The IACSP’s Counter-Terrorism Journal V19N2

Page 1

Annual Homeland Security Education Directory

Keep On Sale Until August 28, 2013

Africa

Is Becoming The Next Afghanistan? Shopping Malls And The Underground Gang Empire Lone Wolves: Domestic Terrorist Or Lone Nut? Christopher Dorner’s Rampage 2014 World Cup: Brazil Braces For Security Challenges Worse Nightmare: Disrupted Emergency Communications Books………

Summer Issue Vol. 19, No. 2, 2013 Printed in the U.S.A. IACSP.COM


Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


In the aftermath of recent events, the IACSP would like to remind us all how important Boston is to Freedom in this country!


Vol. 19, No. 2 Summer 2013 IACSP Director of Operations Steven J. Fustero Associate Publisher Phil Friedman

Page 20 Domestic Terrorist Or Lone Nut?

Senior Editor Nancy Perry Contributing Editors Paul Davis Thomas B. Hunter Joshua Sinai

Christopher Dorner’s Rampage by George Michael

Book Review Editor Jack Plaxe Research Director Gerry Keenan Conference Director John Dew Communications Director Craig O. Thompson

Page 26 Is Africa Becoming

Art Director Scott Dube, MAD4ART International Psychological CT Advisors Cherie Castellano, MA, CSW, LPC

the Next Afghanistan

Counterintelligence Advisor Stanley I. White

by Danny Dickerson

South America Advisor Edward J. Maggio Homeland Security Advisor Col. David Gavigan

Page 6 Page 8

SITREP Worse Nightmare: Disrupted Emergency Communications, by David Gewirtz

Page 12 A Look At The Philadelphia Police Dept.’s Homeland Security Bureau, by Paul Davis Page 16

Shopping Malls And The Underground Gang Empire, by Garrick Ploncynski & Ben Pieper

Page 20

Domestic Terrorist Or Lone Nut? Christopher Dorner’s Rampage, by George Michael

Page 26 Is Africa Becoming The Next Afghanistan, by Danny Dickerson Page 32

Page 48 Lethal Skies: When Drones Attack, by William Pat Schuber Page 54 Secure Driver: Breathing, by Sean McLaine Page 56 2014 World Cup: Brazil Braces For Security Challenges, by Viviane Vicente Bencie &

Hazmat Advisor Bob Jaffin Security Driver Advisor Anthony Ricci, ADSI

IACSP Advisory Board John M. Peterson III John Dew Thomas Patire Cherie Castellano, MA, CSW, LPC Robert E. Thorn Southeast Asia Correspondent Dr. Thomas A. Marks European Correspondent Elisabeth Peruci

Andrew Jacobsberg

Page 60

IACSP Q&A With Michael J. Sulick Author Of “Spying In America,” interview by Paul Davis

Page 63

Book Review: Luke Bencie, Among Enemies: Counter-Espionage for the Business

Traveler, review by Dr. Joshua Sinai Mobile Social Media: A Terrorist’s Tool For Tactical Coordination, by Avraham Cohn

THE JOURNAL OF COUNTERTERRORISM & HOMELAND SECURITY INT’L is published by SecureWorldnet, Ltd., PO Box 100688, Arlington, VA 22210, USA, (ISSN#1552-5155) in cooperation with the International Association for Counterterrorism & Security Professionals and Counterterrorism & Security Education and Research Foundation. Copyright © 2013. All rights reserved. No part of this publication may be reproduced without written permission from the publisher. The opinions expressed herein are the responsibility of the authors and are not necessarily those of the editors or publisher. Editorial correspondence should be addressed to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA, (703) 243-0993, FAX (703) 243-1197. Membership $65/year, add $10 for overseas memberships. Postmaster: send address changes to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA. Web site: www.iacsp.com

Tactical Advisor Robert Taubert

Cell Phone Forensics Advisor Dr. Eamon P. Doherty

Page 44 Cyber Warfare Against Israel And Its Response, by Dr. Joshua Sinai

Page 64

Emergency Management Advisor Clark L. Staten

Cyberwarfare Advisor David Gewirtz

IACSP’s 20th Annual Terrorism Trends & Forecasts Symposium

Page 36 Homeland Security Education Directory

Personal Security Advisor Thomas J. Patire

PHOTO CREDITS: Reuters, Army.mil, Navy.mil, istockphoto. com, shutterstock.com and authors where applicable.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Middle East Correspondent Ali Koknar National Sales Representative Phil Friedman, Advertising Director Tel: 201-224-0588, Fax: 202-315-3459 iacsp@aol.com Tactical Sales Representative Scott Dube, MAD4ART International Tel: 757-721-2774, scott@mad4art.com



SITREP

W

orld Trends & Forecasts

In the Central African Republic, a peace deal signed two months ago in Libreville collapsed as the Seleka rebel alliance, having repeatedly violated the ceasefire, seized the capital Bangui last month. President Francois Bozizé fled to Cameroon. Seleka leader Michel Djotodia declared himself president and suspended the constitution and National Assembly. Crisis Group identifies a conflict risk for Central African Republic. Tensions continued to escalate on the Korean peninsula. The UN Security Council’s recent resolution condemning North Korea’s nuclear test prompted Pyongyang to threaten pre-emptive nuclear strikes against “invaders”. Last month in a rare Central Committee meeting Pyongyang declared nuclear weapons are non-negotiable and North Korea’s nuclear status should be written into law. In a new outbreak of intercommunal violence in Myanmar in the central town of Meiktila, more than 40 people were killed and over 12,000 displaced, and hundreds of mainly Muslim-

6

owned buildings destroyed, in attacks by Buddhist mobs. President Thein Sein imposed a state of emergency in the area and deployed the military to restore calm. The political uncertainty and paralysis gripping Lebanon worsened with the abrupt resignation of Prime Minister Najib Mikati following a standoff with Hizbollah. Political instability further fed ongoing sectarian tensions and clashes, mainly in the southern town of Saida and the northern city of Tripoli, where a dozen people were killed in clashes between Sunni and Alawite militants. Within Syria the first credible reports emerged of chemical weapons use in the ongoing conflict. The UN

is looking into the reports on the field to determine if these reports are correct. Ira q’s politic a l c ris is a ga in deepened recently. Widespread demonstrations in Sunni areas of the country have met an increasingly hardline security response, with security forces killing two Sunni protesters in Mosul. Meanwhile Iraq’s parliament relied exclusively on votes from the Shia’s political blocs to pass the 2013 budget law, illustrating Baghdad’s increasingly sectarian politics. As the stalemate between Egypt’s President Mohamed Morsi and the opposition continued, violent clashes between opponents and

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

supporters of the ruling Muslim Brotherhood broke out outside the Islamists’ headquarters in Cairo. The violence took place as political demonstrations and riots in Egypt are increasingly giving way to socio-economic protest in the face of fuel shortages, inflation and price increases. Prospects for peace between Turkey’s government and Kurdish insurgents are improving after five months of negotiations between the national intelligence agency and the jailed leader of the outlawed Kurdistan Workers’ Party (PKK), Abdullah Öcalan. 2nd Quarter 2013 TRENDS Deteriorated Situations • Central African Republic, Egypt, Iraq, Lebanon, Myanmar, North Korea, Syria Improved Situations • Nepal, Turkey Source: www.CrisisWatch.org

Al-Qaeda Targets Children Through Video Games Al-Qaeda in the Islamic Maghreb (AQIM) is changing its strategy to target children at an early age to lure them to its radical ideology. To do this, the group is using new methods deemed to be more capable of attracting children’s attention such as video games that include a clear strategy to show the group’s ability to win wars against international


forces. Last month telquel-online. com published a picture from a jihadist forum showing a video game designed by AQIM. The game has a military aircraft carrying AQIM’s black flag while hitting and destroying French aircraft in the Sahara where battles are raging against the terrorists in northern Mali. The website said that the game, “Muslim Mali”, displays the message “Congratulations, you have become martyrs!” in lieu of “Game Over” when a player loses all their lives. However, the exploitation of children by jihadists did not surprise many after adolescents were recently arrested in Ifoghas Mountains. “Families in

Maghreb countries must be keen not to allow their children absolutely free access to social networking websites to prevent them from falling into the trap of the propaganda of jihadist groups,” he added. “Most young members of jihadist groups joined when they were adolescents unaware of the risks.” Source: http://magharebia. com/en_GB/articles/awi/features/2013/04/12/feature-03

In The Trenches: U.S. Army Weak On Mobile Devices Security Department of Defense (DoD) audit found that the Army has been lax in developing security guidelines for the use of the thousands of mobile devices now in service, and that these already-weak and insufficient security guidelines are inconsistently implemented. Photo Source: army.mil Fox News reported that the audit covered the use of iOS, Android and Windows mobile devices by Army personnel and in Army facilities where the devices were connected to on-site Wi-Fi networks. In the audit the DoD tracked the use 842 devices, for which DOD paid an estimated $485,794. The audit said that its conclusions applied to the more than 14,000 mobile devices the

who tracked terrorism financing for a U.S. military task force in Afghanistan.

army has purchased. The audit discovered many security weaknesses in the Army’s mobile strategy. Even more surprising, the audit found that the Army does not know where all of its mobile devices are. Personal mobile devices given to Army personnel must be authorized before they are used, but according to the audit, around 15,000 unauthorized devices are currently in use. In addition to these infractions, many phones were not password protected, ran on old operating systems, thus making them vulnerable to viruses and attacks, and did not have any software protection installed. The Army and DoD said they were now working together to develop clearer and more effective guidelines, and penalize those who fail to follow these guidelines. Source:http://www.homelandsecuritynewswire.com/dr20130417-u-s-army-weak-on-mobile-devices-security

Counterterrorism Officials Long Feared IEDs Would Make Way To U.S. Shores Long before the gruesome bombings at the Boston marathon, U.S. counterterrorism officials feared that the improvised explosive devices used so effectively by insurgents on the Iraq and Afghanistan battlefields might one day make their way to U.S. shores. “The Boston bombing is the worst of what we thought was coming to our country, but we hoped it never would – IED bombings,” said Thomas Creal,

incident, especially those in the area at the time the violence happened.

James Carafano, a senior defense analyst with The Heritage Foundation, said “IEDs are the weapon du jour of terrorists” and difficult to defend against. “This is our classic threat profile,” said Carafano. “There are some common sense precautions we take, but in a public area like that of the marathon it’s almost impossible to be full proof.” “The only difference between this bomb and the bomb in New York’s Times Square, is that the bomb in Times Square didn’t go off,” Carafano said.

Incidents of mass violence can disturb our collective sense of order and safety, and therefore the ‘circle of impact’ can extend to even those who live far outside of the impacted area with no personal connections to the event. For example, a shooting at a high school may trigger feelings of distress around the country because it upsets our ideas that schools are supposed to be safe places- kids, parents and caregivers anywhere could experience significant distress following the incident.

A U.S. military official, with extensive knowledge of IEDs and who has served in multiple war zones, said law enforcement officials “have every right to fear these types of IED attacks in the United States against vulnerable citizens.”

Disaster Distress Helpline 1-800-985-5990 or Text TalkWithUs to 66746 TTY for Deaf/Hearing Impaired: 1-800-846-8517

“This type of terrorist incident makes it possible for a poorly financed person or group to scare an entire nation with a single act of terrorism,” the official added. Source: http://www.washingtonguardian.com/

Risk Factors For Distress Because incidents of mass violence- such as the recent Boston Marathon bombing, shootings, and other events where there are multiple fatalities and/or injuries -are human-caused and

with the intention of harming or killing others, among disasters they can be especially devastating to those that experience them, including: • Survivors of the incident (adults, children and teens) • Loved ones of victims • First responders, rescue & recovery workers • Neighbors and community members surrounding the

For more information go to: http:// disasterdistress.samhsa.gov/disasters/ incidents-of-mass-violence.aspx

Homeland Security Begins With Hometown Security If you see something suspicious taking place then report that behavior or activity to local law enforcement or in the case of emergency call 9-1-1. Factors such as race, ethnicity, national origin, or religious affiliation alone are not suspicious. For that reason, the public should report only suspicious behavior and situations (e.g., an unattended backpack in a public place or someone trying to break into a restricted area) rather than beliefs, thoughts, ideas, expressions, associations, or speech unrelated to terrorism or other criminal activity. Only reports that document behavior reasonably indicative of criminal activity related to terrorism will be shared with federal partners. DHS is working to expand “If You See Something, Say Something ™” throughout the country by partnering with a variety of entities including: transportation systems, universities, states, cities, sports leagues and local law enforcement. If you’re interested in getting your group involved please contact 202-2828010. Report Suspicious

Activity to Local Law Enforcement or Call 9-1-1.


Worse Nightmare:

New Ways Emergency Communications Can Be Disrupted By Hackers And Terrorists By David Gewirtz

8

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


W

e all know that digital technology can be disruptive. Digital technology can often be delivered at a fraction of the cost of its analog ancestor. Take, for example, classified ads in newspapers. To deliver these ads, the entire printing and distribution infrastructure for heavy paper bundles had to be established and operate. Each new newspaper customer could be clearly defined in terms of the physical costs of paper, ink, and the effort involved in moving the paper from the print house to the person’s office or home. A classified ad reader was still a newspaper customer, so physical access to the newspaper was an essential prerequisite before the consumer was able to read the want ads. However, digital technology bypassed all those physical expenses. A service like Craigslist is able to offer most classified ads for free -- both for the buyer and seller. The cost of the transaction is collapsed. Craigslist is able to deliver most of its ads without charging either the advertiser or the buyer. This collapsing of the analog cost model has also caused disruption in the traditional analog phone service. Long distance (which often simply meant over state lines) voice calls used to require a complex series of interconnection regulations for the service operator, as well as a monthly subscription fee for the service, and a per-minute charge for the phone user. Now, of course, there’s VoIP, or Voice-over-IP (IP means Internet protocol). VoIP is basically telephone over the Internet. Many variations of this service exist, from free voice calls using Microsoft’s Skype, to very inexpensive calls using gadgets like MagicJack, which plug into your computer’s USB port. The thing about VoIP, especially if the call is from Internet node to Internet node, is that the cost is the same (virtually free) whether the call is between two computers in the same town, or two computers across the planet.

This is at the heart of why international call centers work, and why they’ve become so popular. When the Internet is used as an interconnect mechanism, there’s no cost difference for the call center operator between a customer in Manhattan calling a call center located in Bangalore or that same customer calling a call center located in Hackensack, New Jersey. The way it works is a customer, initiating the call from a traditional phone number (which could be a VoIP circuit, a landline, or a mobile phone) calls an 800-number that has a switching node located in the U.S. That call is then converted to a VoIP call, and the transmission internationally travels over the Internet. The cost of the international call, which used to be frightfully expensive, is now the least expensive part of the equation. This math has not been lost on the world’s bad guys. They’ve flipped the formula around. They’ve noticed that a call from, say, Zhengzhou, China to Fresno, California was also free. That meant calling anyone in the U.S. from outside our borders would be as inexpensive as calling anyone in the U.S. from inside our borders. That made calling anyone in the U.S. very inexpensive, indeed. And that opened an enormous target of opportunity.

I’ve written before about DDoS attacks. These are attacks where thousands or millions of computers are co-opted by hackerrun botnets to flood a given destination computer system or network with digital traffic, overwhelming it, and bringing it to its knees. It’s like being on the receiving end of 50 full-on fire hoses. Brutal. There’s another type of denial of service we’re seeing more and more of called the TDoS, or Telephone Denial of Service attack. The idea behind this

is relatively simple. Rather than flooding an Internet node with Internet data, the TDoS demon-dials a phone number, and by having many different dialing engines dialing the same number at the same time, that number is effectively shut off from the phone system. These kinds of attacks can be just as automated as DDoS attacks, and can often run over the same botnet infrastructure. As more and more smartphones get hacked because users download malware-laden discount software, those smartphones

These are attacks where thousands or millions of computers are coopted by hacker-run botnets to flood a given destination computer system or network with digital traffic, overwhelming it, and bringing it to its knees. It’s like being on the receiving end of 50 full-on fire hoses. Brutal.


are becoming zombie dialing machines, not just using their Internet connections, but using their owners’ minutes to harass a target telephone number. The big trend recently has been the use of these attacks to blackmail victims. The National Emergency Number Association (also known as the 911 Association) reports numerous attacks against public safety answer points, emergency centers, ambulance services, and hospitals. According to NENA, the path of the scam is that a heavily-accented individual calls into the center, demanding payment for an outstanding payday loan from either an individual supposedly employed at the target or the organization itself. Payment

potentially life-threatening, they haven’t yet made their way into the warfare realm, although they have the potential to do so. It is entirely possible that a nation state or terrorist organization could acquire a list of phone numbers (even conveniently organized by ZIP code) for emergency responders throughout the country. A launch of a coordinated series of TDoS attacks against an entire region’s emergency response numbers could substantially slow down emergency service, cause citizen unrest, and result in an increased level of chaos -- just exactly the goals terrorists have in their actions. Timing is key here. Take, for example, Hurricane Sandy. Once the hurricane hit, emergency responders were

The big trend recently has been the use of these attacks to blackmail victims. The National Emergency Number Association (also known as the 911 Association) reports numerous attacks against public safety answer points, emergency centers, ambulance services, and hospitals.

is often demanded in the amount of $5,000 from the organization. In some cases, a former employee was named, and in others the name of the employee given was completely fabricated. Since most organizations don’t fall for this blackmail, the next step on the part of the attackers is to implement a TDoS attack. These attacks can block calls from making it into or out of the facility. NENA reports the “attacks resulted in enough volume to cause a roll over to the alternate facility” and “attacks last for intermittent time periods over several hours. They may stop for several hours, then resume. Once attacked, the attacks can start randomly over weeks or months.” Like most modern cyberthreats, this one is clearly monetarily motivated. The attackers are presumably attacking emergency contact centers because these facilities must keep their phone lines open for emergency response -- and, so the wrong-headed thinking may be -- most likely to cave into a demand in order to keep the lines operating. That thinking might well work in a country whose public servants operate on an underground bribery economy, but in the United States, it merely serves to inconvenience already-overworked agencies and put our citizens at risk. While these attacks are annoying and

10

already overwhelmed. But had a rogue nation decided to conduct widespread TDoS attacks in the northeast in the day or so before the hurricane arrived, it could have substantially unbalanced hurricane preparation, making the event considerably worse than it already was. By combining TDoS attacks with other cyberinfrastructure attacks, like attacks against the power grid, it’s possible for aggressors to cause substantial damage outside the normal scope of the Internet, and further escalate an already bad situation. So what can we do about all of this? Like with DDoS attacks (the distributed denial of service attacks aimed over the Internet to shut down network notes), TDoS attacks are very difficult to block. They originate from thousands to millions of individual attackers, often individuals completely unaware of their complicity in the attack. The best defense against these sorts of attacks, therefore, is a series of alternative communications methods, both for official business and between officials and citizens. Many emergency organizations have implemented internal communications grids, and these will likely survive TDoS attacks (unless they get hit, simultaneously, with some sort of malware infection, which is a real risk). The challenge, really, is in making sure that citizens can be heard, and that outreach and status updates can reach the populace.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Here, social networks become invaluable. In preparation, I strongly recommend all local emergency organizations establish both Twitter accounts and Facebook accounts (and make sure to protect their passwords). I also recommend that these resources be actively promoted to the community, so citizens know where to find services in case of emergency. This isn’t hard. For example, I can be found on Twitter at @DavidGewirtz. I’ve also got a new recommendation that I think has considerable merit. The digital signage business is growing at a rapid pace. According to IP Video Market Info (IPVM), 1.1 million displays were sold in 2009, and they estimate that has doubled in 2013 to 2.2 million displays. That means there are roughly 5 million displays worldwide, at least half of which are probably here in the United States. That puts approximately 50,000 digital signs in place in every state of the union -- almost all of which are connected to the Internet. My recommendation is to establish an emergency channel that allows these digital signs to be accessed and updated by emergency management personnel in the case of severe emergency, the way the emergency broadcast system has used televisions for decades. Of course, this would involve cooperation among the manufacturers and lucid lawmaking by our politicians (never something we can count on). Of course, there is always the Orwellian risk that some point far in the future, these signs might be co-opted by a regressive regime to use as a propaganda engine. More likely, and equally disturbing, is that our enemies might gain access to these connected devices as well, and either interfere with emergency communication or send out false information. Even so, finding alternative, creative, and effective emergency communications channels will be a necessity in a widely connected world. As always, I leave you with this deep thought: “Oh, joy.”

About the Author David Gewirtz is Director of the U.S. Strategic Perspective Institute, Distinguished Lecturer for CBS Interactive, Cyberwarfare Advisor for the International Association of Counterterrorism and Security Professionals, and IT Advisor to the Florida Public Health Association. You can read his blog at CBS Interactive’s ZDNet Government where tech meets politics and government or at CBS Interactive’s DIY-IT for DIY tech projects and small business advice Personal site is at DavidGewirtz.com Company site is at ZATZ.com Follow David on Twitter at @DavidGewirtz



A Look At

The Philadelphia Police Department’s Homeland Security Bureau By Paul Davis

P

hiladelphia Police Commissioner Charles H. Ramsey noted that Philadelphia is geographically located on the Eastern corridor between New York City and Washington D.C.

“The harder the target they make New York, the harder they make D.C.; the more attractive Philadelphia will look to terrorists,” Ramsey said. “The historical monuments and institutions we have here in Philadelphia make the city a target of value to someone who wants to psychologically harm the United States, in addition to actually harming people.”

Interviewed in his office at police headquarters, Ramsey said that regular crime is the biggest security threat to the average Philadelphian and the city has its share of gun violence. But from the standpoint of homeland security, Ramsey said that Philadelphia receives millions of tourist visitors each year and the city has a major port, an international airport and many other business, government, historical and cultural institutions. “Philadelphia has a lot going on,” Ramsey said.

12

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Since he was sworn in as the police commissioner on January 7, 2008, Ramsey has led the fourth largest police department in the country, with more than 6,500 sworn members and 830 civilian members. Ramsey previously served as the chief of the Metropolitan Police Department, District of Columbia from 1998 to 2006. While in Washington he oversaw and participated in many high profile investigations and events that had national security implications, including the 1998 murders of two United States Capitol Police officers inside the U.S. Capitol Building, the Y2K National Celebration, the International Monetary Fund/ World Bank protests, the Chandra Levy Murder Investigation, the 9/11Terrorist Attacks, the anthrax attacks and the DC sniper investigation.


Ramsey also served in the Chicago Police Department for nearly three decades, beginning as an 18-year-old Chicago Police cadet. He rose through the ranks to serve as the commander of patrol, detectives and narcotics units, and later served as the Deputy Superintendent of the Bureau of Staff Services. “I guess it is because of my Washington background, but I look at homeland security through a lens that perhaps some other chiefs may not,” Ramsey said. Ramsey said that he begins each day in Philadelphia with a conference call with all of his deputies and Chief Inspector Joe Sullivan, the commanding officer of the Philadelphia Homeland Security Bureau. Homeland security is discussed if there are threats, or if there is a visit from a dignitary and/or a notable event occurring. “We are in touch with New York, D. C. and other jurisdictions, as I’m the President of the Major Cities Chief’s Association. We have an intelligence subcommittee that pays close attention to national issues such as homeland security, so I stay in tune with a lot of things that are going on all over the United States, Canada, the U.K. the Middle East and elsewhere.” Ramsey said with homeland security, there is always an element of luck and there is always an element of preparation. “There has been a high level of

preparation and that includes to a large extent the communication between state, federal and local agencies that was not nearly as good on September 10, 2001. There has been a huge improvement in information sharing, joint investigations and the like. All of that has translated into a more effective response towards preventing and intervening prior to something happening,” Ramsey said. Philadelphia is not a soft target, Ramsey said, due to the additional steps the department has taken in the homeland security and counterterrorism area, but he fears the perception could be that it is because of a lack of publicity in comparison to other cities. “We often talk about terrorism as the traditional overseas threat, but the reality is that many of the people who have been responsible in recent years for terrorist attacks have been homegrown. That is without question one of the biggest threats facing us as a country,” Ramsey said. “Radicalization takes place in our penitentiaries, on the Internet and various other places.” “You don’t learn about these attacks until it is too late, or fortunately someone gets wind of the plot and notifies the authorities,” Ramsey said. “We have been very fortunate that we have been able to thwart a lot of attacks. They are not coming from extremists from overseas; these are folks that are right here in America. That probably is the most frightening dimension.”

Ramsey said he has increased the number of officers assigned to the Joint Terrorism Task Force and the Delaware Valley Intelligence Center is just getting off the ground. The Delaware Valley Intelligence Center will have representatives from Maryland, New Jersey, Delaware and Pennsylvania. Ramsey also said they have recently started a “Real Time” Crime Center that will be collocated with the intelligence center and under the same leadership. “You have to be aware of any possible nexus between crime and terror,” Ramsey said. “You can’t separate out the two.” Ramsey said they also perform a good number of tabletop exercises and scenarios with regional, state and federal agencies. “I just gave Joe Sullivan all of the “toys.” He now has SWAT, bombs, canine, aviation, and the marine unit, in addition to what he had before,” Ramsey said. “All of those units will be the first to respond in a situation. Joe Sullivan has taken on this responsibility and he is very good. I think we have a very robust unit.” Chief Inspector Joseph Sullivan, the Commanding Officer of the Homeland Security Bureau, is a 30-year-veteran of the Philadelphia Police Department. He is responsible for the Homeland Security Unit, as well as the Bomb Disposal Unit, Special Weapons and Tactics Unit (SWAT), Airport

Police Unit, Civil Affairs Unit, Dignitary Protection Section, Highway Patrol, Traffic Unit, Mounted Patrol, Canine Unit, Aviation Unit, Marine Unit, Major Accident Investigation Division and the Tow Squad. He also serves as the department’s point of contact to the FBI on all matters related to counterterrorism and the Department’s liaison to the Office of Emergency Management. “The job of the Homeland Security Unit is to coordinate, plan and train,” Sullivan said. “They are facilitators.” Sullivan said that there is no one unit in any police department or law enforcement agency that going to be able to protect a city the size of Philadelphia. “The job of the Homeland Security Unit is to prepare the rest of the police department to do that and support them,” Sullivan said. “And should we ever have a major incident occur here, we have officers and supervisors assigned to Homeland Security with very specialized skills that will come and bear upon the problem. Day in and day out, our job is to coordinate that.” Sullivan said the Homeland Security Bureau’s relationship with other law enforcement agencies is critical. He said they enjoy a phenomenal relationship with the Philadelphia FBI. “We have outstanding lines of communication and very strong personal relationships,”

“We often talk about terrorism as the traditional overseas threat, but the reality is that many of the people who have been responsible in recent years for terrorist attacks have been homegrown. That is without question one of the biggest threats facing us as a country,” Ramsey said. “Radicalization takes place in our penitentiaries, on the Internet, and various other places.”


Sullivan said. “For example, we have an FBI Special Agent bomb technician assigned to the Philadelphia Police Department. Although he is an FBI Special Agent, day in and day out, he operates as a Philadelphia Police bomb technician. I get an outstanding bomb technician to add to my capabilities and the agent gets

Sullivan explained that intelligence helps prevent a terrorist act from occurring and that’s why he believes the work being done overseas by the United States military and the intelligence community is so crucial to someone in a position like his. “That information being relayed back to me, or more importantly, those engagements overseas where they are eliminating threats, certainly makes my job

“When something happens overseas, I’m asked if we are going to a heightened state of alert. I say we are always at a heightened state of alert.”

some very valuable experience because we have a busy bomb squad. People are often observing suspicious objects, finding grenades laying out in old houses or soda bombs, so it is a hugely beneficial relationship.” Sullivan also said that Philadelphia police detectives and two detective sergeants are assigned to the Joint Terrorism Task Force, where they operate as FBI agents. “I believe that my most important job is prevention. If something were to happen here in Philadelphia, we have the capability to respond to just about anything, but that means people are already hurt and our city has already been damaged. Our city has been struck,” Sullivan said.

14

incredibly easier. Our relationship with the FBI ensures that I have the intelligence I need to take whatever action is appropriate to keep the city safe.” One of the reasons Sullivan believes they have been successful is that they believe in cross-training. “My bomb techs have gone through basic SWAT school, my SWAT officers have gone through basic IED recognition, and the uniform officers here in Homeland Security have gone through basic SWAT school and IED recognition training,” Sullivan said. “Everyone has to work together. That enables us to be prepared in case we ever have multiple incidents occurring at one time.”

Sullivan said that Lt Edward Baldini at the Homeland Security Unit has founded and continues to coordinate the Mobile Incident Response Teams for the Philadelphia Police Department and for the counties that surround Philadelphia. They train with the regional counties in terms of major incident response, such as a chemical, biological and nuclear incident. “The Philadelphia Office of Emergency Management (OEM) is another key component,” Sullivan said. “We have an outstanding OEM and the director is Sam (Samantha) Phillips. The support she gives to the police department in terms of coordination is invaluable. I would not be able to do my job without it. This job is so much about relationships.” “In this business rank is secondary to competence. I have very competent people here and irrespective of rank when we come together with a problem to solve everyone has equal input. We’re not concerned with the “jewelry” you wear on your uniform. I feel very strongly about this. I have great respect for the specialists that work for me.” Sullivan has been the Homeland Security chief for four years. Previous to that he headed the training bureau and before that he was an inspector assigned to the Northwest division. He also served as an inspector of narcotics, a district captain, and served in SWAT as an officer, a Sergeant, and a LT. Sullivan said the number one security threat is homegrown violent extremists. He fears another Sandy Hook shooting incident, whether motivated by Al-Qaedaor a mentally unstable person. “The reason why Al-Qaedais telling people to just pick up a

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

gun and shoot a lot of people is they know it is easy enough to do,” Sullivan said. “Last Monday we had an emotionally depressed and suicidal individual who attempted to commit “police suicide.” It was only because of the skill of the SWAT officers that deadly force didn’t come into play. He pointed a rapid firearm directly at the officers from a few feet away and they took him down with less than lethal force.” Sullivan stressed the need for public assistance in preventing violent incidents. If someone comes to work in purple hair and talks about violent acts, call the police, he advised. His officers offer presentations at a variety of community and business meetings. Sullivan said that according to reports from the U.S. Secret Service, just the fact that a police officer questions a suspect may prevent him or her from committing a violent act. “When something happens overseas, I’m asked if we are going to a heightened state of alert. I say we are always at a heightened state of alert.” Sullivan said that he is fortunate that Commissioner Ramsey considers homeland security a priority and gives the bureau all the support they need. “I’m pleased with where we are in terms of homeland security here in Philadelphia,” Ramsey said. “I don’t have a thousand people to put into a counterterrorism unit, but we do leverage what we have and we do the best we can,” Ramsey said.

About the Author Paul Davis is a frequent contributor to The Journal of Counterrorism & Homeland Security International.



Shopping Malls And The

Underground Gang Empire By Garrick Ploncynski and Ben Pieper

A member of the “Eastside Crips� flashes gang symbols while arriving at the Bethel A.M.E. church for the funeral of Stanley Tookie Williams in Los Angeles. The 51-year-old Williams co-founded the Crips gang and was convicted for murder, but advocated against gang life after he was sent to prison. He was put to death by lethal injection December 13 after California Governor Arnold Schwarzenegger refused to commute his sentence. REUTERS/Lucas Jackson

16

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


F

or decades enclosed shopping centers and malls have been social gathering places for people of all ages. Malls provide an inclusive shopping experience for everyone, a shelter from the elements, and an escape from daily living through the fantasy of window-shopping. Whether bargain-hunting for back to school clothes, beating the last minute holiday rush, or just looking for a few odds and ends, there is not much you cannot get at a mall. With the construction of everlarger retail centers, malls have become places to enjoy a nice time with friends, grab lunch in the food court, or maybe even find a new love interest. You can even have your significant other’s initials embroidered on a plush new robe while you catch a movie at the attached theater! Yet in many cases, there is another side to all the happy shopping and carefree social gathering that most people never notice. There is a dark and dangerous element that stays to the periphery, lurking by a concessions stand, playing video games in the arcade, even sitting in the parking lot. That element is local street gangs. Gangs creep and slime their way into communities undetected until they are far too big to eradicate. And these street gangs use local malls as breeding grounds. It is here in your mall that gangs are recruiting, marking their territory, selling narcotics and controlling the community’s black market. Gang members like to go to the mall for almost all of the same reasons as good law abiding citizens do. Gang members like to gather in social places, eat food, play video games, watch movies and pursue members of the opposite sex. Yet there is one considerable difference; gang members are seldom at the mall to shop… Gang members could care less about the huge Presidents Day sales throughout the mall, or the buy one get one half off at Sleepys. No, in the end gang members are there for one thing and one thing only: to expand their criminal enterprise. Street gangs sneak into the mall, undetectable to the untrained eye, by using the power of numbers. They strategically place gang members and graffiti in and around the mall so that

other gangs and youth know who is in control of that area, slowly driving away competition as they solidify their hold on a given community. Gang members know that for them to thrive and exist they need to rule by fear and intimidation; they also know that they need to have a constant supply of youth to recruit from to stem the attrition caused by arrest and violence. The reality of gang life is that it’s not very long. The majority of gang members spend a great deal of time in jail or prison, or end up dead. They need the malls and their seemingly endless inflow of youth to fill their ranks. Gang members easily use the excitement of a fast paced life style, drugs, alcohol, fast money, and sex as recruiting tools. And don’t think a facility can be too upscale for recruitment. Many gangs do, of course, solicit members from impoverished locations. Yet middle class kids are no less susceptible to the manipulation and glamour depicted by gangs in any region. If this behavior goes untreated in any mall for long enough, the likelihood of gang-related violence becomes critical.

Gang members know that for them to thrive and exist they need to rule by fear and intimidation; they also know that they need to have a constant supply of youth to recruit from to stem the attrition caused by arrest and violence. The reality of gang life is that it’s not very long.


Looking back in history we can see a number of incidents where gang conflicts at malls have cost many people their lives, and not only those of rival gang members. In many cases these types of incidents may have been prevented if mall security had known what to look for, and taken a proactive approach to securing their facility before things got out of control. • On March 5th, 2012 at the Market Place Mall in Champaign, Milwaukee a gang related drug deal nearly turned fatal when

These are just three examples of gang related shootings that occurred in malls in 2012. This is not even to say of the countless incidents of non-lethal fights, assaults, thefts and other crimes that happen in and near malls on weekly bases. With the proper training, many of these incidents may have been prevented, and many more may yet still. One of the first steps mall owners and security personnel can take to mitigating the risks of gang-related violence is to get trained on common gang related identifiers. Mall security should have a database or file system to track and monitor gang members and gang related activity in their mall. This kind of in-

Gang members spend countless hours hanging out at local retail spaces. This gives mall security great opportunities to document which gangs are hanging out together and how they are adapting their style of dress and communication to hide from law enforcement. Enhancing a facility’s relationship with law enforcement, besides being a gratifying addition to local safety, is an essential component of securing malls from violent external threats. After this relationship has been organized, the next step for mall security is to implement a “no tolerance” policy across all affiliated property. For example,

very violent lifestyle and often times carry weapons with them or have them stowed nearby. Keeping gang members out of the mall and off the property is the best policy to have. To do so, you have to be able to spot them. Malls in America are a social symbol, a safe haven for teenagers, a place for first dates and evening strolls. Don’t let your facility be tarnished by a tragedy or become a gathering place for gangs preying on your community’s youth. Train your security, learn how to build a better relationship with law enforcement, and get SMART about retail safety.

Malls in America are a social symbol, a safe haven for teenagers, a place for first dates and evening strolls. Don’t let your facility be tarnished by a tragedy or become a gathering place for gangs preying on your community’s youth.

shots were fired. Police responded and engaged in a shoot out with the suspect. • On September 8th, 2012 at the Towson Town Center in Towson, Maryland a prospective gang member for the Black Guerrilla Family fired six shots at two innocent civilians as they were exiting the mall, leaving one dead. This was his initiation into the gang. • On January 27th, 2012 at the Central Valley Shopping Mall in Bakersfield, California rival Norte 14 and SUR 13 gang members were involved in a shooting leaving two men wounded.

18

formation can be useful to law enforcement out on the streets, and will aid in both preventing and investigating violence, even that which does not take place in a shopping center. Many incidents that occur on the streets are linked to a fight or conflict that was initiated at a local mall. One such example was the 2006 murder of Saul Herrera in Bradenton, Florida that was traced back to a disagreement between rival gang members at the Desoto Mall just hours before his murder. It is very important for mall security to have a good working relationship with local law enforcement agencies.

have signs posted on all the entrance points and throughout the mall that gang related activity and clothing will not be tolerated. The proper training will also assist shopping center security in interacting with gang members. Gangs want and need to have full access to the mall; that is why you do not frequently see them walk in twenty or thirty deep, all wearing the gang’s colors. The police would be there immediately and they would have to leave the premises. Yet even when gang members are not all wearing distinguishing colors from head to toe, they still need to be removed from the mall. Gang members live a

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

About the Authors Garrick Ploncynski is co-founder of All Is One International, LLC, which provides consulting for law enforcement agencies in long-term R.I.C.O. cases and instruction to law enforcement and civilians on gang related and active shooter situations. In 2008, Mr. Ploncynski was the Florida Gang Investigators Association (F.G.I.A.) award recipient for the “Gang Investigator of the Year” Ben Pieper is co-founder of All Is One International, LLC. In addition to serving in the Marine Corps and in law enforcement, Mr. Pieper was the 2010 “Florida Gang Investigator of the Year.” For more information about preventing gang violence in your shopping center, please contact Security Management International about the “Shopping Mall Assessment and Response Training” (SMART) course at training@smiconsultancy.com.



Domestic Terrorist Or Lone Nut?

Deciphering Christopher Dorner’s Rampage By George Michael

La Palma Police and US Marshals provide security outside the home of Christopher Dorner’s mother while investigators work serving a search warrant in La Palma, California February 8, 2013. Authorities continued their manhunt for the fired policeman Christopher Dorner who is suspected of gunning down five people, killing three and declaring an all-out war on police officers and their families in a rambling internet manifesto. REUTERS/PATRICK FALLON (UNITED STATES - Tags: CRIME LAW)

20

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


A

t a press conference held on February 10, 2013, the Chief of the Los Angeles Police Department, Charlie Beck, accused an exofficer, Christopher Dorner, of domestic terrorism and announced that a $1 million reward—the largest ever in Southern California— was offered for information leading to his capture. A week earlier, Dorner commenced a one-man rampage which left four dead and four others wounded. His campaign of violence could presage some worrisome developments in the lone wolf terrorism trend. Employing the social media, Dorner was able to reach out to the online community and gather a considerable amount of support.

Dorner, Thursday, Feb. 7, 2013. AP/Damian Dovargane, HUFFINGTON POST

Los Angeles police Chief Charlie Beck, right, comments on fired officer, Christopher

In his online manifesto posted put him on his violent trajectory. on his Facebook page, Dorner On July 28, 2007, Evans and described himself as an honorDorner responded to a disturbance able man who was forced to take at a Doubletree Hotel, where they action to clear his name. A Navy found the suspect, Christopher veteran, who by his own account Gettler, a diagnosed paranoid held a top secret clearance, he schizophrenic, who refused to laced his manifesto with military comply with their instructions. jargon vowing to wage “unconDorner accused Evans of kicking ventional and asymmetrical warGettler three times, twice to the fare” against the police and their head, including a swift blow to families. How did a seemingly the eye, after he had already been ordinary man become the subject restrained. Gettler subsequently of one of the largest manhunts in gave a video testimony in which LAPD’s history, spanning two he backed up Dorner’s version of states and Mexico? Dorner’s events, but because of his mental biography suggests that he was condition, the testimony was ruled a highly-motivated 33-year-old inadmissible. man who found his calling in law enforcement. In 2001, the Troubled by the incident, a native Californian received a BA in Political Science and a minor month later Dorner mentioned it to his superior officer Sergeant in Psychology from Southern Utah University, where he played Leonard Perez who instructed Dorner that by law, he must file a running back for the college football team. Early the next year, he police misconduct report. The timing of his report suggested to joined the Naval Reserves, eventually attaining the rank of Lieuten- some that it was in retaliation for a supposedly bad performance ant (O-3). During his military career, he received numerous medals review he received from Evans who gave him a “satisfactory” and commendations. Seemingly a man of integrity, as a student at evaluation, though she noted that he needed to improve in three Vance Air Force base in late 2002, a newspaper reported that he and areas. An internal review board investigated his claims, but a military colleague returned a bag from a local Korean church found unanimously ruled against Dorner, deciding that his allegations in the middle of the road, which contained nearly $8,000, to the Enid lacked credibility and were motivated in part by what he felt Police Department in Oklahoma. In 2005, Dorner joined the LAPD, was a poor evaluation which could undermine his police career. but not long after completing his academy training in 2006, he was In theory, Dorner could be legally fired for filing a false police called up for a year of active duty misconduct report, even if in the Persian Gulf as part of the it were true, and as a conseBush administration’s “Surge” in quence, of the dismissal of his Dorner accused Evans of kicking Iraq. He returned to the LAPD in complaint, he was relieved of the summer of 2007 and was placed duty on June 26, 2008 and ofGettler three times, twice to the head, into the field with a training officer, ficially terminated on January including a swift blow to the eye, after Teresa Evans. 2, 2009. Enraged by the decision, Dorner filed a writ of he had already been restrained. One particular incident, which mandamus with the Los AnDorner recounts in great detail, geles County Superior Court, loomed large in his life, and if his but in 2010, Judge, David P. account is to be believed, ultimately Yaffee, upheld the decision


to fire Dorner. Dorner appealed to the California Court of Appeal for the Second Appellate District, but on October 3, 2011, it upheld the lower court’s decision. Under tremendous pressure, he reached the breaking point. Manifesto

Senator Dianne Feinstein for her efforts in the area of legislation. Conversely, he heaped scorn on the NRA chairman Wayne LaPierre, wishing that “all of [his] immediate and distant family [would] die horrific deaths in front of [him].” Despite his apparent liberalism, Dorner expressed support for numerous Republicans, calling George H.W. Bush his second favorite president who epitomized service to his country. He also said good things about New Jersey Governor Chris Christie opining that he would make a fine candidate in the 2016 presidential election. And he lamented that his favorite candidate—Jon Huntsman—failed to receive his party’s nomination in the last Republican primary election.

Dorner’s manifesto depicts a man driven by frustration with the LAPD and the judicial system. In it, Dorner justified his “drastic and shocking actions” as a “necessary evil” to in order to effect change in the LAPD and clear his name. Often rambling, the manifesto explained in detail his reasons for his attacks and the The fact that Dorner’s campaign grievances that spurred him on. resonated with so many in the AfricanHe recounted his experiences with racism both in elementary American community suggested to school and in the LAPD. He was some observers that police abuse was a quick to retaliate to racial insults. common feature in contemporary urban Dorner accused his fellow police officers of inflicting some of the America even after the reforms initiated vilest things on people that he had in the LAPD after the Rodney King affair. ever witnessed. He excoriated officers of all races in the LAPD. White officers were condemned for victimizing minorities. Black officers in supervisory grades were criticized for mistreating white subordinate officers, thus perpetuating the cycle of racism in the department. Hispanic officers drew his ire for victimizing new immigrants of their own ethnicity. And Asian officers were disparaged for standing by throughout all of this and saying nothing. To Dorner, all were “high value targets.”

The last pages of Dorner’s manifesto were peppered with references to popular culture. For instance, he expressed dismay that he would not be alive to see the upcoming film World War Z and the third season of the television program The Walking Dead. He called Charlie Sheen “effin awesome.” In closing, he defended the comedienne Bill Cosby’s occasionally blunt criticism of the African-American community encouraging him to continue so that blacks could make greater progress in America. Supporters

Despite the seeming innocence of his victims, Dorner attracted much online support. His campaign obviously touched a nerve with a large segment of the online African-American community. Scores of Facebook pages have Despite his grievances against been created in support of him. This undated photo released by the Los Angeles Police Department shows suspect Christopher Dorner, a former Los Angeles officer. Dorner, who was fired from the LAPD in 2008 for making false statements, is the LAPD, Dorner was neither As of March 2013, two such linked to a weekend killing in which one of the victims was the daughter of a former police captain who had represented him during the disciplinary hearing. Authorities believe Dorner opened fire early Thursday on anti-government nor anti-Amerpages—“We Stand with Chris police in cities east of Los Angeles, killing an officer and wounding another. Police issued a statewide “officer safety warning” and police were sent to protect people named in the posting that was believed to be written ican. In fact, he proclaimed Dorner” and “We Are All Chris by Dorner. (AP Photo/Los Angeles Police Department) , HUFFINGTON POST himself a supporter of the fedDorner—received more than eral government and called for 27,000 and 5,000 “likes” respecthe revocation of CNN’s Fareed Zakaria’s citizenship because tively. To many of his supporters, Dorner was a proud man who he never said “a positive word about America.” His politics is backed in a corner, decided to go out fighting. In cyberspace, difficult to pigeonhole. On the one hand, his manifesto praised some of his admirers affectionately referred to him as “The Real leading Democratic politicians and espoused liberal positions. He Django”—a reference to the protagonist in a violent, but popular, defended Barak Obama against those who impugn the authenticity film—Django Unchained—in which a freed black slave carries of his American birth certificate and expressed satisfaction over the out a campaign of revenge against white villains. The fact that election of the nation’s first black president. Vice President Joe Dorner’s campaign resonated with so many in the African-AmerBiden was heralded as “one of the few genuine and charismatic ican community suggested to some observers that police abuse politicians.” He identified Bill Clinton as his favorite president was a common feature in contemporary urban America even after and hoped that Hillary would follow her husband’s footsteps in the reforms initiated in the LAPD after the Rodney King affair. 2016. Defending gay marriage, he admired Ellen DeGeneres for changing the perception of the gay community. He urged women In a bizarre tribute, someone from the online gaming community— in the military to press for their right to serve in combat roles. With 4chan—created a video game dubbed “Chris Dorner’s Last Stand.” no apparent sense of irony, he defended gun control and praised Modeled after the popular 1990s game “Doom,” the “Last Stand”

22

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2



In the final days of his life, Christopher Dorner became many things to many different people. For some, he was a hero who stood up to the LA Police Department. For others, he was a crazy black man hell bent on murdering cops. Various parties decoded his manifesto through the prism of their ideologies. Some elements of the Occupy movement held a demonstration in his honor. A Mexican crooner composed a ballad titled “El Matapolicias” or “The Police Killer,” with lyrics paying homage to Dorner. In general, representatives of the political left did not overtly defend his rampage, but nevertheless discussed the merits of his manifesto and refrained from leveling ad hominem attacks against him. For instance, writing on Nsfwcorp.com (Not Safe for Work Corporation), Mark Ames explained how Dorner’s campaign exemplified the dismal affairs of workers’ rights in contemporary America. Drawing parallels between Dorner and historic examples of political violence, Ames pointed out that rebellion against injustice was rarely clean and cinematic, noting that Nat Turner, who led a slave rebellion in the Antebellum South, killed what could be called innocent and defenseless victims, including white women and children in their homes and in their beds. The left-wing online magazine, Jacobin, noted that Dorner’s rampage was the result of “a society gone mad on racism and war, of a state that aggressively punishes dissent, of an intellectual milieu where telling the truth has become a dangerous act.” Even some representatives of the extreme right white nationalist movement expressed a grudging admiration for his rampage. For instance, on his online Radio Free Northwest program, Harold Covington, opined that “one crazy nigger with a gun” was straining the LAPD’s “available manpower to the breaking point.” Through his various lectures and political novels, Covington seeks to build a Northwest Volunteer Army (NVA) which will someday wage a war of secession for a white nationalist state in the Pacific Northwest. To Covington, the Dorner affair demonstrated that if one man who was not afraid of the police and was willing to act could paralyze the government, then a serious insurrectionary movement in the style of the Provisional IRA could mount a successful separatist campaign in 21st century America. Similarly, writing on the white nationalist website, Occidental Observer, Kevin MacDonald opined that the most important lesson to be taken from the whole episode was that one man could wreak absolute havoc on the system. He speculated on the consequences if 100 or 1,000 well-armed, well-trained men followed suit. According to MacDonald, Dorner’s manifesto revealed an LAPD as a sort of racial dystopia in which there is “a war of all against all, where racial identity is everything.” This reinforced the lesson that “multiculturalism leads to greater conflict.” Last Stand On February 3, Dorner commenced his campaign with the cold-blooded murders of Keith Lawrence, an African-American police officer in the University of Southern California Public Safety Department, and his fiancé, Monica Quan, an Asian-American and the daughter of a retired LAPD captain, who later became an attorney. During his review board hearing with the LAPD, Randall Quan represented Dorner. In his manifesto, Dorner blamed Quan for not mounting a serious defense, lamenting that he “never had the opportunity to have a family of [his] own” so that he would terminate Quan’s. To

24

Corona, Calif., Police officers stand near the site of a police shooting Thursday Feb. 7, 2013 in Corona, Calif. AP/Nick Ut , HUFFINGTON POST

is set in a cabin in the woods where the player shoots police officers and replenishes his health by consuming buckets of Kentucky Fried chicken. A background song repeats the N-word along with a recording of Charlie Sheen’s (whose picture appears in a wall in the cabin) public plea for Dorner to end his rampage. Finally, the player must confront a terminator style figure resembling Arnold Schwarzenegger. Although some observers dismissed video game as an example of “cyber racism,” its style suggests that is was intended to appeal to black grievances and not white racism. All of the officers in the game are white. Moreover, the numerous exclamations of the N-words in the game are not unlike those that can be heard in hip hop music which is popular in the black youth culture.

make matters worse, six days after the murders, a man claiming to be Dorner called Quan and chastised him for not doing more to protect his daughter. Reportedly on the night of February 6, a man matching Dorner’s description attempted to steal a boat from a San Diego marina. An 81-year-old man was found tied-up on the boat but not hurt. Just hours later, Dorner opened fire on two LAPD officers in Corona after they began following his pickup truck. Shortly thereafter, Dorner ambushed two Riverside police officers at a traffic light, injuring one and killing the other. Later that same day, authorities found the smoking wreckage of his Nissan Titan in the woods of the Big Bear Lake which triggered a massive search in the area. Tensions were high during the ordeal. As officers patrolled a Torrance neighborhood to guard a target from Dorner’s manifesto, they opened fire on a car that they mistakenly identified as Dorner’s, injuring two civilians. A joint task force composed of the Los Angeles, Irvine, and Riverdale police departments, as well as the FBI and the Marshalls Service, was formed to track down Dorner. Approximately 10,000 officers were involved in the manhunt. Rumors circulated that the federal government even authorized the use of predator drones to take him out, but U.S. Customs and Border Protection denied the allegation. Expressing empathy for Dorner’s frustration, the prominent civil rights activist, the Rev. Jesse L. Jackson, issued a public plea for Dorner to “stop spreading the pain, the hurt, and the fear.” Likewise, the popular actor, Charlie Sheen, recorded a video plea in which he thanked Dorner for the “kind words” for him in his manifesto and urged Dorner to call him so that they could “figure out together how to end this thing.” Upon entering what they thought was a vacant unit, Karen and Jim Reynolds, the owners of the Mountain Vista Resort, found Dorner hiding inside. Dorner tied the couple up and stole their purple Nissan, but throughout the incident, he maintained that he had no intention of hurting them, as his dispute was solely with the LAPD. After he fled, the Reynolds managed to free themselves and call 9-11 on a cell phone that Dorner left behind. Soon thereafter, game wardens spotted Dorner tailgating a school bus on Highway 38, presumably as protection against spike-strips that police might deploy. Dorner fired at the warden, blowing out the window of the warden’s vehicle and narrowly missing his head. After losing the wardens in an ensuing chase, he crashed into a snow berm. A short time later, he carjacked a truck, but allowed its owner to walk away unharmed. Throughout his rampage, Dorner was magnanimous to those victims he encountered that were not his designated “targets.” In the end, Dorner hunkered down in a cabin in the snowy mountains near Big Bear, which ironically was very close to the manhunt command post created to capture him. On February 13, the authorities had finally tracked him down.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


Initially, officers lobbed conventional tear gas into the cabin and a standoff ensued. At one point Dorner re-emerged amid the smoke to exchange more than 100 rounds of fire during which a San Bernardino County deputy was killed and another was seriously injured. After Dorner made clear his refusal to surrender, officers launched pyrotechnic gas canisters, a more intense weapon known to start fires. Some people who listened to the audio of the police radio transmissions inferred that the officers deliberately set the cabin on fire as a tactical strategy to kill or smoke out Dorner. For their part, authorities maintained that the fire was not intentionally set. An autopsy conducted after the standoff suggested that Dorner died from a self-inflicted gunshot wound to the head. Conclusion The rise of the new media has ushered in a new era of communications which allows much greater and broader participation from users, not only in the spheres of commerce and social networking, but terrorism and insurgency as well. Recent episodes of lone wolf terror illustrate this trend. For instance, shortly before his bombing attack and shooting spree in Norway, Anders Behrig Breivik uploaded on the Internet a 1,500-page electronic book—2083: A European Declaration of Independence—in which he railed against the Labor Party’s liberal immigration policies. Despite episodes of sporadic violence, some observers dismiss the lone wolf trend as primarily a nuisance: It poses no substantial or existential threat to the nation, they say, and is more aptly consigned to the field of abnormal psychology. For his part, Dorner conceded that he was under severe depression going so far as to suggest that his brain should be preserved after his death in order to study the effects of severe depression on the brain. Nevertheless, even persons who may have psychological problems can commit acts of violence motivated in part by political ideologies. In

fact, they may prove to be most susceptible to extremist exhortations to violence. After all, people with a stake in the system, who have something to lose, may be less likely to risk death or a long prison sentence. In his own words, Dorner exclaimed that he had “nothing to lose,” a trait, he averred, was behind the successful guerilla movements that have bedeviled the U.S. military over the years, including al Qaeda, the Mahdi Army, and the Viet Cong. Although Dorner was driven by personal grievances, he could not resist framing his rampage in quasi-political terms. The growing popularity of the new media and their expanding set of platforms—including blogs, web forums, Facebook, Twitter, and YouTube—have democratized the creation, publication, distribution, and consumption of information. To be sure, this development has enriched our lives in many ways, yet now any person with a grievance can use these platforms in conjunction with violence as a method to bring dramatic attention to his cause. In one sense, Dorner succeeded in that LA Police Chief Charlie Beck announced that the department would reopen the case which he referenced in his manifesto. After his death, protestors gathered outside of the LAPD headquarters to show support for Dorner. Although most did not publicly condone his methods, they nevertheless empathized with his grievances against police misconduct and racism. Judging by the level of online encouragement he received, Dorner’s rampage could be a harbinger of more mayhem to come as more and more disaffected lone wolves resort to violence to get their messages out to a large audience. About the Author George Michael is an associate professor of criminal justice at Westfield State University in Massachusetts. Previously, he was an associate professor of nuclear counterproliferation and deterrence theory at the Air War College in Montgomery, Alabama. He is the author of five books, most recently, Lone Wolf Terror and the Rise of Leaderless Resistance (Vanderbilt University Press, 2012).

Go inside the most dangerous organizations in the world. TRAC is a comprehensive, authoritative online resource for terrorism research and news. With profiles of over 4,000 terrorist groups, lone wolf operatives, and vulnerable regions, as well as real-time news alerts, original expert publications, and cross-reference links TRAC provides in-depth analyses of key issues, groups, individuals and events.

See for yourself. Sign up for a 30-day trial at www.researchingterrorism.org


Is Africa The Next Afghanistan? By Danny Dickerson

Tunisian police officers and security personnel demonstrate in Tunis January 31, 2013. Thousands of policemen protested outside the Tunisian prime minister’s office on Thursday demanding better pay, equipment and protection, as the birthplace of the Arab Spring faces a growing security threat from radical Islamists. REUTERS/Zoubeir Souissi

26

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


T

he United States will certainly control the Horn of Africa, and therefore we must establish ourselves in the Horn of Africa close to the Arabian Peninsula.

Africa is a continent that has frustrated foreign forces for over a hundred years and is proving to be an ideal breeding ground for terrorists and transnational organized crime, and may prove to be fertile grounds for Al-Qaeda and the growth of Fundamentalism as it shares many of the social, economic, and political conditions as the Middle-East i.e. lawlessness, poverty, civil war and its very size. North Africa has long been a dormant backwater for Al-Qaeda, but events of the past two years indicates that this region has become Al-Qaeda’s new battleground; the Maghreb – Algeria, Libya, Mauritania, Morocco and Tunisia – as well as adjacent parts of the Sahel – Chad, Mali and Niger – have emerged as new breeding grounds for Islamic extremists. Further, the dramatic and unprecedented “Arab Spring” that began in Tunisia (Jasmine Revolution), continued in Egypt and led to the civil war in Libya has allowed Al-Qaeda affiliates to take advantage of the turmoil and gain new footholds in the Sahel, Sinai, Yemen, and Syria. Ansar al-Sharia (Partisans of Islamic Law), part of Al-Qaeda in the Maghreb (AQIM), was responsible for the attack on the U.S. embassy in Benghazi. Al-Qaeda and its affiliates have been involved in attacks on U.S. embassies in Egypt, Tunisia, Yemen, and Libya. What follows is a synopsis of the current situation in Africa and how leaders in Europe and the U.S. cannot focus on just the events in North Africa, but, for reasons of national security, must concentrate on how Al-Qaeda and its affiliates are expanding, unchecked, throughout Africa. Libyan dictator Col. Qaddafi warned that if he fell, chaos and holy war would overtake North Africa. The West is bearing witness to his warning as the toppling of the dictators in Libya, Tunisia and Egypt has come at a high price. The unintended consequences of the Arab Spring are sweeping across the face of Africa and have caused leaders throughout the Middle East and Africa to question America’s steadfastness.

“Sudan is an ideal position for launching attacks on Egypt, Israel, and Saudi Arabia.” In 1991, Sudan became the springboard for the export of Fundamentalism throughout the Arab nations and Africa. Today, Sudan is a terrorist safe haven with at least five active training camps: three are in Khartoum (one of which is limited to Sudanese Islamists), one in Southern Sudan, the location of the other camps are unknown at this time. In all of the known camps, students are from Pakistan, Iraq, Iran, Indonesia, and Europe. North Africans, but particularly Algerians, have been the most active component of the Al-Qaeda network in Europe. In January, 2003, terrorist links to Algeria were discovered in Great Britain, following the discovery of the poison “ricin” during a police raid on a suspected terrorist hideout. This group has formed close ties with the Armed Islamic Group (GIA), and, with bin Laden’s help, had developed international logistics for the smuggling of weapons, ammunition, and funds into Algeria.

“We cannot exaggerate the threat. The terrorist threat in Morocco and the Moroccan community in Europe is real.” With the breakup of cells belonging to Jama’at al-Tawhid wal-Jihad bil-Maghrib (the Monotheism and Jihad group in Morocco), Moroccan Intelligence has learned the in-roads Al-Qaeda has made into their country and the continent of Africa. From testimony from an arrested Belgian Mohamed R’ha, AlQaeda has restructured its organization in Saudi Arabia and set up affiliate organizations throughout Africa, establishing cells and uniting them with North Africans residing in Europe. The African influence


has already been felt in Europe. The Moroccan terrorist group, Salafiyyah Jihadiyah, was directly involved in the Madrid train bombings. The Moroccan Islamic Combat Group, which was responsible for the attacks in Casablanca in May, 2003, has actively recruited volunteers to join al –Zawahiri’s group, Tawhid wal Jihad (Unity and Holy War), to fight in Iraq. These volunteers are establishing connections with other insurgents (mainly Europeans), sharing training and combat experiences. Authorities in Italy, France, Belgium, Germany, and the Netherlands have broken up terrorist cells composed of Moroccan immigrants. Tunisia was the cradle of the Arab spring and remains one of the top exporters of jihadists per capita. Long before Tunisia ousted its dictator, it had the dubious distinction of exporting Islamic militants, and today, the flow of militants is getting worse. Yemen is grappling with Al-Qaeda’s affiliates and Shi’ite rebels in the north as well as separatists in the south. Yemen’s location, flank-

of fourth generation warfare where it would be stateless, borderless and without defined military fronts. This is the Modus Operandi of Al-Qaeda: an asymmetric war by non-state actors against the conventional methods of Western armies. In Africa, Al-Qaeda is a borderless movement that does not rely on a one-dimensional front line of war: it strikes targets where the measure of success is high, uses selected segments of society as recruits and establishes itself in fragile nations with porous borders.

“Africa is unfortunately the world’s soft underbelly for global terrorist.” J. Peter Pham, director of the Michael S. Ansari Africa center at the Atlantic Council, stated that Africa is proving to be one area where Islamist terrorist groups in general, and groups affiliated with Al-Qaeda in particular, are expanding, both in terms of operational capacity and lethal action.

Al-Qaeda has established close ties with al-Ittehad-i Islami (AII), the United Front for the Liberation of Western Somalia (UF). Al-Qaeda offers training to terrorists in UF camps, and uses foreign trainers (current estimates are from 200-400) from Pakistan, Chechnya, Sudan, Kenya, Tanzania and other countries. ing top oil producer Saudi Arabia and major shipping lanes have made restoring its stability an international priority. Iran is working with southern secessionists in Yemen to expand Tehran’s influence and destabilize the strategic region around the Straits of Hormuz. Mali, with its vast northern areas of poverty, corruption and no sign of government services, has allowed Al-Qaeda to develop a new sanctuary and to establish training camps. Presently, Al-Qaeda affiliates control north Mali while the Mali government has a thin grip on the south. The fall of Mali would directly threaten neighboring Niger, then Nigeria. Al-Qaeda cells in Somalia, Ethiopia and Sudan, taking advantage of the West’s preoccupation with the events in Mali, could join forces and push east with the intention of meeting with terrorist groups coming from Mali. If Al-Qaeda was able to become safely entrenched in this region, the rest of North Africa would easily fall to radical Islam. As the Dutch Foreign Minister stated with the opening shot in Mali “There is not one European country that can hide if this threat would present itself to the European continent.” This is especially true of AQIM, whose links to Maghreb diaspora communities in Europe allow it to carry out attacks in Europe. Although French forces have regained control of most of northern Mali, Al-Qaeda and its affiliates have proven to be difficult to uproot as they have retreated over the borders of a neighboring country, where they can regroup and continue waging war. Al-Qaeda strategists realized that its’ forces would be no match against the combined military and intelligence forces of the West in a conventional third generation war. Al-Qaeda adopted the concept

28

In June, 2006, Sada al-Jihad (Echo of Jihad) publication #7, published an article by Abu Azzam al-Ansari on waging jihad in Africa. The article, Al-Qaeda is moving to Africa, proved to be prescient; several months after publication, Ayman al-Zawahiri announced the merger of Al-Qaeda and the Algerian based Salafist Group for Preaching and Combat. This union was to be known as Al-Qaeda in the Islamic Maghreb (AQIM) and offered Al-Qaeda inroads into the African continent extending to South Africa. Al-Qaeda has established close ties with al-Ittehad-i Islami (AII), the United Front for the Liberation of Western Somalia (UF). Al-Qaeda offers training to terrorists in UF camps, and uses foreign trainers (current estimates are from 200-400) from Pakistan, Chechnya, Sudan, Kenya, Tanzania and other countries. Working with AII, Al-Qaeda has established training camps in Kenya at Raas Kiamboni, where East Europeans from Chechnya are providing the training staff. “In May, 1999, Al-Sharq Al-Awsat reported that Al-Qaeda was setting up a camp near the coastal town of Raas Kamboni and was installing sophisticated communications equipment.” Training camps have been established in the region of Gedo, near the border of Ethiopia, for the purpose of providing support to the Eritrean Islamic Jihad through which weapons are supplied to Al-Qaeda operatives in Kenya. Sierra Leone has a history of harboring Islamic militants. Hezbollah was the first terrorist organization to establish itself in this region, when the PLO, in 1986, established a training camp on an island off the coast of Freetown. In Sierra Leone, 60%

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


of the population is Sunni Muslim, the government is corrupt, and the industries and territories are almost completely unregulated, which has created an environment where today’s terrorists can operate with almost total impunity. The Lebanese merchants have served as the link between the radical Islamists in Sierra Leone and Hezbollah and Al-Qaeda. These two terrorist organizations have used their contacts within the Lebanese population to acquire fake identification, travel documents, and funds. The situation in North Africa illustrates how the seeds of radical Islam can drift into failed or failing states that remained absent from the attention of Europe and the U.S. The terrorists in Africa, like their counterparts in Europe and the United States, have established a working relationship with the criminal networks throughout Africa and Latin America. The terrorists obtain weapons and explosives through the same channels that lead to the drug trade and use the same experts to obtain counterfeit passports, identification, and travel documents. This cooperation has also allowed the terrorists to gain information and access to restricted areas in Africa, Europe and the Middle East. Rudy Atallah, former counterterrorism director for the Pentagon, stated “AQIM poses a growing danger to the whole of Africa and beyond. AQIM is the wealthiest AQ affiliate in the world, with $90 million to $120 million between ransoms and drugs.”

“The same networks that arms trafficking, the use of mercenaries, and illegal human trafficking often provides the means for terrorism.” Al-Qaeda has used West Africa to protect and expand its finances. Liberia is the center of Al-Qaeda’s operations in West Africa. In GuineaBissau, Al-Qaeda has been working with Colombian drug cartels to handle movement of drugs from West Africa to Europe. Al-Qaeda has been actively involved in the mining and processing of uranium. In Shinkolobwe, Congo, the uranium is illegally mined, and in Likasi, the ore is processed and the end product is smuggled into Zambia for shipment to parts unknown. Kenya is the regional hub for most financial and business elements of Al-Qaeda. Their center of operations is in Nairobi, with the military components of Al-Qaeda in the port of Mombasa. The Cote D’Ivoire is the hub of Hezbollah’s African fundraising operations. In Sierra Leone, Hezbollah controls about 90% of the gold and diamond production, plus their exports.

From the Northern portion of Africa, Al-Qaeda has expanded to Zimbabwe. This nation is the trans-shipment point for marijuana, cocaine, and heroin, as well as blood diamonds from Sierra Leone and the Democratic Republic of Congo. Zimbabwe is the center of “off-shore” documentation forgery, and Zimbabwean authorities are profiting from Al-Qaeda’s criminal activities. Ayman al-Zawahiri has visited this country several times for the purpose of establishing training camps, with one known camp in Mashonaland. Zimbabwe also has proven beneficial as it has air-links to major Western cities, and acts as a “way-station” for the AQIM to transport terrorists from the Persian Gulf to Cape Town. Organized crime syndicates from Ghana and Nigeria, working with Al-Qaeda, are firmly established in Zimbabwe and are engaged in drug smuggling, slavery, vehicle theft, counterfeiting, and 419 scams (advanced fee swindles). The attack on the U.S. Embassy in Dar es Salaam brought to the world’s attention that Fundamental Islam was spreading further into southern Africa. Tanzania is proving to be the East African beachhead for Al-Qaeda. This nation possesses porous land and sea borders; its government is weak and corrupt and organized crime has become firmly established. These criminal groups are involved in, among others, weapons trafficking, drug smuggling, and money laundering, which are all the modus


operandi of Al-Qaeda. It is situated close to Yemen and the United Arab Emirates (UAE), which are known Al-Qaeda logistical points. Firmly entrenched in North Africa, moving into central Africa, South Africa is now becoming one of Al-Qaeda’s major destinations. In May, 2004, South Africa arrested several Al-Qaeda suspects “who had evil intentions against this country.” Authorities in South Africa are beginning to understand the extent of Al-Qaeda’s presence in their country. The presence of radical Islam in South Africa began with the organization People Against Gangsterism and Drugs (PAGAD). Although its founders have stated that it was created with the intention of stopping the drug trade in townships around Cape Town, it was learned that its real intention, with the help of Al-Qaeda, was to inject radical Islam into South Africa. This organization, with the help of Hezbollah, has spread its influence as far North as Zaire and Senegal, and is affiliated with the Karballah Foundation for Liberation.

impacts on geopolitical relations” in coming years. While the West concentrates on the Middle East, our enemies are insuring that that our future supply of energy will not be available, and oil is to a nation what blood is to the body. Former President Bush acknowledged that Northern Africa was critical in the war on terrorism and offered economic and military assistance. What is troubling is Washington has ignored other, less visible threats of Al-Qaeda activity in Central and Southern Africa. While northern Africa (Sudan, Eritrea, Ethiopia, Somalia, Djibouti, Uganda, Tanzania, and Kenya) have become a new haven for AlQaeda, terrorist cells have spread as far away as South Africa. The threat from Africa has already been felt around the world. Many of the suspects arrested in the Madrid train bombings were Moroccan immigrants, with the terrorist group Salafiyyah Jihadiyah directly involved in the Madrid bombings. In Iraq, 25% of the foreign fighters captured have come from Africa. A growing number of terrorists from northern Africa are joining Abu Musab al-Zarqawi and, like

Africa could well be at the boiling point, and America’s security, its very existence could be at risk. Russia is selling arms to Al-Qaedaand its’ affiliates in Africa. While China is directly involved in the affairs of every oil producing country in Africa, and assisting Iran in supporting AlQaeda and its affiliates throughout Africa. Within South Africa, Al-Qaeda, al-Aqsa Foundation, Hamas, Hezbollah, the Kurdistan Workers Party (PKK), and Liberation Tigers of Tamil Eelam (LTTE) have established their presence and are working in cooperation with one another. South Africa has organized crime syndicates dealing in counterfeit goods, credit card fraud, weapons, diamonds, slavery, prostitution, and narcotics. This, in turn, has become a profitable base for Al-Qaeda to raise money, recruit new members, and provide logistical support for attacks, not only in the West, but in the Middle East as well. It bears repeating that this is first and foremost an economic war on the part of Al-Qaeda.

“It is very important to concentrate on striking the American economy with every possible means. Hit hard the economy at its heart and its core.” Al-Qaeda and its affiliates are now in a position to threaten oil exports to the West. Africa’s sea lanes and harbors are vulnerable targets because much of the world’s oil and cargo move through the Red Sea, the Suez Canal, along the Mozambique Channel, around the Cape of Good Hope, and through the Straits of Gibraltar. Currently, the U.S. gets 16% of its oil imports from Africa, almost as much as from Saudi Arabia and by 2015, it is estimated that West Africa will provide a quarter of America’s need for oil. The CIA forecasts that “growing demands for energy will have substantial

30

their European counterparts, veterans are returning to their native countries in Africa, ready to pass along their knowledge to other terrorists. In addition, it has been observed that both European and African veterans are now “networking” with each other. They are sharing their training and combat experience for use somewhere else in the world. Africa could well be at the boiling point, and America’s security, its very existence could be at risk. Russia is selling arms to Al-Qaedaand its’ affiliates in Africa. While China is directly involved in the affairs of every oil producing country in Africa, and assisting Iran in supporting Al-Qaeda and its affiliates throughout Africa. Iranian manufactured weapons and ammunition have been found in Kenya, Uganda, South Sudan, Guinea, and the Ivory Coast. Iran is working with southern secessionists in Yemen and with the Shite Houthi rebels in northern Yemen. Nigeria is the fifth largest provider of oil to the U.S., and Iran, through the Iranian Revolutionary Guards has been using local Shiite’s, trained in intelligence, use of weapons and explosives, to act as proxies in their war against Israeli and U.S. interests in Africa and the Middle East. In July, 2003, after a visit to Senegal, South Africa, Botswana, Uganda, and Nigeria, President Bush offered the following statement, “Many African governments have the will to fight the war on terror…we will give them the tools and the resources to win this war.” In nation building, it must be understood that complete state failure creates anarchic environments that are not ideal for terrorists, but, weak states, quasi-states, or those in civil crisis provide the ideal environment for terrorist organizations.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


In Africa, there are a large number of weak and failing states, porous borders, endemic poverty, political repression, religious radicalism, and little hope for the future. The current talks on nation building in Africa ignore the real problems. These projects require a great deal of time and dedication. Something in which the West is in short supply. Compounding this problem is the fact that Western intelligence has been impaired due to the lack of intelligence assets, not just in North Africa, but extending throughout the continent to South Africa. There has been limited cooperation from other governments and little to no information coming from the rest of the African nations.

would be more concerned with their daily survival as opposed to planning attacks against the West. In turn, those governments that are willing to address the needs of their citizens would have the time to engage with Europe and the U.S. in nation building. Africa would not become another Afghanistan, and the West would have a new contributor to the world’s economy. We face the difficult decision on whether we do what is right or what is easy. If Washington ignores the events in Africa, it will lose the fight against terrorism.

About the Author

A senior U.S. intelligence official stated: “We simply do not have the resources, the footprint, or the capabilities we have in other theaters.”

Danny Dickerson is a retired Colonel, U.S. Army. He has served as an advisor to the UN, NATO and Interpol on terrorism and intelligence planning. He has trained law enforcement from the local to federal level on terrorism and intelligence, as well as investigators for the Canadian Attorney General’s office and police officials in Egypt and Jordan, and is recognized as a “presenter” by the Illinois Terrorism Task Force.

The current conditions in Africa have made it a soft target for terrorist groups. Yet, it is these very conditions that could benefit both Europe and the U.S. in countering the terrorist threat. These nations are where the terrorists are most vulnerable to covert action. Terrorists may consider them as safe havens, but, in fact, they are defenseless positions. This is the ideal environment for special operations against the known terrorist locations throughout Africa. By employing covert operations, the terrorists would be kept constantly off guard and on the run. By being denied their base of operations, logistics, finances, and recruits, these organizations

References: “Al-Qaedafrom Within, as Narrated by Abu Jandal (Nasir al-Bahri), bin Laden’s Personal Guard,” Al-Quds al-Arabi, 24 March 2004. Jeff Kamen, “Terror Threat Carries Nuclear Cloud,” Defense News, 24 February 1992. Claude Moniquit, President of the European Strategic Intelligence and Security Center in Brussels. House Committee on International Relations, Africa and the War on Global Terrorism: Hearing before the Subcommittee on Africa of the Committee on International Relations, 107th Cong., 1st sess., 2001, testimony of Susan Rice. “Information On Bin Laden’s Plans to Set Up Base in Somalia,” AlSharq Al-Awsat, 19 May, 1999. “Africa and Terrorist,” Pretoria-based Institute for Security Studies, July, 2002. Jeremy Michaels, “Al-Qaeda Ring Bust in SA,” Star (Johannesburg), 27 May 2004. Bin Laden videotape, broadcast on al-Jazeera TV, Doha, Qatar, 27 December, 2001, trans. in “Bin Laden Calls Sept. 11 Attacks ‘Blessed Terror’”, CNN.com, 27 December, 2001. Kristina Nwazota, “President Bush to Visit Five African Nations,” Online NewsHour, 3 July, 2003.

“IntellIgence Is vItal to National Security.”

James Green, Jr. | Intelligence and National Security Outreach Spanning an impressive 38-year career with the Central Intelligence Agency and the National Geospatial-Intelligence Agency, James Green is a respected leader and mentor. Having served as an intelligence officer, branch chief, senior recruiter and project manager, James knows about American Military University’s academic reputation. That’s why he joined AMU.

Learn More at www.amuonline.com/JOC Art & Humanities | Business | Education | Management | Public Service & Health | Science & Technology | Security & Global Studies AMU_JournalofCounterterrorism_1012.indd 1

10/16/12 9:46 AM


The IACSP Announces Its’

20th Annual

Terrorism Trends & Forecasts Symposium The IACSP will be presenting its 20th Annual Terrorism, Trends & Forecasts Symposium on Thursday, October 25th, 2013. It will be held at the prestigious Bergen County Law & Public Safety Institute in Mahwah, New Jersey.

SCHEDULE

Who Should Attend?

09:00 - 10:00 • J.M. Peterson: Keynote Speaker

• • • • • • • •

First Responders Military Law Enforcement Security Directors Government Personnel Intel Professionals Emergency Preparedness Personnel Homeland Security Professionals

When:

• Thursday, October 25th, 2013

Where:

• Bergen County Law & Public Safety Institute: Hall of Heroes: 281 Campgaw Road, Mahwah, New Jersey, Just 45 minutes from New York City.*

Dress Code: Casual Business

32

07:30 - 08:45 • Registration/Coffee/Continental Breakfast 08:45 - 09:00 • Introduction, Moderator: John Dew, IACSP Conference Dir.

• Many of the same types of terrorists and their enablers, and tactics, techniques, and procedures (TTPs) we are hunting overseas are the same types that either currently operate on our own soil or that we may face in the future. This ranges from hard-core terrorists, to radicalized ‘lone wolf terrorists,’ to possible ‘sleeper cells’ to very low level collaborators and fundraisers. They have had the opportunity to greatly refine their TTPs over the past 12 years and exhibit a tendency to constantly adapt and improve, particularly in light of our own TTPs and countermeasures to them. • Considering that we have already, except for the recent Boston Marathon Bombing, had a number of “nearmisses” since 9-11, where terrorist attacks were thwarted or otherwise failed, some only by luck or ‘technical difficulties’ on the part of the attacker, they were successful before and they will try again and again. They are looking for ‘lucrative’, high pay-off targets domestically as

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


we speak. This presentation takes a look at the current threat we are facing and what security professionals can do to prevent or stop an attack. Attendees will receive slideshow materials and handouts via email immediately following the symposium. 10:00 - 10:20 • Coffee/Networking 10:20 - 11:20 • Speaker: Michael Maloof • Michael will speak about the threat from an electromagnetic pulse attack on our critical infrastructure either from an impending solar storm of serious intensity expected between 2013 - and 2014 or a high altitude nuclear explosion that could have long term catastrophic consequences for our society and our way of life. A few years ago , a congressional commission went into considerable depth on those consequences to our electricity dependent infrastructures that include not only the power grid itself, but also telecommunications, our banking and finance system, and finally, our transportation system which delivers the very food and water our society depends on a daily basis. • While an electromagnetic pulse event on our civilian infrastructure could be serious, it can be managed if government at the federal, state and local levels gives a high priority to undertake preventive action to lessen its impact to recover from it. 11:20 - 12:20 • Speaker: William Pat Schuber • The use of Unmanned Aviation Vehicles (UAV), aka Drones, has become an essential element of US Military and CIA counterterrorism policy. The “Death by Drones” of American born jihadist and a Al-Qaeda in the Arabian Peninsula (AQAP) leader has led to an ongoing debate as to the use of these instruments to target Americans. This presentation will examine the development and use of these vehicles in the War on Terror. A historical analysis of their use will be examined from WWII to the present. In addition the presentation will discuss the future development and use of these vehicles as an integral part of US Military police in matters of insurgency with special emphasis on their effectiveness, benefits, but also their disadvantages and possible blowback on US interests. • Finally the presentation will address the legal issues which have arisen as a result of the use of drones to target American citizens for extrajudicial killing. An analysis of the legal pros and cons taking into account the Bill of Rights, the President’s powers as Commander in Chief and the Congressional Resolution authorizing use of force against those who perpetrated the 9/11 attacks (AUMF) will be presented.Ending with a discussion of the drone policy for future counterterrorism efforts. 12:20 - 01:20 • Lunch/Networking 01:20 - 02:20 • Speaker: Richard P. Wright • Crime and Terror in Latin America and the Caribbean (and Implications for US Security): The growing involvement of Drug Traffick-

ing Organizations in numerous other forms of criminal activity and development of local consumer drug markets, along with increasing indicators of terror group collaboration, has engendered a continuing degradation of security conditions in countries throughout the region. • Recent US elections and ongoing political changes in the region (e.g., Mexico, Venezuela) portend revisions of policies related to crime and terror. Border security and immigration reform are not the only issues, and the US would do well to consider the full scope of developments in the region. This presentation will discuss ongoing developments and identify key emerging issues. 02:20 - 03:20 • Speaker: Amery Vasso • With the advent of Long Term Evolution (LTE) networks available to law enforcement and emergency responders and a variety of proposed military networking solutions specifically serving the dismounted soldier, the availability of content at the “edge” is here now. For military applications there is considerable debate surrounding this powerful information capability. • How to secure the information? Who receives what? Who needs what? What is the cognitive burden imposed by this technology? When does the amount of information impair intuition and diminish the value of experience? Undoubtedly law enforcement and emergency responders face comparable challenges. Answering these challenges is essential in maximizing the benefits of this technology and enabling optimum human performance. 03:20 - 03:40 • Coffee/Networking 03:40 - 04:40 • Speaker: Dr. Joseph A. Devine • The Role Of Anarchists In Domestic and International Terror: Anarchists seem an obscure entity lost to the fog of history. The term itself is tertiary to lexicon of modern terrorism. The very definition of anarchism and the impact of anarchists upon American history are generally misunderstood. Anarchists by their very nature pose an active and substantial threat to public safety and homeland security. Their potential threat is exponentially increased when insidious agents of domestic or international terror groups infiltrate their movements. • Chaos and terror instigated by anarchists throughout Europe, Asia and the United States remain a viable threat. Like global Jihadist movements, anarchists are not inherently linked to nation states. As such they present unique challenges to the law enforcement and intelligence communities. • The recent Occupy Wall Street Movement has characteristics of the anarchist activities of the 20th Century. The impact of anarchist movements in the early 20th Century served as a catalyst for the creation of the Bureau of Investigation. Under the leadership of J. Edgar Hoover this would become the Federal Bureau of Investigation.


04:40 - 05:40: • Speaker: David Opderbeck • The Internet pervades every aspect of American life. Financial markets, news outlets, public utilities, telecommunications industries, education, government – name any sector of public infrastructure and you will find that it is “wired.” But the characteristics that made the Internet successful – its accessibility, open architecture, and scalability – also make it vulnerable. Cyberspace is ripe for exploitation, and in fact is already being exploited, by organized criminals, terrorists, and other enemies of the State. For example, terrorists could cripple power generating stations with a “logic bomb” or a virus such as STUXNET that affects the computerized control systems. • The security of cyberspace therefore is a top policy priority. Yet the need for security must not destroy the very freedoms that have made the Internet so successful and so important to the fostering of democratic movements around the world. If the Internet can be exploited by our enemies, it also can be abused even by well-meaning government officials to implement unprecedented surveillance and control over ordinary citizens and private sector assets. Some policymakers have even argued that the U.S. President should control a “kill switch” that could shut down portions of the Internet in the event of an emergency – a tactic routinely employed by totalitarian states to censor criticism. In this talk, Prof. Opderbeck will discuss these and other challenging legal and policy issues surrounding cybersecurity and cyberterrorism. 5:40 • Drawing for prizes: You must be present to receive a prize.

Speaker Bios JP Peterson • JP Currently serves as the Special Projects Director of the Counterterrorism & Security Education and Research Foundation. As a long-time IACSP member and periodic contributor to our journal, he has served on the Advisory Board as General Advisor since being appointed in 1997. He has spent all of the past 10+ years supporting the war effort, with positions as a deployed on the ground as an Army Special Forces soldier, as a government civilian at the U.S. Department of Homeland security, and as government contractor in a variety of roles both domestically and overseas. He is an annual member of ASIS, NTOA, IALEFI, ILEETA, ITOA, IDPA, AFCEA/CHS, and the Nine Live Associates. He is a life member of all of the following: the Academy of Security Educators & Trainers, Special Operations Association, Special Forces Association, AFCEA, IACSP, NRA, and the Veterans of Foreign Wars. • Since the mid 1990’s, Mr. Peterson has donated much of his time to the IACSP, to include teaching at five of its symposia and representing the association at most of the 51 professional conferences that he has presented at, including the three largest law enforcement conferences. This presentation has been conducted at the federal and state level, as well as at professional training

34

conferences, is continually updated, and draws much from the first hand experience of the presenter. As one of our ‘true believers,’ he plans to continue helping the association and its sister foundation for as long as there is a threat of terrorism.

Amery Vasso • Amery Served in the US Active Army for 23 years culminating in selection as a Senior Military Advisor for the Asymmetric Warfare Group. Mr. Vasso has several combat and overseas tours while serving in the US Army. Mr. Vasso has a Bachelor of Science in Criminal Justice and a Master of Science in Homeland Security. Mr. Vasso currently supports the Army by providing operational analysis to key Soldier technology programs.

Dr. Joseph A. Devine • Chief Devine has twenty-seven years of experience in public administration and law enforcement including eight years as a Chief Law Enforcement Officer. Additionally, he has over eight years of experience as a college professor and is a Certified Public Manager and Certified Chief Executive Law Enforcement Officer. Joseph is also a graduate of the FBI Law Enforcement Executive Development Seminar in 1995 and the FBI National Academy in 1999. • Joseph Devine began his law enforcement career in 1979 as an officer with the Morris County Sheriff’s Department in New Jersey, becoming a detective with the Bureau of Criminal Identification. He became an investigator for the Morris County Prosecutor’s Office in 1981, assigned to the Special Investigative Section. Chief Devine left the prosecutor’s office in 1981 to join the Rockaway Township Police Department, climbing the ranks to sergeant in 1985, lieutenant in 1990, captain in 1992 and chief on July 1, 1998. Joseph was Chief of Investigations for the Morris County Prosecutors Office in Morristown, New Jersey. He oversaw an office of 175 employees responsible for the investigation and prosecution of indictable crimes. He will soon complete a doctorate of education program at Seton Hall University with a concentration in organizational leadership. Currently, Joseph Devine is an Adjunct Professor of Management and Organizational Leadership at Fairleigh Dickinson University.

Michael Maloof • Former policy analyst for the Department of Defense and currently WND’s Washington senior reporter, Michael Maloof, discussed how everything from our daily routines to our national defense will be crippled by an EMP attack, and why this is America’s greatest threat to national security. • “If we had a major intensive [solar] storm that had a direct hit on us, it could cost up to $2 trillion over four years to attempt to recover, and it would take us up to 10 years to recover,” with some 160 million people seriously impacted in the United States, he reported. Yet, we could take remedial action now, to strengthen and protect the grid, but the problem is there’s no one agency coordinating such efforts, Maloof said, and Congress has ignored its own commission report and shelved funding measures– estimated to be between $20-50 billion to start fixing the problem. • We need to create the position of an EMP Czar, someone under

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


the National Security Council that can direct all activities from federal, state, and local governments to take decisive action, he continued, adding that the SHIELD Act should be reintroduced to the new Congress. Maloof also outlined EMP terror threats– his biggest concern is over an attack instigated by a ‘lone wolf’ type, or a loose cannon state such as North Korea.

William Pat Schuber • Pat served as The County Executive of Bergen County for 12 years, nine years as a member of the New Jersey State Assembly and Mayor of the Borough of Bogota for four years. • He is an Associate Professor at the School of Administrative Science, Petrocelli College, Fairleigh Dickinson University. He is a faculty member in the Master of Administrative Science (MAS), Master of Science in Homeland Security (MSHS), Master of Sports Administration (MSA) and Bachelor of Arts in Individualized Studies (BAIS). His courses include Leadership, Government, Homeland Security, Law, Ethics and Communication. He is a past Adjunct Professor in Business Law at Montclair University and Seton Hall University. He is an Instructor in the Certified Public Manager Course of Studies (CPM) and the Police Executive Leadership Course sponsored by the New Jersey Association Chiefs of Police and the New Jersey State Police (NJSP). • He lectures frequently on military history, historical leadership, homeland security, ethics, communication and conflict resolution to numerous civic groups. He served as a Captain in the US Army Reserve (Retired). He has been appointed a Commissioner of the Port Authority of New York and New Jersey.

Richard P. Wright • Director of Global Security Operations, VDI, Inc. Richard has over thirty years security experience, with a Bachelors degree in Management Studies from UMUC. He authored the acclaimed and definitive Kidnap for Ransom, Resolving the Unthinkable and has been principal consultant in the successful resolution of multiple incidents. He has designed integrated security systems for diverse clients, developed numerous CM/BC programs, and spoken extensively in both English and Spanish in multiple international forums as well as appearing on NPR and CNN. • He currently chairs the ASIS International Crisis Management and Business Continuity Council and directs VDI’s global operations as well as managing security in Latin America and the Caribbean for one of the largest multilateral lending institutions in the Western Hemisphere.

David Opderbeck • David Is Professor of Law and Director of the Gibbons Institute of Law, Science & Technology at Seton Hall University Law School. His teaching and scholarship focus on information policy, intellectual property, and cybersecurity law. He is also Of Counsel in the Intellectual Property and Information Technology practice groups at Moses & Singer, LLP. He holds law degrees from Seton Hall University Law School (J.D. ‘91) and New York University Law School (LL.M. ‘99) and a Certificate in Cybersecurity Foundations from Stanford University. He was previously a Partner at McCarter & English, LLP.

Register Today 20th Annual Terrorism Trends & Forecasts Symposium Name Company Address City/State/Zip Phone CC# (AMEX, VISA, MC) Expire Date How Many Attending

Amount ($)

(If more than one, see below)**

Signature Today’s Date *Directions to Bergen County Law & Public Safety Institute: • www.co.bergen.nj.us/bclpsi/Directions.html • Directions to Bergen County Law & Public Safety Institute Mahwah. Rt. 17 North to McCarthur Blvd. exit about 20 minutes on Rte 17 Turn left at Light On to McCarthur. Go to end Road about 1/2 Mile Turn Right on to Darlington Ave. make first left on to Seminary Road. Take Seminary Road about 1/2 mile to Campgraw Rd. Institute is about 1/2 mile on left. Enter building on left BC Bergen Law Public Safety Institute Rates for this conference are as follows: Early Bird Rates: Until August 10, 2013 • IACSP Members: First Responders, Law Enforcement, Military, Teachers, Students, $139. • Non Members: Corporate Security Directors, Government Agencies, $169 Standard Rates: After August 10, 2013 • IACSP Members: $169 / Non Members: $199 You can mail your registration to: IACSP (If sending check, make out to: “IACSP”), PO Box 100688, Arlington, VA 22210 USA To Fax Registration fax to: 202-315-3459 Or go to www.iacsp.com to register. For questions or inquiries, please call The IACSP Office At: 201-224-0588 or 571-216-8205. **Important: Special “Bring A Colleague” Prices Available. Call for more info.


Directory of Organizations

Offering Homeland Security and Counter Terrorism Curriculae. American Board for Certification in Homeland Security The ABCHS serves a diverse membership of professionals dedicated to the important mission of protection our nation. To become a member call 877-219-2519, email us at info@abchs.com or visit our website at http://www.abchs.com American Military University 111 West Congress St., Charles Town, WV, 25414 http://www.amu.apus.edu/public-safety BA & MA in Homeland Security; BA & MA in Emergency and Disaster Management; BA & MA in Intelligence Studies; BA & MA in Security Management; BS in Fire Science Management; BS in Information Systems Security. Bellevue University 1000 Galvin Road South, Bellevue, NE, 68005 http://www.bellevue.edu University offers more than 20 accelerated bachelor’s degree completion majors online, including Bachelor of Science degrees in Security Management, Criminal Justice Administration, Investigations, and Corrections Administration and Management.

36

California University of Pennsylvania 250 University Ave., California, PA , 15419 www.calu.edu/go or call 724-597-7400 Master’s in Legal Studies/Homeland Security, Certificate in Homeland Security.

Charlottesville, VA , 22903-1789 http://www.virginia.edu/cnsl/ Various course on National Security Law; summer National Security Law Institute for law professors and government attorneys.

Capella University 225 South 6th Street, 9th Floor, Minneapolis, MN 55402 http://www.capella.edu Pursue a homeland security career and help protect your country’s citizens, lands, and property. This specialization focuses on managing public security in conjunction with federal resources.

Center for Terrorism Law St. Mary’s University School of Law One Camino Santa Maria, San Antonio, TX, 78228 http://www.stmarytx.edu Terrorism Law

Canadian Defence Academy PO Box 17000, Kingston, ON, K7K 7B4, CAN http://www.cda.forces.gc.ca Military education, defense and security. Center for Homeland Security University of Colorado at Colorado Springs UCCS Center for Homeland Security, Colorado Springs, CO www.chs.uccs.edu Graduate Certificate in Homeland Defense, Undergraduate Certificate in Homeland Defense. Center for National Security Law University of Virginia School of Law 580 Massie Rd.,

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Central Georgia Technical College 3300 Macon Tech Drive, Macon, GA, 31206, US http://www.centralgatech.edu Public/Private Crisis Manager Certificate, iploma and/or Associate of Applied Science Degree. Charles Sturt University Asia’s leading provider of counterterrorism, intelligence, and security education. Flexible entry requirements. Professionally relevant and academically rigorous: MA (Terrorism, Safety, and Security), MA (Intelligence Analysis), MA (Anti-Money Laundering-Countering Terrorist Finance), and MA (Emergency Management). Contact us for international delivery of customized intensive short courses available. Please visit us at: http://www.csu.edu.au/faculty/arts/agsps/about-the-school


Enroll Now in FDU’s

Master of Science in

Homeland Security Flexible class formats and locations — including online and in-person at several NJ locations — let you earn your degree without career interruption. In the complex world of homeland security preparedness, experience counts. But when it comes to career advancement, your credentials make the difference. Our 36-credit Master of Science in Homeland Security is for law, public safety, emergency management and other homeland security professionals who want to advance in this fast-growing field. • Practical and theoretical focus on aspects of homeland security with an emphasis on leadership. • Network and learn with faculty and peers experienced in homeland security. • Choice of concentrations — Terrorism and Security Studies, Emergency Management and Leadership — to tailor the program to meet your career goals. • No GRE requirement.

Call today! Classes begin year-round.

For more information or to request an application, contact: Paulette Laubsch, DPA Program Director, MS in Homeland Security Phone: 201-692-6523 Email: plaubsch@fdu.edu Website: www.fdu.edu/mshs


CHDS http://www.chds.us/ The Naval Postgraduate School Center for Homeland Defense & Security (CHDS) has been the nation’s premier provider of homeland security graduate and executive level education since 2002. NPS and the U.S. Department of Homeland Security are partnering to pioneer the development and delivery of homeland security education programs for governors, mayors and senior homeland security leaders from across a wide spectrum of disciplines. Everest University http://www.everest.edu The Homeland Security program includes: Civil & criminal justice, Emergency planning and security measures, Principles, planning and procedures of safety, Tactical communications, Domestic and international terrorism, Emergency medical services and fire operations, Business and ethics for security specialists. Command & General Staff College 100 Stimson Ave., Ft. Leavenworth, KS, 66027-2301 Command and General Staff College incorporates various aspects of homeland security and homeland defense into its core curriculum. richard.berkebile@us.army.mil Delaware Technical and Community College 100 Campus Drive, Dover, DE , 19904 www.dtcc.edu Associate Degree in Criminal Justice, Homeland Defense and Emergency Management.

East Carolina University A-124A Brewster Bldg., Greenville, NC, 28758-4353 http://www.ecu.edu/cs-cas/securitystudies/ index.cfm Graduate Certificate in Security Studies, Harriot College of Arts & Science, Department of Political Science; Undergraduate Minor in Security Studies (Interdisciplinary) Emergency Administration and Planning University of North Texas 1155 Union Circle #310617, Denton, TX, 76203-5017 http://www.unt.edu/eadp UNT offers a bachelor’s degree in Emergency Administration and Planning. It also offers a Master’s and Ph.D. in Public Administration and Management (with a concentration in emergency management). Courses include Homeland Security, Disaster Response and Recovery, Hazard Mitigation and Preparedness. Fairleigh Dickinson University 1000 River Rd., H-DH2-13, Teaneck, NJ, 07666 http://fdu.edu/mas Undergraduate certificate programs: Disaster & Emergency Management; Security & Terrorism Management; and Transit Safety & Terrorism Studies. Graduate certificate programs: Computer Security & Forensic Administration; Global Security & Terrorism Studies. George Mason University Dept. of Public and International Affairs, MS 3F4, 4400 University Dr., Fairfax, VA, 22030 http://pia.gmu.edu/grad/biod PhD Biodefense, MS Biodefense George Washington University 121 I Street, N.W., Washington, D.C. 20052 http://nearyou.gwu.edu/hs/index1.html Graduate Certificate in Homeland Security Emergency Preparedness This part-time graduate certificate program provides crisis, disaster and risk management expertise for persons engaged in or seeking professional careers in crisis, disaster and emergency management in the public, private and not-for-profit sectors. George Washington University 121 I Street, N.W., Washington, D.C. 20052 http://www.gwu.edu/ Graduate Certificate in Homeland Security Emergency Preparedness This part-time graduate certificate program provides crisis, disaster and risk management expertise for persons engaged in or seeking professional careers in crisis, disaster and emergency management in the

38

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Goodwin College 745 Burnside Ave., East Hartford, CT, 06108 http://www.goodwin.edu Homeland Security Greenville Technical College Critical Incident Management Institute (CIMI) 216 S. Pleasantburg Dr., Greenville, SC, 29607 http://www.gtbmc.com Professional Education and Associate Degree programs in various Public Safety, Emergency Healthcare, and Incident Response disciplines. Henley-Putnam University 25 Metro Drive, Suite 500, San Jose, CA 95110 http://www.henley-putnam.edu Henley-Putnam University is the only accredited (DETC) university that specializes exclusively in intelligence, counterterrorism and protection. We offer over 100 courses on topics such as covert actions, counterintelligence, counterterrorism and intelligence collection management. Iowa Central Community College 330 Ave M, Fort Dodge, IA, 50501 http://www.iccc.cc.ia.us Associate of Science/Arts in Criminal Justice, Diploma Certificate Jones International University 9697 East Mineral Avenue, Centennial, Colorado 80112 http://www.jonesinternational.edu Secure a better future. The four ISM courses in our MBA specialization are designed to provide realistic recommendations for improving the information security of an organization. Kaplan University 888 7th Avenue, New York, NY 10106 http://www. Kaplan.edu Kaplan University offers nine emphasis areas in the Bachelor of Science in Criminal Justice program: Forensic Psychology, Law Enforcement, Private Security, Fraud Examination and Investigation, Corrections, Crime Analysis, Crime Scene Investigation, Computer Crime and Homeland Security and Counterterrorism. Keiser University 1900 West Commercial Blvd., Fort Lauderdale, Florida 33309 http://www.keiseruniversity.edu/ Keiser University’s Bachelor of Arts degree in Homeland Security focuses on management-level skills needed in the critical field of Homeland Security. The program provides an understanding of essential management


Security Policy Degrees NDC offers Graduate Certificates and a Master of Arts in Security Policy Studies designed to develop the next generation of leadership in homeland security. Earn your online Security Policy Degree and develop knowledge and skills in the following areas: • Homeland security • Intelligence analysis • Emergency management • Public health • Biodefense • Border security

• Transportation security • Transnational threats • Strategic intelligence • Bioterrorism • Risk assessment analysis

Visit: Online.NotreDameCollege.edu/IACSP Call: 1.888.657.0472 | E-mail: online@ndc.edu


skills and addresses unique proficiencies needed to understand Homeland Security at the Local, State, and Federal levels. Topics include cross cultural management, emergency management planning and critical infrastructure protection. Long Island University 121 Speonk-Riverhead Road LIU Bldg, Riverhead, NY 11901-3499 http://www.liu.edu/homeland The Homeland Security Management Institute offers an accredited, 36-credit Master of Science degree in Homeland Security Management and a 15-credit graduate-level Advanced Certificate in Homeland Security Management, both delivered entirely online, with no in-residence component. Our rigorous curriculum focuses on the complexities of the homeland security enterprise, providing executives, managers and practitioners with exceptional professional education. Midway College 512 E. Stephens Street, Midway, KY, 40347 http://www.midwaycolleges.com Bachelor of Arts in Homeland Security Corporate Management and Assessment. Montgomery County Community College 340 Dekalb Pike, Blue Bell, PA, 19422 www.mc3.edu AAS degrees in CJS, FSC, & EMP; Certificates in FSC and EMP; Individual courses. Also Police Academy and Fire Academy at Montgomery County Public Safety Training Campus. Naval Postgraduate School Center for Homeland Defense and Security 1 University Circle, Monterey, CA, 93943 http://www.chds.us Master of Arts Degree Program, Executive Leadership Program, Mobile Education Team (MET) Seminars. New Jersey City University Doctor of Science in Civil Security Leadership, Management and Policy Jointly designated as a National Center of Academic Excellence in Security Studies by the National Security Agency and the U.S. Department of Homeland Security, NJCU is proud to offer the first and only doctoral degree in CSLMP. For information on this and other graduate and undergraduate degree programs in our Department of Professional Security Studies. njcu.edu/security. grad_dept@njcu.edu 1-877-NJCU-GRAD Northcentral University Center for Law Enforcement and Security

40

10000 E. University Drive, Prescott Valley, AZ, 86314 http://www.ncu.edu Bachelor’s, master’s and doctoral degrees, as well as certificates of advanced graduate study, in business and technology management, education and psychology. Specializations include Homeland Security, Criminal Justice, Public Administration, Organization. Norwich University 158 Harmon Drive, Northfield, VT 05663 Northfield, VT 05663 http://www.norwich.edu At Norwich, you’ll develop traits common among leaders in every profession discipline, integrity, confidence, critical thinking, adaptability, loyalty, and honor through a wide range of opportunities that will empower you in lasting ways you never imagined. Notre Dame College 4545 College Rd., South Euclid, OH, 44121-4293 www.notredamecollege.edu/professional_development Certificate in Intelligence Analysis (Homeland Security) Certificate in Competitive (Business) Intelligence Penn State 222B Outreach Bldg. Penn State,University Park, PA, 16802 http://www.worldcampus.psu.edu Bachelor’s Degree in Forensic Science; Bachelor’s Degree in Security and Risk Analysis; Master of Geographic Information Systems; Master of Homeland Security in Public Health Preparedness; Master of Professional Studies in Forensic Science. Purdue University Purdue Homeland Security Institute (PHSI) Gerald D. and Edna E. Mann Hall Room 166, 203 S. Intramural Drive, West Lafayette, IN, 47907-1971 http://www.purdue.edu/DiscoveryPark/phsi/ Homeland Security Masters Area of Specialization Rochester Institute of Technology 31 Lomb Memorial Drive, Building 1, Suite 2210, Rochester, NY, 14623 http://www.rit.edu/cms Security Technology Management; Security Technology Policy, Law and Ethics; Managing Cyber Threats and Critical Information; Internal Organization Security Management; Examining Terrorist Groups. S2 Safety & Intelligence Institute 1261 South Missouri Ave., Clearwater, Florida 33756 http://www.s2institute.com/

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Since 1998, the S2 Safety & Intelligence Institute has trained thousands of security, intelligence, and law enforcement professionals in critical public safety topics. With a staff of world-class instructors, S2 has earned a reputation as one of the nation’s premier sources for security and public safety training. We provide traditional classroom instruction and hands-on training at our two locations in Florida and at host locations throughout the United States. Through our sister company, the S2 Online Academy, we also deliver high quality distance education to students throughout the world. Saint Leo 33701 State Road 52, PO Box 6665, Saint Leo FL 33574-6665 http://www.saintleo.edu Founded in 1889, Saint Leo University offers one of the largest online undergraduate degree programs and was recently named a “Leading Southern University” by U.S. News and World Report. Saint Leo is also proud to be a leading participant in eArmyU. SIG Homeland Security 184 Columbia Turnpike, Suite 4 #103, Florham Park, NJ 07932 http://www.sighls.org The Certified Homeland Security Professional [CHSP] courses and certifications are designed to prepare and certify the next generation of homeland security professionals in both the physical and digital spectrum of the business. Southwestern College 2040 South Rock Rd., Wichita, KS, 67207 www.southwesterncollege.org Master of Science in Security Administration, Bachelor of Science in Security Management, Bachelor of Science in Criminal Justice, Certificate in Homeland. Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security. St. Clair County Community College 323 Erie St., Port Huron, MI, 48061-5015 www.sc4.edu/homelandsecurity Series 100-Understanding and Combating Terrorism; Series 200-Preventing, Identifying and Investigating; Series 300-WMD: Anticipation, Preparation, and Prevention for First Responders and Medical Personnel; Series 400-Investigating.



St. Petersburg College 3200 34th Street South, St. Petersburg, FL, 33733 http://www.spcollege.edu/ac/ Associate in Science in Emergency Administration & Management; Bachelor in Applied Science in Public Safety Administration; Certificate in Emergency Administration & Management; Certificate of Homeland Security.

Tiffin University 155 Miami Street, Tiffin, OH, 44883 http://www.tiffin.edu Bachelor’s in CJ; Associate’s in CJ; Master’s of Science in CJ.

Stanford University Center for International Security and Cooperation Encina Hall, Stanford, CA, 94305-6165 http://cisac.Stanford.edu Fellowships in Science, Technology, and International Security; Pre-doctoral and Postdoctoral Fellowships in International Security; Interschool Honors Program in International Security.

Tulane University School of Continuing Studies 125 Gibson Hall, New Orleans, LA, 70118-5698 scs.tulane.edu/degrees_programs/homeland.htm Bachelor’s degree, minor, or post-baccalaureate certificate in Homeland Security Studies. A Masters in Professional Studies (MPS) in homeland Security Studies is currently under development.

Syracuse University College of Law, Syracuse, NY, 13244 http://insct.syr.edu/ Institute for National Security and Counterterrorism Texas A&M University 200 Discovery Drive, College Station, TX, 77845-1185 http://homelandsecurity.tamu.edu Graduate Certificate in Homeland Security The Center for Continuing Studies, (UCONN) One Bishop Circle, Unit 4056, Storrs, CT 06269-4056 http://continuingstudies.uconn.edu/mps/ programs/hsl.html In partnership with the Naval Postgraduate School (NPS) in Monterey, California, is offering a Master of Professional Studies degree with a Homeland Security Leadership concentration (MPS HSL). The New York Times Knowledge Network and Fairleigh Dickinson University 620 Eighth Avenue, New York, NY 10018 (212) 556-8300 www.nytimes.com/fdu Course: Business, Technology & Communication, Global Leadership, Cybercrime & Computer Forensics, Security, Safety, & Terrorism Studies, US Homeland Security Thomas Edison State College 101 West State Street, Trenton, NJ, 08608 http://military.tesc.edu Bachelor of Science in Homeland Security and Emergency Preparedness (approval pending, Oct. 2008); BSHS in Administration of Justice; BA in Criminal Justice; BSHS in Emergency Disaster Services; Graduate certificate in Homeland Security.

42

Towson University 8000 York Road, Towson, MD, 21252-0001 www.new.towson.edu/hsm Integrated HS Management Program.

University of Denver 2201 South Gaylord, Denver, CO, 80208 du.edu/gsis/areas/homelandsecurity.html Master’s and graduate level certificate in Homeland Security. University of Hawaii West Oahu 96-129 Ala Ike, Pearl City, HI, 96782 http://www.uhwo.hawaii.edu Disaster Preparedness and Emergency Response (DPEM), Justice Administration, Public Administration, Health Care Administration, Forensic Anthropology, Security Administration. University of Idaho 1776 Science Center Dr., Idaho Falls, ID, 83402 http://www.uidaho.edu Emergency Management and Planning Certificate University of Maryland College Park, MD, 20742 www.start.umd.edu/education/ or www.publicpolicy.umd.edu/Int... Graduate Certificate in Intelligence Analysis; Graduate Certificate in Terrorism Analysis; Undergraduate Minor in Terrorism Studies; Critical languages study. University of Maryland University College 3501 University Blvd. East, Adelphi, MD, 20783 http://www.umuc.edu/homelandsecurity Homeland Security Management Program. University of New Haven 300 Boston Post Road, West Haven, CT, 06516 http://www.newhaven.edu/5924/ Undergraduate Programs -Criminal Justice (B.S.) (A.S.) -Forensic Science (B.S.) -Fire Science

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

(B.S.) -Fire Protection Engineering (B.S.) -Fire & Occupational Safety (A.S. -Legal Studies (B.S.) (A.S.) Graduate Programs -Criminal Justice. University of Southern California 3710 McClintock Avenue, Los Angeles, CA, 90089-2910 http://www.usc.edu/create National Center for Risk & Economic Analysis of Terrorism Events (CREATE) Executive Program in Counter-Terrorism. University of St. Andrews Certificate in Terrorism Studies Contact: Bob Sherwood, Terrorism Studies Consultant to The University of St Andrews St Andrews, Fife KY16 9AJ, Scotland Ph: +44 (0) 20 7017 5263 Robert.Sherwood@informa.com The University of St. Andrews, Centre for the Study of Terrorism and Political Violence, is offering a Certificate in Terrorism Studies. The Certificate is a transnational e-leaning course that provides individuals, the military, the police, as well as public or private sector organizations with an understanding of the latest terrorist thinking. Virginia Commonwealth U Room 301B Scherer Hall, Richmond, VA, 23284-2028, US http://www.pubapps.vcu.edu/gov/academics/ default.asp?ID=134 Bachelor’s of Arts in Homeland Security and Emergency Preparedness, Master’s of Arts and Graduate Certificate in Homeland Security and Emergency Preparedness. Walden University Phone: 1-866-492-5336 http://www.waldenu.edu Designed for professionals in the public, nonprofit, and private sectors, Walden’s online M.P.A. program offers collaborative online courses. You’ll interact with peers and faculty members who are active in government and nonprofit agencies. West Kentucky Community and Technical College 4810 Alben Barkley Drive, Paducah, KY, 42001 http://www.westkentucky.kctcs.edu/ West Kentucky Community and Technical ¬College offers two programs in Homeland Security/Emergency Management. One leads to a Certificate and the other to an Associate in Applied Science in Homeland Security/ Emergency Management. Wilmington University 320 N. DuPont Highway, New Castle, DE, 19720 http://www.wilmu.edu Criminal Justice Program



Israel’s Prime Minister Benjamin Netanyahu speaks during a news conference at his Jerusalem office May 18, 2011. Israel set up a government cyber command on Wednesday to secure the country against hacking attacks on its key networks and boost the competitiveness of local industries specialising in high-tech security. REUTERS/Ronen Zvulun

Cyber Warfare

Against Israel and Its Response By Dr. Joshua Sinai

E

very day tens of thousands of cyber attacks are launched against Israeli government websites, critical infrastructure networks, and the private sector to deface, paralyze and damage them. Israel’s cyber-warfare adversaries include enemy governments, terrorist groups, and extremist hacktivists. In response, Israel has established a robust cyber-security defense system, including numerous Israeli IT firms that are highly innovative in developing cyber-security products.

In a parallel development, “independent” Israeli hacktivists have emerged to counter their adversary hacktivist counterparts “tit-for-tat.” The cyber-warfare threats directed against Israel and its response have implications in terms of best practices and lessons learned for the United States and its allies, including their private sectors.

44

With advanced industrialized countries employing computer networks to control and manage their critical infrastructure at all levels of their economies, these systems invariably become increasingly exposed and vulnerable to a variety of cyber threats by their adversaries. Adversary capabilities range from highly technologically sophisticated state actors to less capable hacktivists, and their targets range from disrupt-

ing a country’s civilian water, electricity (including nuclear power), or transport systems, defacing government websites, to hacking into the databases of banks and credit card companies, making them temporarily inaccessible, or deleting or exposing their customers passwords and accounts. As one of the world’s most advanced information technology (IT) economies, Israel regards

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

cyber-warfare against it in “cyberspace” as a major national security front. The Israeli government’s networks and websites are among the most highly attacked in the world by its adversaries, whether enemy states, such as Iran, “cyber jihadis” (including Palestinian terrorist groups) and their fellow radical “hacktivists” (such as the international collective known as Anonymous). Every day tens of thousands of cyber


attacks are reportedly launched against Israel by its adversaries and this rate increases exponentially during wartime, such as last November’s 2012 Gaza War. The threat of cyber-warfare is so serious that Israeli national security officials are concerned about potential attempts by skilled adversary government “cyber warriors” to break into and sabotage the computer systems that manage the country’s vital national infrastructures, such as the train system, banking, water and electricity grids. Demonstrating the seriousness of how Israeli security officials regard this threat, at a conference on this subject at the Herzliya-based IDC in April 2011, former Israel Security Agency (Shin Bet) Director Ya’akov Perry warned that “Just as the events of Sep. 11 [2001] caught us by surprise, so could a major cyber assault.” As of mid-January 2013, the vast majority of the cyber attacks against Israel have failed to cripple its government’s websites and critical infrastructure, with those that succeeded, such as temporary denial of service or website defacement, being quickly neutralized.

While Israel’s government and critical infrastructure networks are considered among the best secured in the world against such cyber attacks, it is a different story, however, for the country’s private sector. While Israel’s government and critical infrastructure networks are considered among the best secured in the world against such cyber attacks, it is a different story, however, for the country’s private sector. According to recent reporting, many Israeli businesses and consumers are vulnerable to cyber attacks, which places them and the overall economy at some risk. What is remarkable about this vulnerability is that Israel has a reputation as a high-tech cyberwarfare powerhouse and is at the forefront of the cyber-espionage and disruptive campaign against Iran’s nuclear program, having allegedly launched (reportedly with United States cooperation) offensive warfare viruses such as Stuxnet and Flame. So far, the sub-state attacks against Israel have been of the hacktivist variety. Why do they target Israel? Like the role of terrorism in asymmetric warfare against a more powerful government adversary, in the hacktivists’ mindset, hacking into high-profile Israeli websites is viewed as an effective tool to temporarily damage or at least embarrass Israel by exposing some of its vulnerabilities. Examples of recent hacktivist attacks against Israel include the following: • In early September 2011, during the furor between Turkey and Israel over a pro-Palestinian humanitarian aid flotilla to the Gaza Strip, Turkish hacktivists hijacked an estimated 350 Israeli websites. • In January 2012, spurred by calls by Hamas to intensify the hacking of Israeli websites, foreign hacktivists temporarily disrupted the websites of the Tel Aviv Stock Exchange, El Al Israel Airlines, and three banks. • Also in January 2012, a Saudi hacktivist, codenamed oxOmar, succeeded in infiltrating an online Israeli coupon retailer and exposed the credit card information of thousands of customers. In response, the Bank of Israel ordered the country’s banks


to block IP addresses from Saudi Arabia, Iran, and Algeria, fearing hackers would attempt to penetrate their databases. • During the November 2012 Gaza War, “Anonymous,” the international network of hacktivists, which supports the Palestinian cause, launched a hacking spree against an estimated 700 Israeli websites, including the

the country from the Internet. Israeli authorities took the threat seriously, with comprehensive defensive measures instituted in response.

Response by the Israeli Government To counter these and other cyber threats against its critical infrastructure’s networks, the Israeli response has taken several forms. At the govern-

response capabilities. In February 2013, the IDF’s Computer Services Directorate (a new command) began deploying a new cyber-defense control center to counter the increase in the amount of attacks on its digital infrastructure. According to a February 2013 Jerusalem Post article by Yaakov Lappin, it is staffed by some 20 soldiers and is said to be capable of monitoring all attempted cyber attacks against it. According to Yoav Zitun, in an article pub-

energy infrastructure, financial markets, communications networks, and transportation sector against hostile cyber-attacks.”

Response by Israeli Hacktivists Interestingly, and reportedly independently of the Israeli government, in January 2012, in response to the Saudi hacktivist oxOmar’s publication of the credit card details of thousands of Israelis on the Internet, an Israeli hacker named

To counter these and other cyber threats against its critical infrastructure’s networks, the Israeli response has taken several forms. At the governmental level, in 2011 the Israeli government established the National Cybernetic Directorate (NCD) to set up a national “Situation Room” to handle attacks on government and private systems. database of the Bank of Jerusalem, one of Israel’s largest financial institutions, which was wiped out temporarily, although it was later restored. Some of its email addresses and passwords,

mental level, in 2011 the Israeli government established the National Cybernetic Directorate (NCD) to set up a national “Situation Room” to handle attacks on government and private systems. Known as Tehila (the Hebrew acronym for

lished in YNetnews, this cyber “war room” is also capable of launching counter attacks against any attacks by hostile cyber elements. Aside from this cyber control center, the IDF’s primary cyber defensive and offensive force, called Unit

Hannibal published information that enabled Web users to break into the accounts of some 20,000 Saudi Internet users, including their email and Facebook passwords. He claimed (although this was not substantiated) that he held information that would allow

According to a February 2013 Jerusalem Post article by Yaakov Lappin, it is staffed by some 20 soldiers and is said to be capable of monitoring all attempted cyber attacks against it. According to Yoav Zitun, in an article published in YNetnews, this cyber “war room” is also capable of launching counter attacks against any attacks by hostile cyber elements. however, were subsequently leaked onto the Internet. Anonymous has also attacked Tel-Aviv’s city page, an Israeli government commerce site, and Israel’s Ministry of Foreign Affairs website. • In early April 2013, Anonymous, along with other hacktivists, announced it was planning to launch a massive cyber-attack on Israel that would “erase”

46

“Government Infrastructure in the Internet Era”), it serves as the government’s overall cyber defense system. The NCD also promotes further research and development in cyber security at Israeli universities. With the Israel Defense Forces’ (IDF) digital infrastructure also a significant target for cyber attacks by the country’s adversaries, it has taken several measures to significantly upgrade its

8200, is reportedly comparable to the American National Security Agency (NSA). The IDF’s cyber-defense control center maintains continuous contact with the country’s security and intelligence services, such as the Mossad and the General Security Service (Shin Bet), which also run counter-cyber warfare departments. The Shin Bet’s Information Security Authority, according to Lappin, “is responsible for securing the nation’s

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

for the breaking in to 10 million Iranian and Saudi bank accounts, and threatened to cause billions of dollars in damage. Other Israeli hacktivists are also reported to be operating on their own. Following the hacktivist attacks against the websites of Israeli banks, the Tel Aviv Stock Exchange and El Al, for example, Israeli hackers responded by attacking the websites of the Abu Dhabi and Saudi stock exchanges.


Response by the Private Sector With governments, terrorist groups, and extremist hacktivists possessing the capability to launch cyber attacks against their adversaries, cyber defense has become a first order national security priority not only for governments but the private sector, as well. With the Israeli government considered highly effective at defending its critical infrastructure against adversary cyber attacks, the country’s private sector is also aware that it must protect itself against potential cyber attacks. As a result, Israel’s private sector has become one of the world’s leaders in cyber security innovation, with companies such as Check Point Software Technologies Ltd. becoming the world’s second-largest maker of security networks. Cyber-Ark Software Ltd. Is another major

Israeli cyber-defense company. Another Israeli firm, Group-IB, has developed BOT_TREK, which is a real-time botnet and cyber intelligence worldwide service that provides a direct access to compromised data in infected machines in order to ultimately sanitize such infected machines and their networks.

Conclusion The Israeli government and private sector websites are likely to continue to be targeted by “cyber-disruption”-type attacks, involving temporary defacement, denial of service, and occasional data breaches and theft. Such cyber attackers, whether by adversary states, terrorist groups, or hacktivists are likely to lack the sophisticated resources and expertise required to launch major attacks against Israel’s critical infrastructure.

While the Israeli government has called on the country’s hacktivists to stop their counter- attacks because, as stated by Dan Meridor, Israel’s deputy prime minister and minister for intelligence, they are considered “ineffective and shouldn’t be done in Israel’s name,” these hacktivists are unlikely to heed such calls, with future “tit-for-tat” attacks likely to continue. In the long-term, however, major cyber attacks against Israel by adversary states and their proxies are likely. Iran is considered the most likely state actor, as it ramps up its cyber warfare capability to launch major cyber attacks in retaliation for Israel’s (and America’s) cyber-warfare against its nuclear facilities and the intensification of the economic sanctions against it.

Already, Iran was alleged to be behind the Shamoon virus that crippled an estimated 30,000 computers at Saudi Arabia’s Aramco and Qatar’s RasGas in August 2012 and the wave of online traffic flooding attacks on American banks in late 2012. As seen by the latter cyber attacks, American financial institutions are likely to be targeted, as well. This is an expanded and updated version of Dr. Sinai’s article published by The Soufan Group on January 14, 2013. Reprinted with permission.

About the Author Dr. Joshua Sinai is a Washington, DCbased consultant on counterterrorism studies. He is the author of “Active Shooter – A Handbook on Prevention,” published by ASIS International in 2013. He can be reached at: Joshua.sinai@ comcast.net.

The Mexican Narco Journal (MNJ) provides: •

Bi-Weekly List of Narco Related Incidents

Bi-Weekly In-Depth Reports on Incidents Including:

Murders: Thefts, Kidnappings: Extortion: Bombings

Forecasts of Future Actions

Detailed Maps and Graphs Based Upon Weekly Events

Risk Ratings in Mexico’s Hot Spots

The Mexican - Narco Journal is a comprehensive document combining expert analysis and research with detailed coverage of Events and Criminal activities in Mexico.

For a Free Sample or additional info contact: www.iacsp.com / Tel: 571-216- 8205 / 201-224-0588 / iacsp@aol.com


Lethal Skies:

WHEN DRONES ATTACK

By William Pat Schuber

Supporters of the political party Pakistan Tehreek-e-Insaf (PTI) wave party flags and hold placards while listening to party head and cricketer Imran Khan lead a protest against drone attacks in Peshawar April 24, 2011. The main supply route for NATO troops in Afghanistan was temporarily closed on Sunday after thousands of people blocked a key highway in Pakistan to protest against U.S. drone strikes, officials said. REUTERS/Fayaz Aziz

48

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


O

n September 30, 2011, deep inside Yemen, a group of men assembled around a series of trucks in the desert. Thousands of miles away a CIA controller watched the scene unfold on a camera screen in front of him. Shortly before, orders had been given and a flight of unmanned vehicles, known as drones, had ascended into the air from a remote base deep inside Saudi Arabia. Now those drones were hovering in the sky above the assembled men and their trucks. The Predator drones projected laser beams onto the vehicles. The larger Reaper drones armed with Hellfire Missiles beamed on target and were readied for firing on command. Thousands of miles away, in a base outside of Las Vegas, the drone pilots monitoring the screens in front of them remotely fired the missiles destroying the vehicles and the men in a blazing conflagration. One of those killed was Anwar al-Awlaki, a radical preacher of Jihad and a high ranking member of Al Qaeda’s franchise in Yemen known as Al-Qaedain the Arabian Peninsula (AQAP). Also among the dead was Samir Khan, a militant propagandist for this organization.

These were not the first, nor would they be the last victims of drone attacks operated by the American military or the CIA. What distinguished these two individuals from all others were that they were American citizens. For the first time the United States government had sanctioned the targeted, extrajudicial killing of an American abroad. The principle target had been Awlaki, who the United States had been seeking for several years. Awlaki had been born in New Mexico, had been radicalized and had risen to be a high ranking member of Al-Qaedainspired militants in Yemen. He had inspired, given advice and supported several perpetrators of terrorist acts in the United States. Among these individuals was Major Nidal Hassan, who in November 2009 had killed 13 people at Fort Hood in Texas; Umar Abdulmutallab, the so-called “Underwear Bomber” who sought to blow up a Detroit bound airliner in December 2009 and Faisal Shahzad, the so-called “Times Square Bomber”. For this, Awlaki had been placed in the crosshairs of America’s latest technological weaponry for counter-terrorism, Unmanned Aerial Vehicles (UAV), more commonly known as drones. These deaths and the drone attack which killed Awlaki’s 16 year old American son, Abdulrahmen several weeks later, touched off a vigorous debate that goes to the very heart of American constitutional law and civil liberties. Indeed, it represents a landmark event in American law. This debate as to the efficacy of these killings has reverberated in editorial pages, courtrooms and the halls of Congress. This article examines the history of the use of drones, and the laws that impact their use. The use of robotic type instruments for combat purposes has long been the staple of science fiction. At the beginning of World War II, Lee de Forest an early pioneer of radio technology, had written in Popular Mechanics about the concept of

In this Nov. 8, 2011 file photo, a Predator B unmanned aircraft taxis at the Naval Air Station in Corpus Christi, Texas. (AP Photo/Eric Gay, File)

What distinguished these two individuals from all others were that they were American citizens. Awlaki had been placed in the crosshairs of America’s latest technological weaponry for counterterrorism, Unmanned Aerial Vehicles (UAV), more commonly known as drones.


an unmanned air vehicle suitable for combat. But it would be the Nazis who would initially bring this concept into fruition with their development of V weapons in 1943 and 1944 at their secret site, Peenemunde on the Baltic Sea. Particularly the V-1 missile has the look of a prototype for the modern drone. The American military began experimenting with drone-type vehicles in the 1980s, however, it is during the War on Terror in the post 9/11 age that the use of this technology has come into its own. Each branch of the service as well as the civilian CIA maintains and operates several types of drones. Initially, these devices were used for surveillance and intelligence gathering. However, they have now been used for targeting enemy combatants initially in Iraq but now primarily in Afghanistan and Pakistan. In addition, as we have seen, drones have been used also over the skies of Yemen and possibly Somalia. The U.S. has recently established a base for drones in the West African nation of Niger for the purpose of monitoring Islamic militants in the vast area of Sub-Saharan Africa known as the Sahel. The drone control center operates primarily on military bases outside of Las Ve-

The advantages of using drone technology are many. First of all, no American is put at risk of injury or death in combat. Secondly, it provides excellent surveillance of remote areas of combat zones providing real time information about enemy movements. Thirdly, it allows a more focused attention to a target which can prevent the collateral damage and death of innocent people. Finally, it eliminates the legal problems that have come about as a result of the interrogation and detention of enemy combatants.

gas, Nevada. A drone team will normally consist of a pilot who directs the vehicle remotely, an individual who monitors the visual screen and a person in communication with those individuals closer to the field of operation. The drones themselves are launched from remote bases in the Middle East. Interestingly, a recent scientific report has indicated that drone pilots have been suffering from elements of post-traumatic stress disorder often seen in those more directly involved in combat. More information through study will be necessary to determine the reasons for this. The advantages of using drone technology are many. First of all, no American is put at risk of injury or death in combat. Secondly, it provides excellent surveillance of remote areas of combat zones providing real time information about enemy movements. Thirdly, it allows a more focused attention to a target which can prevent the collateral damage and death of innocent people. Finally, it eliminates the legal problems that have come about as a result of the interrogation and detention of enemy combatants. The disadvantages can be that collateral damage can still occur and in fact has occurred. An example of this is the May 2010 drone strike in Yemen which mistakenly killed a Provincial Governor. Some critics have argued that the perception in the Middle East of our use of this technology shows arrogance on our part and leads to intense opposition to U.S. policy. For example, if Mexico, without our permission, was to use a drone over the skies of Texas to kill a known drug cartel leader. As an American, we would not shed a tear for the loss of the cartel member, but we more than likely would be angry over the presumption that Mexico could violate our sovereignty. One can only imagine the national outrage if American citizens were the collateral damage of that attack. In addition, the United States has been criticized by the United Nations for their use as being a violation of international law. In fact, the Human Rights Council of the United Nations has undertaken a nine-month study of this issue. The United States is not the only nation that uses drones. The United Kingdom,

50

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


Germany, Israel and China are just a few of the other nations which maintain this technology. There is no doubt that it will be an increasingly integral part of the defense weaponry maintained by more and more nations. Accordingly it is important for us to understand the legal implications of their deployment and use. Prior to 9/11, the United States had been highly critical of other nations who had practiced extrajudicial killings. In particular, the United States had criticized Israel for its policy in doing just that. In fact, the Omnibus Crime Act of 1994 prohibits the killing by an American of another American on foreign soil. The U.S. position on this changed in the aftermath of the terrorist attacks on September 11, 2001. On September 14, 2001, at President Bush’s request, Congress passed a joint resolution known as Authorization for Use of Military Force (AUMF) which granted the President the authority to use all “necessary and appropriate force” against those whom he would determine had planned, authorized, committed or aided the September 11th attacks or

those who would harbor such persons or groups. It is this resolution, the powers of the President of the United States as Commander-in-Chief of the U.S. military and the presidential oath of office which states that the President shall preserve, protect and defend the Constitution of the United States which have been used to support presidential authority in ordering the death of Americans abroad who may be aiding terrorist attacks against the United States. This policy of national self-defense is recognized by the global community as a legitimate role of government. How that policy is exercised can be the potential problem. On the other hand, the Bill of Rights extends protections to Americans from arbitrary action of its government. More specifically, the Fifth Amendment guarantees that all Americans shall not be denied the protection of their life, liberty and property without due process of law. The Fourth Amendment protects individuals from unlawful searches and seizures. The Sixth Amendment sets forth rights of Americans related to criminal prosecu-

tions, including the right to a speedy trial. It is the juxtaposition of these two bodies of constitutional law that appear to come in conflict as we review the matter of the authorized killing of Anwar al-Awlaki, an American citizen. The increased use of drones as part of an effective U.S. counter-terrorism strategy has thus intersected with legal and ethical concerns about their lethal use in targeting an American citizen and the death of two others. As the U.S. concern about the threat posed by Anwar al-Awlaki grew, the Office of Legal Counsel within the Department of Justice produced a legal analysis (which has become known as the White Paper) supporting the developing policy of such targeting. While President Obama has not acknowledged direct involvement in the process of killing al-Awlaki, a speech by Attorney General Eric Holder and leaks to NBC make it clear that this is the President’s decision and that this legal memo justi-


fying the policy does in fact exist. However, up until now, the administration has steadfastly refused to disclose the entire document. This has led to increasing criticism by Senate Intelligence committee members of arbitrary executive authority and its chilling effect on the civil liberties of Americans abroad. Indeed, Kentucky Senator Rand Paul conducted a thirteen hour filibuster on the Senate floor over the possibility of the use of drones to kill Americans at home. Under pressure the Administration has had to release excerpts of its White Paper to these Congressional leaders, and as a result the outline of that policy is known. In essence, the policy provides that the United States can use lethal force against an American citizen abroad who it is believed to be planning attacks against the American persons or interests. More particularly, it states that where an informed, high-level official of the U.S. government has determined that the targeted individual poses 1) an imminent threat of violent attacks against the United States; 2) is a high ranking member of Al Qaeda; and 3) that person’s capture is not feasible. Then, under those circumstances, lethal force is justifiable. However, the government definition of the word imminent is very broad and does not require the United States to have clear evidence that a specific attack on U.S. persons and interests will take place in the immediate future. As a result, the chance of greater collateral damage when a legitimate target is so broadly defined is more likely. This has given rise to major concerns of certain members of Congress as well as civil liberties groups over an extensive overreach of executive authority. Indeed, there have been two challenges to this policy. In 2010, a federal court rejected a suit brought by al-Awalki’s father seeking to overturn the policy. In December 2012, another federal court rejected a request by the New York Times and the American Civil Liberties Union seeking the release of the so-called White Paper. Some congressional critics have argued that a special court should be created to screen decisions to target Americans. This would be similar to the secret court created to screen the wire-tapping of foreign intelligence agents created by the Foreign Intelligence Surveillance Act. So far, there has been little enthusiasm shown by the Federal Judiciary to be involved in the potential signing of death warrants.

52

What is clear, is that the increased use of drones is inevitable, and a valid instrumentality of an effective U.S. counterterrorism strategy. In the need for speedy and efficient actions that are part of the new warfare against foreign non-state terror organizations, the President, as Commander-In-Chief, needs the flexibility and the ability to protect the national security. This may require the killing of an American born terrorist such as al-Awalki when they pose a direct threat to the United States and its people. In such cases, those individuals become the equivalent of a wartime enemy potentially subject to elimination.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

What is clear, is that the increased use of drones is inevitable, and a valid instrumentality of an effective U.S. counter-terrorism strategy. In the need for speedy and efficient actions that are part of the new warfare against foreign non-state terror organizations, the President, as Commander-In-Chief, needs the flexibility and the ability to protect the national security. This may require the killing of an American born terrorist such as al-Awalki when they pose a direct threat to the United States and its people. In such cases, those individuals become the equivalent of a wartime enemy potentially subject to elimination. On the other hand, an effective counter terrorism strategy that protects U.S. security requires the complete support of the President, Congress and the American people. A lack of transparency of that policy by cloaking it in unnecessary secrecy or burdening it with bureaucratic obstacles undercuts its credibility and effectiveness. This policy, particularly as it relates to the potential death of an American, needs to be narrowly defined, specifically focused and subject to the necessary oversight of the appropriate congressional leaders of the intelligence committees of both houses, as is the case with all other intelligence policies. Essential to all of this I believe is the need of the President to fully disclose this policy to the American people. Only then can credibility of and support for such a major policy be built and maintained. Only then can the delicate balance between the needs of national security and the protection of our civil liberties be safeguarded. While the elimination of threats to our national security are an essential element of our national policy, the death of an American without due process, and in keeping with our foundation of liberties, should always be a last resort.

About the Author William “Pat” Schuber served as The County Executive of Bergen County for 12 years, 9 years as a member of the New Jersey State Assembly and Mayor of the Borough of Bogota for 4 years. He is an Associate Professor at the School of Administrative Science, Petrocelli College, Fairleigh Dickinson University. He is a faculty member in the Master of Administrative Science (MAS), Master of Science in Homeland Security (MSHS), Master of Sports Administration (MSA) and Bachelor of Arts in Individualized Studies (BAIS). His courses include Leadership, Government, Homeland Security, Law, Ethics and Communication. He served as a Captain in the US Army Reserve (Retired).


CRC_AWM06_IACSP AD_Layout 1 1/22/13 1:08 PM Page 1

Save Now on These Counterterrorism and Security Management Books

CRC Press is a premier publisher of books on Counterterrorism and Security Management.

Visit www.crcpress.com to see our complete selection of titles and use promo code AWM06 to receive a 25% DISCOUNT.

Sign up for our emails and get more special savings!


Secure Driver:

Breathing

N

By Sean McLaine

ot many people would find a connection between SCUBA diving and driving a racecar, but many people aren’t crazy enough to try either of these things. If you are reading this article, chances are you are a type-A, high gear personality who is familiar with the Acute Stress Response.

Acute stress response (commonly referred to as fight or flight) is activated by signals in our environment that cause us to feel we are in danger. The bodies’ autonomic nervous system consists of two parts-sympathetic, and parasympathetic. The sympathetic branch turns on quickly whenever we feel threatened. It increases the heart rate, respiratory rate, and metabolic rate preparing for fight or flight. Afterwards, the sympathetic system is supposed to quiet down while the parasympathetic system is activated to slow the heart and respiratory rates, and calm the mind. Take a look back over the last paragraph and pick out the one thing that you can control. While you ponder that, I’ll tell you that exhaling bubbles 40’ under water in zero visibility and driving a car while fogging up a full-face helmet both provide immediate and easily recognizable indicators of your respiratory rate. In other words, I could tell without thinking about it that I was scared and breathing heavily. As a result, I learned to focus on

54

taking slow, deep breaths during times of stress. The brain uses carbon dioxide levels to gage your breathing. When you are fearful, your muscles tense and you begin to breathe with your chest and not your diaphragm, which causes shallow breaths. Taking short breaths moves too much carbon dioxide out of the blood stream and can heighten anxiety and lengthen the stress response. Breathing from the diaphragm reduces muscle tension and anxiety levels. Taking slow deep breaths, stimulates the parasympathetic branch,

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

which we learned earlier is responsible for the relaxation and recovery portion of the process. Slow deep breaths signal to the brain that the threat is over. Keep in mind, it is impossible for the body to be relaxed and stressed at the same time. Take a minute and ponder what we are talking about and how it fits into your role as a security driver. Driving at the high end of the performance envelope is stressful in itself. For a security driver, we cannot ignore the fact that what would cause you to drive in this manner is an


event, that in itself, would trigger your fight/ flight response! Many things are happening at once, and it is easy to get overwhelmed. First, we have a perceived danger causing us to drive fast. From there we throw in ABS, squealing tires and lateral forces. Maybe we have rain or snow decreasing our coefficient of friction or a screaming passenger. Lastly, we can throw in some tunnel vision for good measure. By the way, did you leave your coffee and book on the dashboard? Having unsecured items falling into the steering wheel certainly won’t help matters. Whenever there was a passenger in the car with me when I was driving, I would tell them that in an emergency, it was their job to make sure I stayed calm. If they got excited and began yelling, that would cause me to get excited, and as a result I would focus less on my driving. This could lead to mistakes from poor judgment, and the more the survival response is working, the less fine motor skill you possess. This translates to less feel for what the car is doing, and more difficulty making small corrections.

You have to drive the car just like you would if we were not in the middle of an emergency . . . things are just happening more quickly. During these moments, the body is using what is referred to as the Survival Brain. This portion of the brain is designed to physically react, which can lead to reflexive decisions and mistakes. The survival brain consumes such a large amount of chemicals that it leaves little for the rest of the body. By taking deep controlled breaths, it is possible to move away from the survival and emotional portions of the brain, and use the logical portion to accomplish a task. If you work in a motorcade where radio communication is essential, quick, stressed breathing can cause you to blurt out information in one high-pitched breath. This can cause words to be misunderstood, and the radio can over modulate making it impossible for those on the other end to understand. Lastly, don’t think that wild, physically dangerous situations are the only things

that can cause your performance to deteriorate. As an instructor, I have seen many examples of self-imposed stress causing a student to improperly perform a task. Over the course of several days, we put students through the paces doing one exercise at a time until they gain a level of proficiency. However, when we do the final evaluation (in which all the exercises are combined), some students have difficulty where they had none before, and some fall to pieces. The presence of a stop-watch and a critical eye can have the same effect on some people as gunshots. Always keep this in mind; your number one job is to drive the car! The more you take control of your situation, the more comfortable you will feel. By knowing how to stay calm and doing what it takes to stay focused and in control, you put the odds in your favor.

About the Author Sean McLaine is the Lead Instructor at Advanced Driving & Security Inc

" % # " "

# & & ( # ( * '& ( ) # $$ '# &+ # ( # + ' # # $ # (

ADSI

# & & ( '# &+ # & $ # & & & + # ( '# &+ ) # $$

# # $ # # $ Please make sure this ad and all other non-bleeding ads are centered in the page accordingly and/or blue border lines that # # & & # ( # # surround the page, Thanks! #& & &+ ! #

* # #. )# . %# !!4 ) % # 5 1 # ) 1 # * %%! *' ! 5 # # .) # # 0) .4 ) 1 )* 3 0. 1 )%. . %# "* # %*. # " #4 %)'%) . ! . .4 ')% ) "*( 1 . ! .4 .% * # # "'! " #. %0)* * %) 2 0 # *' ! 5 # # %)'%) . 0) .4 # 2 # %) " #. .) # # (

( # ( '# &+ "

/&6 )'%). .( 0 . &6 %). # *.%2# 6/ / ! 6& /$ &,66 3 6& /$ +,66 ! # % & * ( %"

!

$$$


2014 World Cup:

Brazil Braces For Security Challenges By Viviane Vicente Bencie and Andrew Jacobsberg

Police officers specializing in handling contaminants enter a hotel wearing protective suits during an emergency simulation exercise in Brasilia March 27, 2013. REUTERS/Ueslei Marcelino

56

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


A

s the 2014 World Cup looms closer, Brazilian enthusiasm seems to compound: this is a great moment for the country, as it will finally host the world’s biggest and most important tournament for their strongest passion: soccer. Brazil will be the center of attention, and their ‘seleção’(1) is going to be within sight and reach – an important fact given the distance that has emerged between the national team and the people. A golden generation of players, who are in their early twenties and play in some of the world’s most prestigious leagues, is going to have the chance to bring home the sixth star. The pressure will be big, as the ghost of the 1950 ‘Maracanaço’, when Brazil lost the World Cup final to Uruguay in front of two-hundred thousand people at the Maracanã stadium, continues to haunt people’s memories.

The pressure on the players however, does not compare to that on the country. Although very different in terms of who will be exerting the pressure, the objectives and the consequences of a potential failure bear an interesting resemblance. In the case of the ‘seleção’, it is the Brazilian people who look at them with great expectations, high hopes and little tolerance for failure. As for the country, it is the international community that anticipates a top-class event, in terms of organization, infrastructure, and, of course, security. This divergence in priorities between the Brazilian people and the international community serves as a good example of two interesting elements about Brazil: first, the strength of the passion which surrounds soccer, which explains why Brazilians will forget everything else when there is a chance of winning the ‘hexa’(2). Second, it is testament to the very evident fact that although Brazil is developing as a global economy, development has not yet hit the masses. Most people are not worried about the cost (including that of fueling corruption), the feasibility and the effort required to host an event at the highest international standards. Nevertheless, the pressure on both the players and the country resemble each other in the sense that accomplishment will be measured by results, and that the consequences of failure will be deep disappointment, an almost permanent stain on reputation, and the dissolution of high hopes. For the Brazilian people, anything short of the title means failure, and anything short of making the quarterfinals would be a national tragedy. The effort displayed by the team, their dedication and the seriousness with which they play each match does have some value in people’s eyes, but only in the case of a defeat: a win is a win, and the results are infinitely more important than the way they were achieved. Similarly, the international community will measure Brazil’s performance only by what is seen at the event itself: the work conducted behind the scenes, the last-minute problems and the unsuccessful

but honest attempts will not be given significant weight when it comes to evaluating Brazil’s performance as a host.

The expectations for Brazil are huge, given the country’s aspiring role in international affairs, its signs of solid economic development, and the recent surge in interest and fascination with the country, which has created a somewhat idealistic image of Brazil.

That being said, the expectations for Brazil are huge, given the country’s aspiring role in international affairs, its signs of solid economic development, and the recent surge in interest and fascination with the country, which has created a somewhat idealistic image of Brazil. In the international realm, the country has attempted to take a prominent role in the United Nations, pushing for reform of the Security Council and aspiring to a seat in the near future. In addition to being an economic driving force above all American nations south of the Equator, Brazil has also recently become the face of Latin America to the developed world, partially due to the charisma that former president Lula projected (despite his administration’s shortcomings), and partially due to the economic progress that is being made (also as a result of previous governments’ initiatives).

In addition to being an economic driving force above all American nations south of the Equator, Brazil has also recently become the face of Latin America to the developed world, partially due to the charisma that former president Lula.

The level to which the previously mentioned expectations are met will be measured through two main categories: infrastructure and security. With regards to the former, what seems not to be understood by many is that the timid 1% GDP growth in 2012 is a reflection of the strong bottlenecks on the Brazilian economy, and the difficulties the country is facing as it attempts to resolve these issues. Lack of infrastructure, especially in transportation, is a huge problem that is tightly linked to the 2014 World Cup and the subsequent 2016 Olympics, to take place in Rio de Janeiro. This relation is circular, for although these events are supposed to provide the country with lasting infrastructure, a lot of more basic infrastructure must be built in order to allow for the construction of the events’ planned legacy, and at this point it has become increasingly clear that the infrastructure developed for these events will not be enough to end Brazil’s chronic infrastructure challenges. Therefore, in the realm of infrastructure lie great


opportunities for development, but great frustrations in the case of underperformance. With regards to security, the issue is more complex, in part because, differently from infrastructure, one cannot simply build security through higher walls (even though São Paulo and Rio de Janeiro have tried). Providing security requires easing social tensions between socio-economic classes, educating the masses and taking firm decisive action to deal with gangs, drug lords and other militias. With a little over a year to go, not much can be done in terms of correcting the economic disparities, and the lucrative criminal activities will not diminish in time. But certain measures can prove effective to ensure a peaceful, enjoyable tournament to both locals and visitors, and that is what we need to observe as Brazilian institutions gear up for the event. If those measures are taken with a mindset for lasting results, one not common in Brazilian history, they may clear the path for many of the aforementioned issues to be mitigated in the coming decades. At the federal level, in 2011 the Special Secretariat for the Security of Major Events (3) was created, under the umbrella of the Ministry of Justice. Led mainly by former members of the Federal Police as well as state law enforcement agencies, the Secretariat has the mandate of “planning, defining, coordinating, implementing, following and assessing public safety initiatives for major events, especially the FIFA Confederations Cup in 2013 and the FIFA World Cup in 2014”(4). In its Strategic Planning document, the Secretariat acknowledges that the main challenge lies in integrating efforts, human resources and material assets across the different agencies involved, and adequately allocating the public funds made available for the event. It also recognizes that the initiatives and investments made will become part of the future security reality, and that the outcome will undoubtedly mark the country’s image. It is pertinent to mention that Brazil recently hosted the Pan American Games (which took place in Rio de Janeiro in 2007) with no major security incidents. The Games, which may make for a “mini Olympics”, served as an example of what Brazil can accomplish when the world’s eyes are upon it. At the time, when the situation of urban violence in Rio was not much different from nowadays (perhaps a bit worse, before the advent of the UPPs (5), the federal government decided to deploy military troops to help patrol the city and the surrounding venues. It proved to be a successful initiative, although not certain to be repeated – Rio has a somewhat limited geographic territory, whereas the country has, as its nationals proudly declare, “continental dimensions”. But the World Cup faces the country with much larger demands: twelve cities, located

58

in twelve different states and considerably far from one another, will be hosting matches: Belo Horizonte, Brasília, Cuiabá, Curitiba, Fortaleza, Manaus, Natal, Porto Alegre, Recife, Rio de Janeiro, São Paulo and Salvador. A trip between any two of those host cities may take from 40 minutes to almost 5 hours (that is, if nonstop flights were available for all routes). Another important aspect to be observed, and which can significantly impact security efforts, is the discrepancy found in the availability and quality of services in different regions of the country. The training requirements and resources at the disposal of law enforcement agencies across the 12 venues vary sharply, as a reflection of the economic development of each state. Private security companies cannot escape this reality, as educational institutions and market demands, place the most qualified professionals in the wealthiest pockets of the country. The hope, once again, lies in the challenge acknowledged by the Special Secretariat: integration of resources.

Liaison Center, which will host law enforcement representatives of all countries present at the event. The role of the Armed Forces during the World Cup seems to have matured since the 2007 Pan American Games. The Strategic Plan calls for preserving the functions of National Security and protection of the Constitutional State. Border defense and environmental crimes constitute shared responsibilities with police agencies, but core functions include protection of critical infrastructure; cyberspace; air and maritime defense, and deployment in case of chemical, biological, radiological or nuclear disasters. One interesting and particular aspect is the provision for the Armed Forces to ultimately deploy, upon request of a Governor and ordered by the President, should a labor strike by any of states “military police” forces (6) occur. In that case, the Armed Forces would be responsible for patrolling the perimeter surrounding each venue.

Command Centers, monitoring equipment and innovative technologies are a big part of the strategy planned, and large sums are being disbursed to acquire the necessary apparatus.

In terms of private security, world soccer’s governing body, FIFA, has recently launched new security regulations, with distinct responsibilities assigned to public and private forces. And the Brazilian authorities seem happy to comply. Currently, in Brazil, public safety agencies are charged with all aspects of securing sporting events, inside and outside venues. In adopting FIFA’s model, however (or the “English model”, which the Strategic Plan considers the most appropriate), law enforcement agencies will be responsible for the security of the territory and outer perimeter of each venue, including the roads and public transportation routes used by teams and fans, whereas private security companies will work to maintain order within the stadiums. Public forces will only intervene in case of a real threat to the public order. The use of “stewards”, as has been occurring in many European tournaments, is yet another challenge to be overcome by Brazil. It should be interesting to see how the local audiences, as well as members of the various law enforcement agencies, react to a private force, essentially deprived of any legal authority, in a country that returned to a full democracy less than 30 years ago, after a period of military dictatorship.

Following the same motto, the main objective is to integrate the information systems, databases and monitoring capabilities across the different cities and states, to complement the existing national system. The plan is to have an International Cooperation Command, based in Rio de Janeiro; a National Command, based in the nation’s capital, Brasília (with a redundancy in Rio); twelve regional centers – one for each host city; as well as two mobile command posts per host-city, to be deployed according to the specific needs at the time. The Strategic Plan also provides for an Intelligence Coordination Center, headed by the Brazilian intelligence agency, ABIN, and an International Police

In terms of terrorism, Brazil has a tradition of downplaying the issue in all of its international events, with some reason. The country has faced, in the past, actions by guerrilla groups opposing the military government and other subversive militants and their tactics. But the threat has always come from within, and with the resurgence of the democratic state, many of those who posed a threat are now mainstream. However, the globalized world has transformed that scenario for all of us, and no nation has the luxury of not having to think about terrorism. From allegations of tri-border region merchants funding Middle Eastern terrorist organizations (7) to the simple threat that follows American entities

The security strategy outlined by the Brazilian authorities was based in the risk assessment conducted under the parameters of the local intelligence agency (ABIN), which listed the following criteria: • Organized Crime • Civil disturbance/violent fans – hooliganism (local and foreign) • Sexual abuse, sex traffic/tourism, child sexual abuse • Border crimes • Natural disasters • Terrorism and extremist organizations The Special Secretariat is acting in conjunction with each state’s Secretariat of Public Safety and/or Civil Defense; most host states have also created Special World Cup sub agencies, with Security Committees in charge of the integration with the federal Secretariat.

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2


wherever they travel, Brazil is now taking a more serious approach to combat a problem it now acknowledges. The Special Secretariat and its Strategic Plan recognized the challenge of controlling the country’s 15,719 kilometres (or 9,486 miles) of dry borders (with 10 different countries), and the importance of turning to intelligence and technology in the fight against foreign attacks. Drug and gun trafficking remain as high concerns, and so it seems that the efforts on both fronts are intrinsically linked in the strategy presented. A few initiatives worth mentioning are the acquisition of unmanned aerial vehicles by the Air Force and the Federal Police; the enactment of a new legislation for air traffic control with directives in case of “illicit interference”), and the integration of the Federal Police systems into the I24-7 system created by Interpol (8), which facilitates the exchange of information in case of international crimes, illegal immigration and other border issues across 188 countries. In terms of maritime security, Brazil is also a signatory to the International Ship and Port Facility Security Code –ISPS Code, which for a country with 7,367 kilometres (4,604 miles) coastal line, is not something to be dismissed. Challenges remain as not all the 27 states have the capabilities of AFIS (9), and the

Customs agency is still in process of purchasing portable scanners for its border agents, but the silver lining may be that although not in the ideal stage of development, those issues are not being overlooked.

About the Authors

Emergency Preparedness is also a growing concern and recent matter of cooperation between Brazil and foreign governments, including the United States’. Last year a joint commission between the Brazilian Ministry of Science, Technology and Innovation and the US Office of Science and Technology Policy was established to collaborate when dealing with floods, landslides, and also with regard to major events. On the same token, the US Trade and Development Agency is helping finance the establishment of an Emergency Operations Center in Rio de Janeiro.

Andrew Jacobsberg is a student at the Edmund A. Walsh School of Foreign Service at Georgetown University, and a research assistant at and Security Management International, LLC. He can be reached at ajacobsberg@smiconsultancy.com.

Integration of resources, smart use of public funds, and international cooperation seem to be the known challenges that the country in taking on wholeheartedly. A Brazilian delegation, comprised of members of the Special Secretariat for the Security of Major Events (SESGE), the Ministry of Defense and the intelligence agency (ABIN), was invited by the United States Government and came to New Orleans last February to observe the security aspects of the Super Bowl. Let us hope that the football delivered in 2014 is just as good.

Viviane Vicente Bencie is the Vice President of Operations at Security Management International, LLC. She can be reached at vvbencie@smiconsultancy.com.

References 1 Brazilian men’s national soccer team. 2 Term used to reference the sixth Brazilian World Cup to-come. 3 Secretaria Extraordinária de Segurança para Grandes Eventos (SESGE) http://portal.mj.gov.br/main.asp?ViewID=%7B4D7F181F %2D8A85%2D42B2%2D968A%2D12EED0FB46DA%7D &params=itemID=%7BD73FF813%2D264E%2D45C1% 2D94B3%2DAD10003F183E%7D;&UIPartUID=%7BE0 EA6E2F%2D2D28%2D4749%2D9852%2D31405415DD8 5%7D. 4 From the Strategic Planning document (in Portuguese) released by the Secretariat in January, 2012 http:// blog.justica.gov.br/inicio/wp-content/uploads/2012/07/ Planejamento-Estrat%C3%A9gico-Atualizado-.pdf. 5 http:// en.wikipedia.org/wiki/Pacifying_Police_Unit. 6 Each of the 27 Brazilian states has at least two law enforcement agencies: the Civil Police, charged with criminal investigations, and the Military Police, a uniformed force charged with patrolling and preventing crime. 7 http://www. loc.gov/rr/frd/pdf-files/TerrOrgCrime_TBA.pdf. 8 http://www.interpol.int/INTERPOL-expertise/ Data-exchange/I-24-7. 9 Automated Fingerprint Identification System.

COUNTER TERRORISM

SECURITY NEWS YOU NEED TO KNOW

Aviation, Corporate, Cyber, Global, Homeland, Maritime, Law Enforcement, Intelligence Photo credit U.S. Department of Defense.

IACSP and PlanetData present a new website bringing you counterterrorism news, articles, events, and more.

www.planetdata.net/ct


An IACSP Q&A

Michael J. Sulick

Author of “Spying in America.”

M

ichael J. Sulick is a retired intelligence operations officer who was director of the CIA’s National Clandestine Service (2007-10), where he was responsible for supervising the Agency’s covert collection operations and coordinating the espionage activities of the U.S. Intelligence Community.

During his twenty-eight year career, his assignments also included chief of CIA counterintelligence (2002-04) and chief of the Central Eurasia Division (1999-2002). He also holds a Ph.D. in comparative literature from the City University of New York.

Michael J. Sulick is also the author of “Spying in America: Espionage from the Revolutionary War to the Dawn of the Cold War.” The book offers more than 30 case histories of espionage in the U.S. These cases include Americans who spied against their country during the Revolutionary War and the Civil War, as

60

well as foreign agents who ran operations on American soil during the two World Wars and the beginning of the Cold War. Michael J. Sulick discussed espionage history and current threats with Paul Davis, an online columnist (Threatcon) and a contributing editor to the Journal of Counterterrorism & Homeland Security Int’l.

IACSP: Why did you write formation in one volume. After the book?

SULICK: Well, I use to run

the counterintelligence center at CIA and I gave various lectures and presentations in the building and the community. I liked to use historical examples and I found myself running into all these different books and I wished that they had all this in-

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

I retired, something dawned on me that I could write that volume. I had a path in the academic world as I had written a dissertation and so on, and I was an academic nerd at one time, so I was returning to my academic roots.

IACSP: How did you research the book?


SULICK: I decided to go on the battlefield. Given his ego

chronologically and I used some of the cases I was aware of, like Benedict Arnold. There is clearly a lot written about him so I delved into that and did what any researcher does. The more you read the more it leads you to other things to read.

and all of his resentment from the way he was treated, passed over for promotion and the like, that is kind of what drove him to espionage. There was another side to Arnold that most people don’t see. That didn’t excuse what he did, obviously.

IACSP: Did you have a hard IACSP: But perhaps it ex-

time cutting things out, considering the size of your book?

SULICK: Yes, there were certain things I had to take out. Actually, what I did was one volume from the Revolutionary War all the way up to the present and it was over 500 pages. I decided to split it in two so I have a second volume that covers pretty much from where I left off at the beginning of the Cold War all the way up to the present. That’s due to come out later this year. IACSP: I look forward to

reading that as well. I suppose one of the worst spies and traitors in American history is General Benedict Arnold. What did you think of him?

SULICK: This is a guy who

could have been one of the great heroes in American history. Everyone focuses on the treason rather than his whole career. He was the only general who won major battles on both land and sea. There was one battle that he lost, but in doing so he so hurt the British that they had to give up their campaign to split up the colonies. And he did suffer a number of injustices. At the time, a lot of generals forked over their own money to supply their troops with the understanding that they would be repaid by the Continental Congress. When he asked to be paid – louder and more obnoxious than others - he was shortchanged. He had this tremendous ego and he was a guy clearly more comfortable

plains his treason. Would you say that ego was a primary motivation not only of Arnold, but many of the spies we know of?

SULICK: Yes. Usually the

best spies or best sources, I know from my own career, I had a combination of motives. Clearly, money is always the overriding one. It is a combination of things, like thrills, money, revenge and something like that. But ego often plays a part. A lot of the spies want to get revenge because they feel their great talents haven’t been recognized. That’s where the ego plays in.

IACSP: That would explain Aldrich Ames (a CIA officer who spied for the Soviets), would it not?

SULICK: He thought he was smarter than the rest. That’s part of the ego. But he needed money desperately, that was his main motivation. IACSP: I suppose it takes a

huge ego to take that leap to steal secrets, knowing the consequences.

SULICK: One of the points

I like to make is that the same motives that propel people to do this also winds up being their downfall. The ego propels them to spy and often it is the ego that gets them caught in the end. They think they are better than anyone else, they’ll steal a little bit more, they don’t think their guys can catch them, and of course in the end it doesn’t

turn out that way and they do get caught.

IACSP: I think it is interesting to note that two of our founding fathers – George Washington and Benjamin Franklin – were also spy masters. Where do they stand in the history of espionage? SULICK: The CIA recog-

nizes George Washington as the Father of American intelligence. He first became exposed to intelligence during the French and Indian War. In the Revolutionary War he realized he was fighting a professional military force and he was dealing with insurgents on his side, so he saw intelligence as giving him an advantage. He was very much into deception operations and double agents to gain the upper hand.

IACSP: And Franklin? SULICK: Franklin’s specialty was what we call today “covert action.” Not specifically spying, but trying to influence events in other countries but hiding the American hand in the process. Like the Contras or the overthrow of the Iranian government in the early 1950’s. Franklin is now acknowledged by the CIA as the Father of Covert Action.

IACSP: You wrote about a spy in Franklin’s camp.

SULICK: Yes, this guy

named Edward Bancroft. There are some who say Franklin was hoodwinked but others believe Franklin was too clever for that. He knew this guy was a spy and he used him to feed false information to the British. There is really not enough information to be certain.

IACSP: Franklin was very clever. Why didn’t Franklin write about it after the war and expose Bancroft?

SULICK: Few of them did.

There is a novel by James Fenimore Cooper called “The Spy.” The character is modeled on a guy I mention, Enoch Crosby. Cooper knew John Jay, who ran the operation, a kind of counter-espionage service in New York. Jay would not tell him the guy’s name but he told him about some of his exploits and Cooper took it from there. All of these guys were kind of reticent about this.

IACSP: Unlike today. SULICK: Yes, exactly. IACSP: In your view who stands out as the singular great Civil War spy, if there is such a person?

SULICK: I think it is the Union spy Elizabeth Van Lew. I was impressed with her. She was a single woman in the middle of the 18th century, no background or training, not that anyone else had any either, but she built up this network and her tradecraft was incredible for that time. She interviews these prisoners of war who have information about battles and she takes the information out in phony bottoms in egg baskets and stuff like this. She developed her own code and not only does she encrypt the information, she also splits it up and sends it out by different routes. She uses these couriers, farmers and merchants, and she uses slaves as well. In the south you aren’t going to pay attention to a slave. She had one slave, a woman she sent north for an education who comes back, and Van Lew manages to get her planted as a serving maid in the house of Jefferson Davis. I wish I had somebody like that in Ahmadinejad’s circle when I was in the CIA. For somebody who had no background at all, she was one of the more


innovative people. Espionage was not well-developed for either side at that time.

IACSP: Looking at the two

world wars, who in your view stands out as the great spy?

SULICK: The Germans and the Japanese were not all that good at spying. One guy who could have made a difference was a “little gray man” named Herman Lang. He stole the blueprints of this thing called Norden Bombsight. IACSP: That was an interesting story.

SULICK: That was the big military secret at the time. Fortunately, the Germans could not figure out how to mass produce it. That could have had an impact on the war. But the rest of the spies were pretty ham-handed. IACSP: In your book you

cover “the Golden Age of Soviet Espionage,” and looking back it seems there nearly was a “red under every bed.” SU L I C K : With Venona and such so much has come out, and the last figure was over 500 Americans who were spies for the Soviets. Most of these people didn’t consider themselves spies. They thought this was the path America should take. It was the depression and it didn’t seem like capitalism was working, so they joined Marxist groups. The Soviets were so much better at spying than we were, and they used these groups as seeding beds to get these guys into the U.S. government and get them to spy.

IACSP: And they took a world view, rather than an American view, am I right?

62

SULICK: Yes. The guys

who spied on the atomic bomb believed this weapon was too powerful to be in the hands of one nation, and that’s why they gave the secrets to the Soviets. Whether you agree with their reasoning or not, you’re right, they believed this was better for the world.

IACSP: Can you pick out one man or woman who was the greatest spy during this period? SULICK: There is one guy

who was a Harvard whiz kid. He went to Harvard when he was 15 and he graduated when he was 18. Theodore Hall was a whiz in science, although he was obviously immature.

IACSP: And he was never caught. He was the spy who got away. SULICK: Right. There is

another man who intrigues me, George Koval, because he was a Soviet GRU officer. As far as we know, he was the only Soviet staff intelligence officer who actually got inside the U.S. government.

IACSP: In your view who stands out as our greatest espionage threat today?

A few years ago the British security service caught a terrorist ring in London and they found a manual that explained to the Al-Qaedaoperatives that “the spy is an eye,” which meant that before they could perform an act of terrorism, they must first become spies.

I A C S P : I just watched “Zero Dark Thirty” on cable TV. Did you see it? SULICK: Yes. I liked it.

There are a lot of mistakes in it and a lot of things done for dramatic purposes, but parts of it I thought were good.

IACSP: Do you think the film captured the essence of the CIA?

SULICK: The star, Jessica threats are Iran and North Korea, but on the espionage side they are pretty weak.

IACSP: I recall a few years ago the British security service caught a terrorist ring in London and they found a manual that explained to the Al-Qaedaoperatives that “the spy is an eye,” which meant that before they could perform an act of terrorism, they must first become spies. What can be done to counter today’s terrorist spies, which will help prevent acts of terrorism?

SULICK: Clearly, I would SULICK: The best way to say the Chinese. There has not been a major spy for the Russians arrested since Robert Hanssen back in 2001. But at the same time you can see how many different Chinese cases there have been in the last decade. The Chinese use this “grain of sand” approach, where there are 100,000 Chinese students and researchers and whatnot, and they each collect that little bit of sand until the bucket is filled up. The greatest national security

lard working for al Qaeda. The screening mechanisms have to be fair but also be able to get up any derogatory information, because the last thing you want is a spy inside the government.

prevent espionage by anybody is to have your spies in their camp. In the case of terrorist spies, you find out what they are targeting and beef up security. Terrorist organizations are like intelligence services. They do scouting and recon and they have also tried to infiltrate guys into organizations, like the guy at JFK Airport. We have to be concerned about terrorist spies in the government. Imagine Jonathan Pol-

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

Chastain, was a composite of a number of women who worked in counterterrorism after 9/11. They were very dedicated to it. She was made to look a little more obsessive than they actuary are in real life. They made it look like she’s on the hunt and her boss told her to lay off – that’s totally untrue. Everybody was obsessed with bin Laden.

IACSP: You were there at the time, right? SULICK: Yes. Even when Obama got elected, he told my direct boss, Leon Panetta, that he wanted to make this a priority. It didn’t let up between administrations. To say that it was this one girl or a couple of people that still kept them on the hunt was not the case at all. There was also a couple of glitches, like the guy in Pakistan who was her boss, walking around with a CIA lapel pin (laughs). Working in Pakistan, that’s like putting a target on you. IACSP: Thank you for speaking to us.


Luke Bencie

Among Enemies:

Counter-Espionage for the Business Traveler (Mountain Lake Park, MD Mountain Lake Press, 2013) 152 pages, $25.00.

Reviewed by Dr. Joshua Sinai

Every day tens of thousands of American business executives, scientists and lawyers travel around the world to conduct business activities with foreign partners. These executives often travel with proprietary documents and electronic equipment, such as laptops, smartphones, and tablets – all of which also contain sensitive files and e-mails. Some of their competitive advantage, however, becomes diminished and even compromised (usually without their knowledge) as soon as they land in their foreign destinations’ airports, get into a taxi, and check into their hotels. It is at these early destination points that, as the author points out, “uncounted numbers of espionage operatives” are awaiting them. These espionage operatives work for foreign intelligence services and even their countries’ economic enterprises whose objective is “to separate international business travelers from their trade secrets” in order to improve their own countries’ competitive advantage against them. Mr. Bencie is the managing director of Security Management International, LLC, a security consulting firm in the Washington, DC area. He is an expert on espionage and counter-espionage, with more than 15 years of practitioner experience accumulated while traveling to more than 100 countries on behalf of the U.S. intelligence community and the private defense industry. How can business travelers protect their information against potential espionage in their foreign travels? Mr. Buncie proposes two primary guidelines: “Assume at all times you are being surveilled by someone who wants your information” and “Learn to think and act like a counterintelligence officer.” Next, the author provides a comprehensive checklist of the types of assets a business traveler needs to protect, ranging from corporate business strategies to vendor information. The chapter on how economic and industrial espionage is conducted is especially interesting. Once a business traveler settles in a foreign country, potential espionage activities might include blackmail, extortion, bribery, eavesdropping, electronic surveillance and/or interception, elicitation, intrusions, misdirection, and, in what would be most dangerous to the traveler, physical attacks (although rare, they still occur, according to the author).

How can business travelers protect themselves against potential espionage while abroad? Mr. Buncie provides an indispensable checklist that covers the places where espionage takes place and how it happens. This is followed by crucially important chapters on how to practice operational security (OPSEC), including protecting one’s electronic devices from cyber-espionage. Foreign espionage also includes attempts to recruit travelers by offering money in exchange for information, so a chapter is devoted to identifying situations – which Mr. Buncie terms “the recruitment cycle” – in which a traveler might be compromised into becoming a potential “unwilling” informant. The concluding chapter discusses the countries where espionage threats are most likely, such as China, Cuba, France, India, Iran, Russia, and elsewhere. This is followed by a valuable section on “Where to find help,” with local embassies and governmental agencies such as the FBI, the CIA, and the Overseas Security Advisory Council (OSAC) important points of contact for assistance. This book’s usefulness is enhanced by numerous anecdotes that illustrate each chapter’s discussion, as well as a section at the end of each chapter on “frequently asked questions” which serves as a review of the chapter’s “teaching lesson.” “Among Enemies: Counter-Espionage for the Business Traveler” is an indispensable and authoritative companion for every business traveler engaging in overseas business activities.

About the Author Dr. Joshua Sinai, a Washington, DC-based consultant on counterterrorism studies, is the author of “Active Shooter – A Handbook on Prevention” (ASIS International, 2013). He can be reached at: Joshua.sinai@comcast.net.


Mobile Social Media

A Terrorist’s Tool For Tactical Coordination By Avraham Cohn

With the advent of immense technological advancement and an increased ease in digital communication, terrorist activity has been elevated to an entirely new level of efficiency. Mobile social media does more than casually allow celebrities to share their breakfast menu to Iphoneclutching fans. The capacity to send out directed messages, in real time, is undoubtedly a highly resourceful (and thus worrying) tool in the facilitation of a new era of Terrorist operations. Specifically, the ability to immediately notify all of one’s collaborators, simultaneously, of sudden and spontaneous tactical changes is a tremendous leap in the terrorists’ ability to evade law enforcement personnel. This is in large part due to the exclusive nature of these application’s media platforms and the speed with which they operate. Intelligence agencies and law enforcement personnel must strive to extrapolate key lessons from past attacks and discern their implications for future threats. This piece will draw one such lesson from a terrorist attack of particular notoriety. The incredible complexity and dynamic nature of actually carrying out a successful terrorist attack should not be taken for granted. The insertion, actualization, evasion, and finally extraction of the terrorists is far more difficult to achieve than a fantastical Hollywood story would have us believe. Indeed, 9/11 compelled law enforcement and intelligence-gathering agencies to coordinate efforts and share information at an unprecedented level in order to further tighten their multi-layered security apparatus. This newfound appreciation for collectiveagency teamwork has undoubtedly thwarted serious attacks, many of

64

which remain unknown to the public. Thus, the horrific brilliance involved in conducting the commando styled terrorist raid in Mumbai, India in 2008, is ever more worrisome. As will soon be demonstrated, reasoned reflection and understanding of the attack leads one to anticipate the daunting reality in which tech savvy terrorists wield simple, but elusive communication techniques to outwit dated counterterrorism defensive measures. On November 26, 2008, a ten-man team of highly trained individuals associated with the infamous Pakistani based terrorist group Lashkar- e-Taiba infiltrated India’s borders and orchestrated an attack that Indian Security forces were not adequately prepared to confront. While there are many contributing factors that led to their success, the deep and comprehensive mobile communicative coordination amongst both the terrorists on site and their controllers proved to be the cornerstone of the operation’s triumph. The highly formidable and proven tactic of a dispersed and yet fluid assault on multiple locations was facilitated by the efficiency of their mobile communication tools. Targets were identified and priorities were set. Their handler, perched in a secure, off site location, effectively strategized and orchestrated the terror in real time, often revising pre-set strategy according to live feed updates of on-site developments. This is a capacity that was widely unprecedented in terrorist attacks and thought to be the exclusive purview of military grade operations. While these terrorists relied primarily on walkie-talkies and not

Mobile Social Media, per se, we may consider this communicative tool a predecessor to the ubiquitous mobile social media applications, which mark 2012, and beyond. While there are many different social media platforms, distinguished from one another by often only nuanced features, they all are fundamentally devised to serve the same purpose; virtual engagement. Notably, while the term social media is often applied perhaps too generously to too many forms of digital communication, we may consider it an umbrella term to denote internet-based applications that allow for deep user interaction and connectivity. Mobile social media than refers to social media applications that are operated from mobile devices like smart phones and increasingly, from hand held tablets. These applications have the capacity to disseminate information to broad and exclusive groups alike. The progressively more decentralized nature of the Al-Qaeda command structure coupled with the radicalizing capacity of internetbased blogs and forums have led to the evolution of smaller terrorist parties that are financially and materially limited. These groups are and will continue to be forced to improvise and utilize cheap technological systems to make up the slack for their material restrictions. Naturally, terrorist chiefs and strategists have also studied previous attacks, including the Mumbai Massacre, in order to glean important tactical lessons. They too are cognizant of the immense importance of real-time communication and its ability to confound and facilitate the evasion of law enforcement personnel. Mobile

Journal of Counterterrorism & Homeland Security International

Vol.19, No.2

social media platforms are a natural choice for advancing this operational necessity. Principally, a key appeal to using social media applications is their exclusivity. One has to be both aware of and subsequently invited to join the group in order to gain access to its messages. The thought of a large squad of highly trained terrorists converging on a target using Smartphone-based social media platforms to communicate seamlessly in real time is shockingly awesome. The growing number of social media platforms multiplied by the virtually unlimited number of sub-groups that may be created in each of these platforms yields a massive monitoring ground for law enforcement. How does an intelligence analyst go about locating the particular platform in use let alone hack into its specific social group? Mobile social media, by its very constitution, renders security forces’ ability to hack into them and access the concealed messages difficult and cumbersome. This is a formidable problem indeed. Communicative capabilities that were once the exclusive domain of state run militaries are becoming increasingly available to actors with limited means. As terrorist groups evolve, so to must intelligence agencies and law enforcement. An awareness and grasp of the many complexities involved in the operation of these social media communication networks is a security imperative.

About the Author Avraham Cohn is the CEO and Founder of Digital Development Consulting. Website: http://www. digitaldevelopmentconsulting.com/



Journal of Counterterrorism & Homeland Security International

Vol.19, No.2



“AMU is A trUsted AUthority in the intelligence community.” Supervisory Special Agent Michael Collett Graduate, School of Security & Global Studies Michael Collett knows the value of career-relevant education and chose AMU based on its reputation in the U.S. Intelligence Community. After serving in the U.S. Marine Corps Reserve, Army Special Forces, and California National Guard, Command Sergeant Major Collett embarked on a 20+ year career with the Drug Enforcement Administration. Today, he leads counter narcoterrorism operations and recently received the prestigious American Military University President’s Award.

Learn More at www.amuonline.com/JOC

Art & HumanitiesJournal | Business | Education &| Homeland Management | Public Service & Health Science & Technology | Security & Global Studies of Counterterrorism Security International Vol.19,| No.2


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.