). ecms may be successful in blocking the triggering signal from reaching the device. londoño was traveling in an armored vehicle at the

time, but it was not sufficient to defeat the blast (the exact protection rating of his vehicle is unknown).

If the attacker is permitted to attach a device, two options for a targeted individual are to immediately bail out, or hold in place. obviously, bailing out of a moving vehicle presents its own issues, beyond other traffic moving along the roadway. In the londoño attack, immediate bailout was certainly an option (but requires training to perform effectively). However, it could potentially make the target more susceptible to blast pressure, as well as shrapnel and fragmentation. Further, should there be additional attackers in position, being outside could make the target vulnerable to small arms-based attacks or kidnap attempts.

to remain in place and essentially hope for the best is the other option. Señor londoño survived the attack, suffering primarily from flying glass and shards of vehicle materials. He also suffered blast pressure injuries in the form of ruptured eardrums. The use of a ballistic blanket may have reduced frag/shrapnel injuries, but not necessarily the blast pressure. regardless, a person would have only seconds to identify the threat and deploy the ballistic blanket if it was not already on.

Finally, there is a need to have a plan for any type of ambush and then train to that plan. In much of the media footage immediately following the attack, londoño is shown being led in what can only be described as a meandering circle through the gaggle of people drawn to the event. There are three men, believed to have been in the following vehicle due to their appearance of authority and lack of visible injuries. one man had a physical hold on londoño and is guiding him, while in his other hand he holds a

Page 59: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 59

pistol pointed to the sky. two other men are following within close proximity, each with one hand on his holstered sidearm.

The possibility of a secondary attack, either from another device or by a secondary team, must always be assumed until proven otherwise, but especially in bombing attacks. Additionally, there was no way for the team to have knowledge of the extent of londoño’s injuries, who, from the footage, was clearly in shock. There were a number of large buildings with masonry exteriors nearby. His detail might have immediately evacuated londoño to the interior of one of these structures and set up 360-degree security while treating londoño for shock and triaging his injuries.

CoNCLuSIoNIt is not yet proven who was

responsible for this attack. beyond bringing those individuals to justice, whether this attack is ultimately found to be the work of FArc, elN, a drug trafficking organization, a rival, or otherwise matters little. This case highlights the continuing threat motorcycles present to potential targets, as well as the apparently increasing use of this style of bombing attack. likely targets and protective details must always remind themselves that an attack can occur at anytime, anywhere, using a variety of methods. •ABouT ThE AuThoR

Mr. McGovern has served in SWAT, JTTF and Protective Operations. He is the author of Targeted Violence (CRC Press, April 2010) and Protective operations (CRC Press, April 2011).

ENd NoTES1“bogotá bomb blast Kills Five, ex-

minister targeted,” Seven News (may

16, 2012): http://au.news.yahoo.com/world/a/-/world/13695476/bogota-bomb-blast-kills-five-ex-minister-targeted/.

2libardo cardona, “Young man Sought In colombia bombing,” Houston Chronicle (may 16, 2012), www.chron.com/news/article/Young-man-sought-in-colombia-bombing-3559965.php.

3“comdante de la Policia de bogotá Atribuye el Atentado a las FArc,” el tiempo.com (may 15, 2012): www.eltiempo.com/colombia/bogota/ArtIculo-Web-NeW_NotA_INterIor-11799301.html.

4“Petro Dio Detalles Atentado contra exministro londoño,” El Spectador (may 16,2012): http://www.elespectador.com/noticias/bogota/articulo-346569-petro-dio-detalles-del-atentado-contra-exministro-londono.

5“Fueron las FArc,” El Spectador (may 17, 2012): http://www.elespectador.com/impreso/bogota/articulo-347033-fueron-farc-londono.

6“Perfil del ex ministro del Interior y de Justicia, Fernando londoño Hoyos,” El Pais (may 15, 2012): www.elpais.com.co/elpais/judicial/noticias/perfil-del-dexministro-del-interior-y-justicia-fernando-londono-hoyos.

7“Aún no hay Pruebas de que Farc Sean responsables de Atentado contra londoño,” El Spectador (may 25, 2012): www.elespectador.com/noticias/judicial/articulo-348948-aun-no-hay-pruebas-de-farc-sean-responsables-de-atentado-contra.

8“Guerrillero de las FArc fue Quien Puso la bomba lapa contra,” caracol radio (June 15, 2012): www.caracol.com.co/noticias/judicial/guerrillo-de-las-farc-fue-quien-puso-la-bomba-lapa-contra-fernando-londono-fiscal/20120615/nota/1706610.aspx.

9“Airblast/Post-blast Pathology,”

Incident Response to Terrorist Bombings, module 9, New mexico Institute of mining and technology, 2000-2004.

10mcGovern, G., op.cit., 87-8911Katherine Zoepf and mudhafer

al-Husaini, “militants turn to Small bombs in Iraq Attacks,” The New York Times (November 13, 2008): http://www.nytimes.com/2008/11/14/world/middleeast/14stickybombs.html.

12mcGovern, G., op.cit., p 7313Katherine Zoepf and mudhafer

al-Husaini, “militants turn to Small bombs…”

14Thurman, James t., Practical Bomb Scene Investigation, 2nd ed. (New York: crc Press, 2011), 32-33.

15“Israel: bangkok, India bombings linked”, CBS News (February 15, 2012): http://www.cbsnews.com/8301-202_162-57378040/israel-bangkok-india-bombings-linked.

SAVE 20% OFF!Call 1-800-882-8684 and mention discount code

“CTM2012” to register today!

1-800-882-8684 | [email protected] www.SpecialOperationsSummit.com/CTM

Learn and network with 40+ outstanding special operations leaders, including:

• Lieutenant General Charles Cleveland, Commanding General, U.S. Army Special Operations Command

• Ambassador Frederick Barton, Assistant Secretary for Confl ict & Stabilization Operations, U.S. Department of State

• Rear Admiral Robert Girrier, Director for Operations, U.S. Pacifi c Command

• Major General Norman Brozenick, Commander SOCPAC, U.S. Pacifi c Command

• Major General Michael Nagata, Deputy Director for Special Operations, Joint Chiefs of Staff

December 3-6, 2012 | Tampa, FL

For the mostup-to-date speaker list and keynotes viewthe 2012 Brochureonline or [email protected] and we’ll send you a copy!

Transforming Global “Shoot, Move and Communicate” Capabilities

Featuring distinguishedkeynote speakers such as:Michael D. Lumpkin, SESPrincipal Deputy Assistant Secretary of DefenseSO/LIC

Mr. Brian Detter, SESDeputy Assistant Secretary of the NavyExpeditionary Warfare

Colonel Richard Samuels, USAFDeputy CommanderSOCAFRICA, US AFRICOM

Captain Mark Mullins, USNDeputy DirectorNavy Irregular Warfare Office

Rear Admiral Sean Pybus, USNCommanderNavy Special Warfare Command

Commander Paul Giberson, USNMaritime Assessments Officer, J8 US Special Operations Command

Presents a training conference:

Benefit fromcomprehensivetechnical briefings on:� Latest SOF needs and

requirements for complexthreat environments

� Irregular Warfarecapabilities and strategicplanning for SOF operations

� Global special operations andlow intensity conflict

� Latest lessons learned fromCOIN and stabilizingoperations in fragile states

Human Geography Focus Day:December 12, 2011

Main Summit Days:December 13 -14, 2011

Wyndham Tampa WestshoreTampa, FL

Look inside for details on the highly anticipated

HumanGeography

Focus Day!

Plus, hear program updates and reviews from representatives from SOCAFRICA, SOCOM, USASOC, AFSOC, NAVSOC, among others!

www.SpecialOperationsSummit.com

Sponsors:

Circle 170 on Reader Service Card

Page 60: The Counter Terrorist Magazine - October/November 2012

60 The Counter Terrorist ~ October/November 2012

Counter The

by Kevin D. freeman

ecONOmic WARFARe And the Non-state Actor

60 The Counter Terrorist ~ October/November 2012

Page 61: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 61

inancial warfare has now officially come to war’s center stage—a stage that for thousands of years has been occupied only by soldiers and weapons, with blood and death everywhere. We believe that before long, “financial warfare” will undoubtedly be an entry in the various types of dictionaries of official military jargon. Moreover, when people revise the history books on twentieth-century warfare in the early 21st-century, the section on financial warfare will command the reader’s utmost attention. The main protagonist in this section of the history book will not be a statesman or a military strategist; rather, it will be George Soros.1

col. Qiao liang and col. Wang Xiangsui stated the above in Unrestricted Warfare, a 1999 chinese strategy document. Interestingly, the authors mention Soros nineteen times, only slightly fewer than the twenty-one mentions of osama bin laden, the most-

discussed individual in the book. In fact, Soros and bin laden were referenced together nine times, as in these examples:

Perhaps he or she is… a financier with a large amount of mobile capital or a stock speculator. His or her philosophy of life is different from that of certain blind and inhuman terrorists. Frequently, he or she has a firmly held philosophy of life and his or her faith is by no means inferior to Osama bin Laden’s in terms of its fanaticism. Moreover, he or she does not lack the motivation or courage to enter a fight as necessary. Judging by this kind of standard, who can say that George Soros is not a financial terrorist? Precisely in the same way that modern technology is changing weapons and the battlefield, it is also at the same time blurring the concept of who the war participants are. From now on, soldiers no longer have a monopoly on war.2

If those such as Morris, bin Laden, and Soros can be considered soldiers in the wars of

We believe that before long, “financial warfare” will undoubtedly be an entry in the various types of dictionaries of official military jargon.

Non-state organizations… are using non-military means to engage sovereign nations. Thus, financial war is a form of non-military warfare which is just as terribly destructive as a bloody war, but in which no blood is actually shed.

F

The Counter Terrorist ~ October/November 2012 61

Page 62: The Counter Terrorist Magazine - October/November 2012

62 The Counter Terrorist ~ October/November 2012

tomorrow, then who isn’t a soldier? 3 Who is the man the colonels

considered a “soldier in the wars of tomorrow”? He is a hedge fund manager with a personal net worth estimated at $20 billion, greater than the gross domestic product of the majority of nations on the planet.4 History records that George Soros made over a billion dollars in a single day “breaking the bank of england” by speculating against the british Pound in 1992.5 He was accused of attempting to destroy the Thai and malaysian currencies in 1997.6 In 1998, russian authorities believed he

was manipulating the ruble. 7 (It was this currency crisis that helped propel Putin to power. 8) His russian offices were raided in 2003. 9 That same year he was convicted of insider trading in France. 10 Despite repeated efforts to have the conviction overturned, it remains in place. 11 He has been alleged to be connected to turmoil in Serbia, croatia, and the former Soviet republic of Georgia. 12 13 Sources also estimate that he provides nearly a half-billion dollars annually to progressive activist groups in the former Soviet world alone. 14 This is in addition to the money he dedicates to

Protesters blocking access to one of Soros' Open Society offices. Photo: Henri Bergius

activities in the united States and around the world.

Soros was quoted in 1995 as saying, “everyone says I have a lot of power. but what does that power consist of? can I influence governments? I am beginning to be able to…” 15 Admitting to influencing governments is rather pedestrian in comparison to actually toppling them. but, given the level of influence and his track record, many believe this man now capable of subverting and even overturning entire governments. In fact, mr. Soros stated:

“I had to experiment. And it was a

Page 63: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 63

National Tactical Officers Association PO Box 797, Doylestown, PA 18901 | 800-279-9127

Become a memBer

at www.ntoa.org

› Training › Conferences › The Tactical Edge › Resource Library › Research › Members-only Website › Grants › Scholarships› PCIR/Less-Lethal Database › Networking › Member Tested Program

Patrol, SWAT, CNT, TEMS, EOD... NTOA is where you belong!

memBer Benefits

crisis negotiations conferenceOctober 23-26, 2012 • mesa, AZ

Circle 222 on Reader Service Card

Page 64: The Counter Terrorist Magazine - October/November 2012

64 The Counter Terrorist ~ October/November 2012

learning process. The first part was this subversive activity, disrupting repressive regimes. That was a lot of fun and that’s what actually got me hooked on this whole enterprise. Seeing what worked in one country, trying it on the other country.” 16

What Soros is describing is consistent with the Unrestricted Warfare strategy:

Newly converging into this counter current are the international financial speculators. Although there is still no one at present listing these immaculately dressed and dapper fellows in the ranks of terrorists, yet in terms of their actions and the

calamitous consequences they have caused in England, Mexico and Southeast Asia, none of those types, such as the “bandits” and bin Laden, can even hold a candle to them. Taking the big financial crocodiles as represented by Soros… he used financial derivative methods as well as… economic regulations to repeatedly change his attitude and play tricks to foment trouble, so as to bring about one financial upheaval after another. As a result, the area of harmed nations gradually enlarged from Southeast Asia to Russia and then to Japan, and finally to Europe and the United States… so that the existing world financial system

AIG Building, Singapore. Photo: Terence Ong

and economic order were fundamentally shaken and it had already become another new disaster threatening human society and international security. The typical characteristics of terrorism, including being transnational, concealed, without rules, and tremendously destructive, have given us reason to call it financial terrorism. 17

Although written in 1999, the chinese description of a global financial meltdown seems to match rather closely with what actually took place in September 2008. consider this from representative Paul Kanjorski (D, PA):

I was there when the secretary (of the Treasury) and the chairman of the Federal Reserve came those days and talked to members of Congress about what was going on… It was about September 15th. Here’s the facts, and we don’t even talk about these things. On Thursday, at about 11 o’clock in the morning, the Federal Reserve noticed a tremendous drawdown of money market accounts in the United States to a tune of $550 billion being drawn out in a matter of an hour or two.

The Treasury opened up its window to help. They pumped $105 billion into the system and quickly realized that they could not stem the tide. We were having an electronic run on the banks. They decided to close the operation, close down the money accounts, and announce a guarantee of $250,000 per account so there wouldn’t be further panic. And that’s what actually happened.

If they had not done that, their estimation was that by two o’clock that afternoon, $5.5 trillion would have been drawn out of the money market system of the United States, would have collapsed the entire economy of the United States, and within 24 hours the world economy would have collapsed.

Now we talked at that time about what would happen if that happened. It would have been the end of our economic system

Page 65: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 65

and our political system as we know it. 18 Now, match that with the perspective

of George Soros regarding the same incident:

On September 15, 2008, Lehman Brothers was allowed to go into bankruptcy without proper preparation. Within days the entire financial system suffered what amounted to cardiac arrest and had to be put on artificial life support. The effect on the global economy was the equivalent of the collapse of the banking system during the Great Depression. 19

to what then, does mr. Soros attribute the cause?

…it’s clear that AIG, Bear Stearns, Lehman Brothers and others were destroyed by bear raids in which the shorting of stocks and buying CDS [credit default swaps] actually amplified and reinforced each other. The unlimited shorting of stocks was made possible by the abolition of the uptick rule, which would have hindered “bear raids” by allowing short selling only when prices were rising. The unlimited shorting of bonds was facilitated by the CDS market. The two made a lethal combination. 20

What Soros is describing is precisely the type of financial warfare that was identified by the chinese authors in Unrestricted Warfare. others also believe that a bear raid financial attack using market mechanisms and derivatives gave a significant shove to the events of 2008 and almost collapsed the global financial system. 21 The means was to create a widespread financial panic among the major Wall Street and foreign bank players. This description is almost identical to the methodology outlined in Unrestricted Warfare:

The likes of Soros combine speculation in currency markets, stock markets, and futures markets. Also they exploit public opinion and create widespread momentum to lure and assemble the “jumbos” such as Merrill Lynch, Fidelity, and Morgan

Stanley and their partners to join forces in the marketplace on a huge scale and wage hair-raising financial wars one after the other. Most of these means are not by their nature military (although they often have a tendency to be violent), but the methods by which they are combined and used certainly do not fail to inspire us as to how to use military or non-military means effectively in war. 22

even the Nobel-Prize winning economist Paul Krugman acknowledged this in The accidental theorist: And other dispatches from the dismal science:

Nobody who has read a business magazine in the last few years can be

unaware that these days there really are investors who not only move money in anticipation of a currency crisis, but actually do their best to trigger that crisis for fun and profit. These new actors on the scene do not yet have a standard name; my proposed term is ‘Soroi.’ 23

of course, not everyone agrees with this analysis. others point to an overleveraged system, Wall Street greed, a housing bubble, and bad government policies as sufficient causes of the 2008 implosion without any outside assistance.

24 only a comprehensive investigation shielded from external influence could provide the answer. While not accusing

Paul Krugman Photo: Prolineserver

Page 66: The Counter Terrorist Magazine - October/November 2012

66 The Counter Terrorist ~ October/November 2012

steal money because your door was not locked.” In this way, he does not have to be responsible for destroying the economies of other nations and throwing the political order of others into disarray. For bin Laden who hides under the hills of Islamic fundamentalism, Soros who conceals himself within the forests of free economics, and the computer hackers who hide themselves in the green curtains of networks, no national boundaries exist, and borders also are ineffective. What they want to do is carry out wanton destruction within a regulated sphere and act wildly and run amuck within an unregulated sphere. These new terrorist forces have formed an unprecedented serious challenge to the existing world order, and in turn they have made us doubt to a certain degree the logical production of a fixed order. 26

What we must conclude, therefore, runs contrary to the conventional wisdom that only nation states can bring down other nations. regardless of the specific cause, it is abundantly obvious that the economic events of 2008 were sufficient to change the world order and that this was only one example. We are still reeling from those effects today, a full four years later. And, it appears that the chinese authors are right. Non-state actors can be capable of triggering such a major destabilization.

The literary world seems to have taken more notice of Unrestricted Warfare than did the news services. brad Thor, writer of multiple New York Times #1 bestsellers released Full Black, a novel acknowledged to have been inspired by Unrestricted Warfare. In the book, a billionaire hedge fund manager is able to bankroll seemingly unrelated attacks using Islamic terror groups, russian operatives, criminal syndicates, and others. Among the initial terror acts mentioned in the novel is a series of movie theater killings. end-game attacks mentioned in the novel

mr. Soros of wrongdoing in this regard, it is noteworthy that he was prescient enough to profit from the 2008 collapse regardless of whether he played a causal role or not. 25 He is clearly viewed by the Chinese authors of Unrestricted Warfare as the preeminent expert on financial warfare, capable of exploiting existing vulnerabilities. In fact, in 1999 they were quite clear in noting that a non-state actor could cause a major collapse and leave the blame to natural economic consequences:

Soros’ logic is “I entered the room to

Page 67: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 67

involve the planned destruction of the stock market.

With knowledge of the viability of the non-state adversary, we must explore other even more recent incidents that may have involved economic warfare. For example, in August 2011, there was a billion-dollar bet against America that some say was intended to collapse the u.S. dollar. 27 There was also a mass counterfeiting effort of $6 trillion (yes, trillion) in fake u.S. treasury bonds.

28 To put that enormous number in context, $6 trillion is equal to almost forty percent of all outstanding Federal debt. There have been stolen trading algorithms, hacking attempts on the stock exchange, and flash crashes of the market in which hundreds of billions of dollars in wealth have been wiped out in a matter of minutes. 29 30 31 There was also a major hedge fund “ideas dinner” co-hosted by Soros targeting Greece and the euro. 32 This was before the major collapse in Greek bonds. 33 No wonder european intelligence agencies warned that speculators had been attacking their economies. 34 It is also little wonder that German authorities banned naked credit default swaps and naked short selling a few months later, attempting to outlaw the weapons used by speculators. 35

of course, George Soros is by no means the only non-state actor with the knowledge and resources to conduct economic warfare. Some other non-state actors include other hedge funds, massive global foundations, shariah compliant funds, terror groups, major global banks, criminal syndicates, and computer hackers. Again, quoting Unrestricted Warfare:

However, the destruction which they do in the areas attacked are absolutely not secondary to pure military wars. In this area, we only need mention . . . George Soros, bin Laden, Escobar, (Chizuo)

Matsumoto, and Kevin Mitnick. [George Soros is a financial speculator; bin Laden is an Islamic terrorist; Escobar was a notorious drug smuggler; Matsumoto is the founder of the heterodox “Aum Shinrikyo” in Japan; and Mitnick is the renowned computer hacker.] Perhaps people already have no way of accurately pointing out when it first began that the principal actors starting wars were no longer only those sovereign states, but Japan’s Shinrikyo, the Italian Mafia, extremist Muslim terrorist organizations, the Columbian or “Golden New Moon” drug cartel, underground figures with malicious intent, financiers who control large amounts of powerful funds… all of whom can possibly become the creators of a military or non-military war. The weapons used by them can be airplanes, cannons, poison gas, bombs, biochemical agents, as well as computer viruses, net browsers, and financial derivative tools. In a word, all of the new warfare methods and strategic measures which can be provided by all of the new technology may be utilized by these fanatics to carry out all forms of financial attacks, network attacks, media attacks, or terrorist attacks. Most of these attacks are not military actions, and yet they can be completely viewed as or equal to warfare actions which force other nations to satisfy their own interests and demands. These have the same and even greater destructive force than military warfare… 36

The greatest concern is that these non-state actors might work in concert and even team with national adversaries to attack nations such as the united States. They wouldn’t have to coordinate an attack; they could maneuver in the same way that schooling sharks opportunistically dismember a bleeding victim. The stakes are higher than ever before. We must recognize the risks of economic warfare from non-state actors and address them. our future depends on it. •

ABouT ThE AuThoRMr. Freeman (CFA) is the author

of Secret Weapon: How economic terrorism brought Down the u.S. Stock market and Why It can Happen Again (www.secretweapon.org). He has consulted for and briefed members of the U.S. House and Senate, CIA, DIA, FBI, SEC, DOJ, and Homeland Security on the issues of economic warfare and financial terrorism. He authors the blog www.globaleconomicwarfare.com.

ENdNoTES1 col. Qiao liang and col. Wang Xiangsui,

Unrestricted Warfare (Panama city, Panama: Pan American Publishing company, 2002), 39. This is the english translation of the original published by PlA Press in 1999.

2 Ibid., 36.3 Ibid., 191.4 George Soros Net Worth, Celebrity Net

Worth, http://www.therichest.org/celebnetworth/business/hedge-fund/george-soros-net-worth/, accessed July 2012

5 David litterick, “billionaire who broke the bank of england,” The Telegraph (uK) (13 September 2002), http://www.telegraph.co.uk/finance/2773265/billionaire-who-broke-the-bank-of-england.html.

6 mahithir mohamad and Neel chowdhury, “George Soros, Scourge of Asia?” Fortune Magazine (September 29, 1997), http://money.cnn.com/magazines/fortune/fortune_archive/1997/09/29/232108/index.htm

7 colin mcmahon, “The hidden fight over the ruble: While moscow tries to save its currency, russia's tycoons, parliament members and even the west are suspected of ulterior motives,” Chicago Tribune (August 20, 1998), http://articles.chicagotribune.com/1998-08-20/news/9808200147_1_ruble-devalue-prime-minister-sergei-kiriyenko

8 Daniel treisman and Nikolay Petrov, “The return: russia’s Journey from Gorbachev to medvedev,” carnegie endowment for International Peace, February 1, 2011, http://carnegieendowment.org/2011/02/01/return-russia-s-journey-from-gorbachev-to-

Page 68: The Counter Terrorist Magazine - October/November 2012

68 The Counter Terrorist ~ October/November 2012

medvedev/xhz, accessed July 2012.9 “Soros moscow offices raided, men

in battle-fatigues have raided the moscow headquarters of billionaire investor George Soros,” Al Jazeera (7 November 2003), http://www.aljazeera.com/archive/2003/11/2008410133342744558.html.

10 “French court convicts Soros of insider trading,” UK Guardian (December 20, 2002), http://www.guardian.co.uk/business/2002/dec/20/france.internationalnews.

11 Jonathan Sibun, “George Soros loses appeal over SocGen insider trading conviction,” The Telegraph (uK) (october 6, 2011), http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/8811574/George-Soros-loses-appeal-over-SocGen-insider-trading-conviction.html.

12 richard miniter, “Are George Soros' billions compromising u.S. foreign policy?” Forbes (September 9, 2011), http://www.forbes.com/sites/richardminiter/2011/09/09/should-george-soros-be-allowed-to-buy-u-s-foreign-policy/.

13 David Holley, “Soros Invests in his democratic passion; the billionaire's open Society Institute network is focusing on central Asia now,” Los Angeles Times (July 05, 2004), http://articles.latimes.com/2004/jul/05/world/fg-soros5.

14 richard miniter, “Are George Soros' billions compromising u.S. foreign policy?” Forbes (September 9, 2011), http://www.forbes.com/sites/richardminiter/2011/09/09/should-george-soros-be-allowed-to-buy-u-s-foreign-policy/.

15 George Soros, Soros on Soros: Staying ahead of the curve, (New York: John Wiley and Sons, Inc., 1995) 238.

16 “‘Puppet master’ Soros has ‘fun’ subversively & adversely affecting societies; lays out his plan for America,” The Blaze (9 November 2010), http://www.theblaze.com/stories/puppet-master-soros-has-fun-subversively-lays-out-his-plan-for-america/.

17 col. Qiao liang and col. Wang Xiangsui, Unrestricted Warfare . . ..

18 “rep Paul Kanjorski reviews the bailout Situation,” C-SPAN (September

15, 2008), http://glblgeopolitics.wordpress.com/2012/01/31/cspan-rep-paul-kanjorski-reviews-the-bailout-situation/, (quote starts at 2:20 mark),.

19 George Soros, The Crash of 2008 and What It Means, (New York: Public Affairs, 2002), 157.

20 George Soros, “one way to stop bear raids,” The Wall Street Journal (March 24, 2009), http://online.wsj.com/article/Sb123785310594719693.html.

21 matt taibbi, “Wall Street's naked swindle; A scheme to flood the market with counterfeit stocks helped kill bear Stearns and lehman brothers — and the feds have yet to bust the culprits,” Rolling Stone (April 5, 2010), http://www.rollingstone.com/politics/news/wall-streets-naked-swindle-20100405#ixzz21PXl9uvN.

22 col. Qiao liang and col. Wang Xiangsui, Unrestricted Warfare . . ..

23 Paul Krugman The accidental theorist: And other dispatches from the dismal science, (New York: W.W. Norton and company, Inc., 1998), 160.

24 Sewell chan, “Financial crisis was avoidable, inquiry finds,” The New York Times (January 25, 2011), http://www.nytimes.com/2011/01/26/business/economy/26inquiry.html.

25 “George Soros,” The New York Times (october 7, 2011), http://topics.nytimes.com/top/reference/timestopics/people/s/george_soros/index.html#.

26 col. Qiao liang and col. Wang Xiangsui, Unrestricted Warfare . . ..

27 “Investors: The $1 billion armageddon trade placed against the united States,” ETF Daily News (July 25, 2011), http://etfdailynews.com/2011/07/25/investors-the-1-billion-armageddon-trade-placed-against-the-united-states/,.

28 elisa martinuzzi, “record $6 trillion of fake u.S. bonds seized,” Bloomberg (February 17, 2012), http://www.bloomberg.com/news/2012-02-17/italy-police-seize-6-trillion-of-fake-u-s-treasury-bonds-in-switzerland.html.

29 matthew Goldstein, “A Goldman trading scandal?” Reuters (July 5, 2009), http://blogs.

reuters.com/commentaries/2009/07/05/a-goldman-trading-scandal/ .

30 Devlin barrett, “Hackers penetrate Nasdaq computers,” The Wall Street Journal (February 5, 2011), http://online.wsj.com/article/Sb10001424052748704709304576124502351634690.html.

31 Daniel Gross, “‘Flash crash’ was a warm-up: computerized trading threatens global financial system, author says,” Daily ticker, Yahoo Finance (June 18, 2012), http://finance.yahoo.com/blogs/daily-ticker/flash-crash-warm-computerized-trading-threatens-global-financial-152033499.html.

32 Karl West, “man who broke the bank of england, George Soros, 'at centre of hedge funds plot to cash in on fall of the euro'” Daily Mail (uK) (27 February 2010), http://www.dailymail.co.uk/news/article-1253791/Is-man-broke-bank-england-George-Soros-centre-hedge-funds-betting-crisis-hit-euro.html#ixzz21Pn4QArh.

33 “Greece's budget deficit worse than first thought,” BBC News (April 22, 2010), http://news.bbc.co.uk/2/hi/business/8637270.stm.

34 “Germany eyes spy plan aimed at currency speculators,” The New York Times (march 18, 2010), http://dealbook.nytimes.com/2010/03/18/german-eyes-spy-plan-aimed-at-hedge-funds/.

35 Alan crawford, “Germany to temporarily ban naked short selling, some swaps of euro bonds,” Bloomberg (may 18, 2010), http://www.bloomberg.com/news/2010-05-18/germany-to-start-temporary-ban-on-naked-short-selling-of-euro-bonds-banks.html.

36 col. Qiao liang and col. Wang Xiangsui, Unrestricted Warfare.

Page 69: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 69

Innovative Products

XRS-4 X-RAy MAChINEThe Golden engineering XrS-4 is a 370 KV X-ray machine designed to penetrate 1.5 inches of steel. It is powered by a Dewalt 18V battery pack, weighs 21 pounds and is well suited for ordnance examination. Additionally, Golden engineering now makes an 8”x10” instant film system compatible with the Polaroid 8”x10” cassette and the 150P processor. This is the first compatible instant film system since Polaroid discontinued 803 film and provides a low cost lightweight solution for producing images in remote locations. www.goldenengineering.com

BCM 14.5” RECCE CARBINEbravo company is best known for great, reliable rifles and the 14.5 recce is no exception. It has a free float rail system, 14.5" government profile barrel, 11595e independently certified mil-spec barrel steel with 1/7 twist and mid-length gas system. It has a pinned and welded tactical compensator for a 16" civilian legal barrel and a railed upper receiver. Some innovations include the bcm Gunfighter Grip (resembles a 1911 grip angle), and the Gunfighter charging Handle (extended, beefed up latch). This may be just the rifle for your mission. www.bravocompanymfg.com

TRuNARCtruNarc was designed to identify narcotics, stimulants, depressants, hallucinogens, analgesics, cutting agents and precursors, including mixtures. In addition to typical street drugs such as heroin, cocaine, and mDmA, truNarc can also identify synthetic cathinones (bath salts) and the library can be rapidly updated by the manufacturer as new bath salts hit the streets. It is a handheld, non-destructive, non-contact test that provides quick identification of substances and detailed reporting to support the chain of custody for prosecution.www.thermoscientific.com

Page 70: The Counter Terrorist Magazine - October/November 2012

70 The Counter Terrorist ~ October/November 2012

Journal for Law Enforcement, Intelligence & Special Operations Professionals

Counter Theoctober/November 2012

Volume 5 • Number 5

AdVe

Rtis

eR iN

dex to request detailed product information, circle the appropriate reader service number (rSN) on the attached reader Service

card. The card is self-addressed and includes postage. For more information on all of our advertisers and advertising opportunities, please visit our website at: www.thecounterterroristmag.com/advertising.asp Individual advertisers’ websites are also provided below for your convenience.

Page Ad/company • website and/or email .......................................................................................................RSN Number

3018331240291415307

737656433227243930442345173

28146375545755381037425971194749114

742

10

168247353081522111621942732752772092811781668328517514881265279205132971462223345030112533519130334317021531322634910129239254311

11th Annual Next Generation of light Armored Vehicles Summit • www.lightarmoredvehiclessummit.com ..2012 uSNSTA Instructors Academy • www.usnsta.com .......................................................................7th Annual Homeland Security Professionals Conference • www.thecounterterroristmag.com/conference .....Adams Industries • www.adamsindustries.com .....................................................................................American Islamic Forum for Democracy • www.aifdemocracy.org.......................................................American Public university • www.amuonline.com/counter-terrorist .....................................................Cargo Security Summit • www.cargosecuritysummit.com ......................................................................Counter IeD India 2012 • www.c-iedindia.com ....................................................................................Defense Group - Cobra Software • www.cobrafirstresponder.com ........................................................Defense Solutions Group - DSG Arms • www.dsgarms.com .................................................................elite K9 • www.elitek9.com ...................................................................................................................energizer • www.hardcasetactical.com .................................................................................................executive Protection Institute • www.personalprotection.com ...............................................................Federal eastern International • www.fedeastintl.com ...........................................................................Global Security Asia 2013 • www.globalsecasia.com ..........................................................................Golden engineering, Inc. • www.goldenengineering.com .....................................................................Golight Inc • www.golight.com .............................................................................................................Heat Armor • www.heat-armor.com .....................................................................................................Human Geography Summit • www.humangeographyevent.com...........................................................Icor Technology • www.icortechnology.com ..........................................................................................Institute for Preventive Strategies • www.preventivestrategies.net ........................................................K9 Cop magazine • www.k9copmagazine.com ....................................................................................Kaplan university • www.empower.kaplanu.edu/publicsafety/counterterrorism .....................................lenco Industries Inc. • www.swattrucks.com .........................................................................................mattracks • www.mattracks.com ..........................................................................................................military equipment & Technology expo • www.militaryequipmentexpo.com .........................................NToA • www.ntoa.org .........................................................................................................................oasys Technology • [email protected] ...................................................................................officerStore.com • www.officerstore.com .............................................................................................Patriot3 • www.patriot3.com ...............................................................................................................Platesmart • www.platesmart.com ........................................................................................................Policeone Academy • www.policeoneacademy.com .............................................................................PoliceTraining.net • www.policetraining.net .........................................................................................reconyx • www.reconyx.com ...............................................................................................................Southern Police equipment • www.sooutherpoliceequipment.com .........................................................Special operations Summit • www.specialoperationssummit.com/CTm ................................................SSI Advanced Homeland Security Training in Israel • www.homelandsecurityssi.com ..........................SSI elevated Tactics Training • www.homelandsecurityssi.com...............................................................SSI PVbs • www.ssipvb.com .................................................................................................................Sun badge Company • www.sunbadgeco.com .....................................................................................Tactical Products Group Inc. • www.tacprogear.com ............................................................................Tex Shield Inc • [email protected] ....................................................................................................The Sesolinc Group • www.sesolinc.com ..............................................................................................Thermo Scientific Portable Analytical Instruments Inc. • www.thermoscientific.com/mil-chemID ..........Zistos Corp • www.zistos.com ..............................................................................................................

Circle 215 on Reader Service Card

Cost: $399 Registration

LEARN MORE at: www.homelandsecurityssi.com SECURITY SOLUTIONS INTERNATIONALSSI

®

SSICall now for more information. Phone: 866-573-3999

Fax: [email protected] Protecting the Homeland Together ®

The experts on training in:

SECURITY SOLUTIONS INTERNATIONALSSI®

SSI

IsraelIsraelIsrael

8PAGEINSERT.indd 3 1/10/12 1:53 PM

The Advanced Global Security Workshop in

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects:

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel's northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel's critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

NOVEMBER 9-16, 2012

Page 71: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 71Circle 50 on Reader Service Card

Circle 228 on Reader Service Card

Circle 215 on Reader Service Card

Cost: $399 Registration

LEARN MORE at: www.homelandsecurityssi.com SECURITY SOLUTIONS INTERNATIONALSSI

®

SSICall now for more information. Phone: 866-573-3999

Fax: [email protected] Protecting the Homeland Together ®

The experts on training in:

SECURITY SOLUTIONS INTERNATIONALSSI®

SSI

IsraelIsraelIsrael

8PAGEINSERT.indd 3 1/10/12 1:53 PM

The Advanced Global Security Workshop in

the Homeland Security professionals best resource

Since 2005, SSI has taken nearly 500 First Responders to Israel and shown them the basics of the Israel security concept. Thanks in part to that program, we are better able to defend ourselves in the United States. In response to demand, we are now offering a once-in-a-lifetime experience covering the following advanced subjects:

Hezbollah - a threat as deadly as al-Qaeda - Learn about them in their own territory, along Israel's northern border. Hostage Rescue - Discover how they go wrong. Hospital Response - Find out how Israel's critical response hospitals handle surge and multi-casualty incidents. Israel Counter Terrorism units - Learn how they operate. Israel National Police - National Academy; See how they train? Sensitive Installations - Participate in a day-long exercise and training program in how to set up a complete security system. Secret Israel Homeland Security Simulator - See how this works at a base south of Tel Aviv.

Stay in Haifa, Tel Aviv and Jerusalem and visit some of the most amazing sites! Register now if you are US Military, a Homeland Security Professional, a Security Professional, an EMS, or an EMT.

NOVEMBER 9-16, 2012

LEARN MORE at: www.homelandsecurityssi.com SECURITY SOLUTIONS INTERNATIONALSSI

®

SSICall now for more information. Phone: 866-573-3999

Fax: [email protected] Protecting the Homeland Together ®

Circle 215 on Reader Service Card

Page 72: The Counter Terrorist Magazine - October/November 2012

72 The Counter Terrorist ~ October/November 2012

Training review

VxL Seven-Gunby chris graham

out range on a scorching, humid day and zeroed sites at 25 yards for a 300-yard-bZo.

once each shooter was finished zeroing sites, we moved to 100 yards and fired 15 rounds prone at paper silhouettes. Shoot-ers fired five rounds kneeling, dropped to a prone position, executed a combat reload, and fired five more rounds under time constraints. Then students moved to 50 yards and fired 10 rounds prone. At 25 yards shooters fired five rounds standing, dropped to kneeling, executed a combat reload, and fired five more rounds. They then fired 10 rounds stand-ing. Students concluded at 15 yards, firing 5 rounds standing.

The class was given instruction on the ANPeQ-2 infrared laser and zeroed DbAl-I aiming devices. Shooters moved back out to the range and conducted low-light fire against paper targets, then fired m-4s with DbAls using PVS-14 night vision goggles against steel silhouettes.

on day two, students received classes on the AcoG tA47-2 2x20 optic and eotech 512 . The shooters zeroed one optic, shot it for qualification, then zeroed the other and fired it for qualification.

Irish gave classes on the Glock 19 on day three. Students donned Safariland

drop holsters and fired two rounds at 25 yards. They fired six rounds at 15 yards and moved to 7 yards. Shooters fired six rounds combat reloaded, and fired six more. Students fired seven rounds at 3 yards in four seconds. They fired two rounds in two seconds, repeating the drill three times, and then they fired seven rounds strong-hand-only.

Finally, students shot the same course of fire from concealed holsters. With qualification complete, Ken, a marine recon platoon commander and competi-tive shooter, introduced students to some training drills. Shooters practiced “dot drills,” refining trigger work. They also practiced efficient trigger reset, transi-tion between multiple targets, and pivot drills. After sunset, students shot the same course of fire under low-light conditions.

on day four, students received classes on the m-203 grenade launcher, the m870 shotgun and the AK-47. Shoot-ers employed the m-203 from 90 to 350 yards. They then shot the m870 at 15 and 7 yards, incorporating combat re-loads under time constraint for qualifica-tion. They also fired AK-47s in semi-and full-auto modes against steel targets. After nightfall, students shot the m870 qual again and then fired the AK-47.

sU.S. Navy personnel conduct standard small arms training. Photo: U.S. Navy

kill at arms is an important component of tactical operations.

combat in any form does not reward second-rate performance. one can spend a lifetime acquiring and honing skills and never achieve perfection. to facilitate surpassing current capability ceilings, many personnel pursue external training.

Vxl is a company various organiza-tions call upon for training that pursues excellence, from instructors who under-stand that standards must continually be raised. I recently had the opportunity to participate in Vxl firearms training. our class of twenty-six consisted of former military personnel (and a couple of police officers) who were being trained to support governmental protection opera-tions in high-threat environments. Vxl provided intermediate-level skills training and documentation in accordance with their clients’ requirements.

Day one of the firearms package began with a safety briefing, including discus-sion of the four firearms safety rules that would be repeated at each range session. “Irish” a former marine scout/sniper and police officer gave classes on the lmt m-4 rifle, iron sites and the qualification course of fire students would be evaluated on. Students moved outside to a well-laid

Page 73: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 73

Training review

VxL Seven-GunDay five was machine gun day.

Students received classes on the m249 light machine gun and m240b medium machine gun from Jim, a former ranger sniper instructor. Students fired close-range qualification courses on miniature targets and then fired prone, standing, and moving iterations. After dark, they shot low-light courses of fire.

on the sixth day, students cleaned weapons and on the following day they split into two groups and alternated. each group fired (dry then live) m-4s from a Suburban driving laterally across a target line and fired to the rear at a paper silhouette target in the driver seat of a car while pulling away from it. each group also practiced transition drills, pivots, shooting on the move, one-handed draws, weak-hand immediate action, remedial action, and reloads. The day ended with all students on line, pivoting 180°, and engaging three-dimensional targets in a discrimination drill.

The final day of live fire training consisted of a class on the 10.5" barrel m4, bZo, shooting the rifle qualifica-tion course again and shooting some additional drills. Students practiced dry and live fire bounding and conducted dry and live fire immediate action drills from formations. Shooters concluded with 10.5" barrel m-4 utm guns and scenario training. two-man teams were introduced to circumstances with role players and forced to practice non-lethal problem solving, decision–making, and appropriate application of lethal force.

Firearms training is widely available. All armed professionals are benefitted by opportunities to shoot with more skilled shooters. Vxl rigidly adhered to their cli-ents’ requirements and students regularly commented that this training and the insight of the instructors exceeded what they had previously experienced in their careers.

www.vxlenterprises.com.

Circle 277 on Reader Service Card

YOU’VE GOT THE RIGHT DOG, NOW GET THE RIGHT EQUIPMENT

Scan our QR code with your smart phone to view our online catalog.

Special OperationsHarness

available in black, coyote or multicam*

with plastic with metal cobra buckles buckles

$149.95 $199.95*with attachments for MOLLE pouches

and K-9 camera

E-Collar Holsters$39.95

Has cutouts so the buttons can still be worked while it’s holstered. Has 2¼" metal clip on back of holster so it can be worn on a 2" duty belt or clipped to a MOLLE tactical vest.

Reward Balls with Tug Handles

3" Ball

$12.95 2.5" Ball

$11.95 2" Ball

$9.95

Bite SuitHelmet$74.95

Bite Suit$1,189.95

HandProtectors

$39.95 ea

Muzzles$69.95

German ShepherdMalinois

[ [Follow us on

4http://abcnews.go.com/Politics/obama-dismisses-standard-poors-downgrade-sees-urgency-debt-talks/story?id=14255055 accessed on 8/10/2012.

5http://www.washingtonpost.com/wp-dyn/content/article/2010/07/06/Ar2010070601928.html accessed on 8/10/2012.

6http://www.judicialwatch.org/press-room/press-releases/judicial-watch-sues-obama-justice-department-for-records-regarding-dojs-decision-to-block-south-carolinas-voter-id-law/ accessed on 8/10/12.

7http://www.npr.org/2011/03/21/134730963/the-nation-in-libya-us-forgot-about-congress accessed on 8/10/12.

8http://abcnews.go.com/blogs/politics/2008/11/republicans-to/ accessed on 8/10/2012.

9http://abcnews.go.com/blotter/solyndra-report-obama-admin-restructured-loan-pr-concerns/story?id=16912518 accessed 8/10/12.

— Continued from page 6.

Change We Can Believe In...

Page 74: The Counter Terrorist Magazine - October/November 2012

74 The Counter Terrorist ~ October/November 2012

Mobility, Deployment, Maintenance, Sustainment And Operations Systems

Enhanced Command and Control Secure Communications Video Conferencing Increased Protection for Sensitive Equipment

Increased Mission Flexibility Multiple System Configurations Deployable via Military and Commercial Vehicles Air-Transportable and Sling-Loadable

Deployable Command Centers

HVACVenting

360° High Density

Insulation

Fire Detection and Suppression Racks Un-Interruptable

Power Supply (UPS)Power Distribution

Unit (PDU)

Weather and Fire-proof ISO Compatible Enclosure

HVAC Condenser/Evaporator Chilled H2O

Phone (866) 312-6226 (571) 259-2817Fax (800) 862-9489 Email [email protected]

www.sesolinc.comSESOLINC

GROUP

THESESOLINC

GROUP

THE

Data Container Maximum Flexibility Completely Customized

to Client Requirements

Deployable Data Security

Circle 239 on Reader Service Card

Page 75: The Counter Terrorist Magazine - October/November 2012

The Counter Terrorist ~ October/November 2012 75

Circle 334 on Reader Service Card

Page 76: The Counter Terrorist Magazine - October/November 2012

76 The Counter Terrorist ~ October/November 2012

Circle 209 on Reader Service Card

TM

www.HardCaseTactical.com

Engineered to be virtually indestructible, Energizer® Hard Case® Tactical® lights are multi-functional, lightweight and versatile, with features critical to military personnel to combat terrorism.

Check out the complete product line at HardCaseTactical.com!

© 2012 Energizer Energizer and other marks are trademarks of Energizer

®

White and blue LEDs and IR and IFF for night vision compatibility. Includes helmet and vest mounts.

TANGO HCTHLU11L

A swivel-head light with white, red, blue, and green LEDs and IR for night vision compatibility.

BRAVO HCT2GU21L

A compact vest light in white with red, blue and green fi lters for light discipline.

ROMEO HCTMOS11L

The world’s longest lasting AA battery in high tech devices, the Energizer® Military Lithium AA weighs 1/3 less and outperforms alkaline AA and Lithium 123 batteries in temperature extremes.

Energizer® Military Lithium AA L91

EN_US_MIL_FullPgAd_CounterTerroristMag.indd 1 7/19/12 1:28 PM

Circle 209 on Reader Service Card