52
Winter Issue Vol. 21 No. 4 2016 Printed in the U.S.A. IACSP.COM Strong Encryption For Everyone Is A National Security Advantage The Enemy Within Terrorism As A Multidimensional Phenomenon New Trends In The Terrorist Threats Against The Business Sector Q&A With Ray Kelly: Former N.Y. City Police Commissioner Terrorism Bookshelf

The IACSP’s Counter-Terrorism Journal V21N4

  • Upload
    iacsp

  • View
    224

  • Download
    2

Embed Size (px)

DESCRIPTION

The International Association for Counterterrorism & Security Professionals (IACSP) was founded in 1992 to meet security challenges facing the world as it enters an era of globalization into the 21st century. We believe that all elements of the world's societies must become better educated about the threats of terrorism as a first step toward developing innovative and effective counter-measures to combat these ongoing threats.

Citation preview

Page 1: The IACSP’s Counter-Terrorism Journal V21N4

Winter Issue

Vol. 21 No. 4 2016

Printed in the U.S.A.

IACSP.COM

Strong Encryption For EveryoneIs A National Security Advantage

The Enemy WithinTerrorism As AMultidimensional Phenomenon

New Trends In The Terrorist ThreatsAgainst The Business Sector

Q&A With Ray Kelly:Former N.Y. City Police Commissioner

Terrorism Bookshelf

Page 2: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

Page 3: The IACSP’s Counter-Terrorism Journal V21N4

I N T E R N A T I O N A L

SWAT Operations and Critical Incidents: Why People Die is the textbook at all OpTac International SWAT and Critical Incident Management Programs.

Copies can be purchased for $29.95 by calling 443.61.OPTAC(67822) and at finer bookstores.

For further information on OpTac International publications, programs, and servicesplease visit: www.optacinternational.com or email your request to: [email protected].

Page 4: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

Page 30Terrorism As A

Multidimensional Phenomenon,By Jonathan Appel, Ph.D, and Dohee Kim- Appel, Ph.D.

THE JOURNAL OF COUNTERTERRORISM & HOMELAND SECURITY INT’L is published by SecureWorldnet, Ltd., PO Box 100688, Arlington, VA 22210, USA, (ISSN#1552-5155) in cooperation with the International Association for Counterterrorism & Security Professionals and Counterterrorism & Security Education and Research Foundation. Copyright © 2016. All rights reserved. No part of this publication may be reproduced without written permission from the publisher. The opinions expressed herein are the responsibility of the authors and are not necessarily those of the editors or publisher. Editorial correspondence should be addressed to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA, (571) 216-8205, FAX: (202) 315-3459 . Membership $65/year, add $10 for overseas memberships. Postmaster: send address changes to: The Journal of Counterterrorism & Homeland Security International, PO Box 100688, Arlington, VA 22210, USA. Web site: www.iacsp.com

IACSP Director of OperationsSteven J. Fustero

Associate PublisherPhil Friedman

Senior EditorNancy Perry

Contributing EditorsPaul Davis

Thomas B. HunterJoshua Sinai

Book Review EditorJack Plaxe

Research DirectorGerry Keenan

Conference DirectorJohn Dew

Communications DirectorCraig O. Thompson

Art DirectorScott Dube, MAD4ART International

Psychological CT AdvisorsCherie Castellano, MA, CSW, LPC

Counterintelligence Advisor Stanley I. White

South America AdvisorEdward J. Maggio

Homeland Security AdvisorCol. David Gavigan

Personal Security AdvisorThomas J. Patire

Emergency Management AdvisorClark L. Staten

Director of Emergency Ops.Don L. Rondeau

Tactical AdvisorRobert Taubert

Hazmat AdvisorBob Jaffin

Security Driver AdvisorAnthony Ricci, ADSI

Cyberwarfare AdvisorDavid Gewirtz

Cell Phone Forensics AdvisorDr. Eamon P. Doherty

IACSP Advisory Board John M. Peterson III

John DewThomas Patire

Cherie Castellano, MA, CSW, LPCRobert E. Thorn

Southeast Asia CorrespondentDr. Thomas A. Marks

European CorrespondentElisabeth Peruci

Middle East CorrespondentAli Koknar

National Sales RepresentativePhil Friedman, Advertising Director

Tel: 201-224-0588, Fax: [email protected]

Tactical Sales RepresentativeScott Dube, MAD4ART International

Tel: 757-721-2774, [email protected]

Vol. 21, No. 4 Winter 2016

PHOTO CREDITS:

Reuters, DefenseImagery.mil Army.mil,Navy.mil, istockphoto.com, shutterstock.com

and authors where applicable.

Page 6 SITREP, Terrorism Trends & Forecasts 2016

Page 8 Strong Encryption For Everyone, By David Gewirtz

Page 12 U.S. Justice Department’s National Security Division, By Paul Davis

Page 16 The Enemy Within: Violent Extremism In The U.S., By Jerome Kahan

Page 22 New Trends In The Terrorist Threats Against The Business Sector,

By Dr. Joshua Sinai

Page 30 Terrorism As A Multidimensional Phenomenon,

By Jonathan Appel, Ph.D, and Dohee Kim- Appel, Ph.D.

Page 36 Secure Driver: Is Perception And Reaction Time Overlooked,

By Anthony Ricci

Page 38 An IACSP Q&A With Former N.Y. City Police Commissioner Ray Kelly,

By Paul Davis

Page 44 IACSP Homeland Security Bookshelf: Reviews by Dr. Joshua Sinai

Page 16The Enemy Within:

Violent Extremism In The U.S.,By Jerome Kahan

Page 5: The IACSP’s Counter-Terrorism Journal V21N4
Page 6: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.46

SITREP

The last quarter of 2015 saw an intensification of Ye-men’s war, amid heightened regional rivalries between Saudi Arabia and Iran complicating prospects for peace. Political tensions increased in Haiti, Guinea-Bissau and Moldova, where protests over endemic corruption and a lack of confidence in the government could escalate. In Africa, Boko Haram’s deadly attacks increased in northern

Cameroon, and Burkina Faso was hit by an unprecedented terror at-tack. On the nuclear front, in East Asia, North Korea’s announcement that it had carried out a successful hydrogen bomb test was roundly condemned, while nuclear-related sanctions on Iran were rolled back in accordance with the July 2015 deal.

Terrorism Trends

In Yemen, violence in-creased as the Saudi-backed coalition inten-sified its air campaign, mostly targeting the capital city Sanaa, in response to cross-border incursions and rocket at-tacks by the Huthi/Saleh bloc. The Huthis contin-ued to carry out a dev-

astating siege of the southern city of Taiz, where both sides routinely use heavy weapons in civilian areas Lawlessness and the expansion of jihadist groups continued to plague the south, particularly Aden, where ten people were killed in a car bomb outside the security chief’s home on 17 January and eleven in a suicide bombing

outside the presidential palace on 28 January.

Elsewhere political tensions heightened. Moldova’s capital Chisinau was rocked by protests over corruption and demands for early elections, highlighting severe discontent which could worsen if protesters’ demands are not met. Haiti’s presidential run-

off election, originally planned for 24 January, was postponed for the second time amid growing concern over a series of violent protests by opposition supporters, and disagreement over the valid-ity of last year’s legislative and presidential polls.

In Guinea-Bissau, the struggle within the ruling party (PAIGC)

Page 7: The IACSP’s Counter-Terrorism Journal V21N4

for employee and family training and awareness.For a copy, please visit: http://www.ready.gov/calendar

FBI Releases Preliminary Semiannual Crime Statistics for 2015

Statistics released today in the FBI’s Preliminary Semiannual Uniform Crime Report revealed overall declines in the number of property crimes reported and overall increases in the number of violent crimes reported for the first six months of 2015 when compared with figures for the first six months of 2014. The report is based on information from 12,879 law enforcement agencies that submitted three to six months of comparable data to the FBI’s Uniform Crime Reporting (UCR) Program for the first six months of 2014 and 2015. Source: www.fbi.gov

IACSP News Many of our members are not receiving our new monthly CTS Enews (electronic security report) because we either do not have your email address, or you are using a .gov or .mil email address for your membership record. If you would like to receive our CTS Enews, please send me an email with the email address you would like us to use. Also include your current address. Please send the information to my attention to my personal email address: [email protected]

In the meantime, happy 2016! And, as always, be vigilant and safe.

Thank you.

Steven J. Fustero,Dir. Of Operations/IACSP

between the dominant faction led by former Prime Minister Pereira and the coalition around President Vaz worsened, almost causing an institutional crisis.

Elsewhere in West Africa, deadly Boko Haram attacks intensified in northern Cameroon, with 25 separate attacks, which left at least 88 killed and some 100 injured. In Burkina Faso, 30 ci-vilians, most of them foreigners, were killed in an unprecedented terrorist attack on 15 January claimed jointly by al-Qaeda in the Islamic Maghreb (AQIM) and al-Mourabitoun, an AQIM splinter group. In the north, jihadi groups are also suspected to have attacked gendarmes near the bor-der with Mali and kidnapped an Australian couple.

2016 TRENDS Deteriorating SituationsBurkina Faso, Cameroon, Guin-ea-Bissau, Haiti, Korean Penin-sula, Yemen, SomaliaImproving SituationsIranConflict Risk AlertMoldovaSource: http://www.crisisgroup.org/en/publication-type/cri-siswatch.aspx

NCTC’s Counterterrorism Calendar 2016 Now Available

NCTC’s Counterterrorism Cal-endar provides information on known terrorist groups, indi-vidual terrorists, and technical information on topics such as biological and chemical threats. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics. The Calendar also marks dates that terrorists may believe are important if planning attacks to commemorate particu-lar events. To download the calendar, please visit: http://www.nctc.gov/site/pdfs/ct_calendar.pdf

2016 InformationSecurity Predictions No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. If you thought 2015 was interesting, get your seatbelt and helmet on and pre-pare for lift off…

• Wearable Devices: Cyber crooks don’t care what kind of data is in that little device strapped around your upper arm while you exercise, but they’ll want to target it as a pas-sageway to your smartphone. Think of wearables as conduits to your personal life.

• Firmware/Hardware: No doubt, assaults on firmware and hardware are sure to hap-pen.

• Ransomware: Not only will this kind of attack continue, but an offshoot of it—“I will infect someone’s device with ransom-ware for you for a reasonable price”—will likely expand.

• The Cloud: Let’s not forget about cloud services, which are protected by security structures that cyber thieves will want to attack. The result could mean wide-scale disruption for a business.

• The Weak Links: A com-pany’s weakest links are often their employees when it comes to cybersecurity. Companies will try harder than ever to put in place the best security sys-

tems and hire the best security personnel in their never-ending quest for fending off attacks—but the weak links will remain, and cyber crooks know this. You can bet that many attacks will be driven towards employ-ees’ home systems as portals to the company’s network.

• Linked Stolen Data: The black market for stolen data will be even more inviting to crooks because the data will be in sets linked together.

• Cars, et al: Let’s hope that 2016 (or any year, actually) won’t be the year that a cyber punk deliberately crashes an Internet connected van car-rying a junior high school’s soccer team. Security experts, working with automakers, will crack down on protection strategies to keep cyber attacks at bay.

• Threat Intelligence Shar-ing: Businesses and security vendors will do more sharing of threat intelligence. In time, it may be feasible for the gov-ernment to get involved with sharing this intelligence. Best practices will need hardcore revisions.

• Transaction Interception: It’s possible: Your paycheck, that’s been directly deposited into your bank for years, sud-denly starts getting deposited into a different account—that belonging to a cyber thief. Snatching control of a transac-tion (“integrity attack”) means that the thief will be able to steal your money or a big busi-ness’s money.

Source: http://robertsiciliano.com/blog/2016/02/02/2016-in-formation-security-predictions/

Author: Robert Siciliano is an identity theft expert to TheBest-Companys.com discussing iden-tity theft prevention.

Released: 2016 National Seasonal Preparedness Messaging Calendar The Ready Campaign has just released their 2015_Ready_Sea-sonal_Calendar. This PDF docu-ment outlines intended strategic messaging month by month with links to resources that can be used

Page 8: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.48

StrongEncryptionFor EveryoneIs A NationalSecurity AdvantageBy David Gewirtz

In the wake of recent terrorist attacks, citizens and those responsible for protecting them are asking the same questions. How could the attacks have happened? What else could we have done to prevent them? What should we have known that we didn’t know?

Many of those questions eventually lead to the sub-ject of intelligence gather-ing. If only we knew ahead of time what the terrorists were planning, perhaps we could have stopped them. If only we knew who to sus-pect, perhaps we could have looked into them -- and then stopped them.

If only we knew ...

If only we could listen in on their conversations, read their e-mail, sift through their social network conver-sations. If only we could get ahead of the attack, if only we knew what they were saying, then we could have taken action.

Gathering that information is a formidable challenge that ranges from the policy and privacy concerns of citizens to technological issues. In this article, we’re going to ignore the very complicated and important privacy and policy issues and go straight to the technical problem: how can we know?

Page 9: The IACSP’s Counter-Terrorism Journal V21N4

if we could decrypt them, we could read them -- and pos-sibly prevent another attack.

An obvious -- but danger-ously incorrect answer -- would be to make sure that government and law enforce-ment can crack any encryp-tion the bad guys might use, usually through the use of “back door” vulnerabilities built right into the encryption technology.

This is an approach being actively advocated by legisla-tors and national law enforce-ment officials, particularly when it comes to smartphone-based communications and other consumer-level com-munications protected by high-quality encryption.

They reason that if there were back doors engineered into the cryptography algorithms, then once authorized by an appropriate oversight body, they could easily flip a switch and listen into any such au-thorized conversation.

It seems to make sense, but building in back doors is a very, very bad idea. Here are six reasons why:

1. Back doors are deliber-ately engineered flaws in the system. Any flaw that we can exploit can be found and ex-ploited by our enemies. Since this is an asymmetric battle, if we engineer flaws into things like smartphones, we are -- by design -- subjecting every smartphone user to penetra-tion by the enemy. Back doors are a gift to the enemy.

2. Back doors give the enemy an excuse to innovate. If we

The key premise here is that there is an ongoing stream of data being transferred and if we could somehow tap into that stream, read it all, and take intelligent action based on the incredibly tiny fraction of the data, that’s meaningful from a counter-terrorism perspective, we might prevent another attack.

Most of the issues of tapping into the various streams are solvable from a partnership or legal perspective. Agen-cies work with some private companies -- often as a result of a court order -- to tap into some information flow and derive some targeting value. Again, for the purpose of this article, let’s assume that works well enough. Let’s again delve further down, into a technical issue: en-crypted communication.

Because once we have the policy and judicial approval to tap into digital communi-cation, and once we have the ability to get a data stream from the vendors (or from, uh, “other” sources), if the messages themselves are encrypted, we still have to be able to decrypt them to read them.

Given that it’s relatively ob-vious to terrorists and crimi-nals that law enforcement and national security orga-nizations will be attempting to read their messages, it’s not a big jump for them to decide to use strong crypto to protect their communications from prying eyes.

That brings us to our current challenge: bad guys are en-crypting their messages and

Page 10: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

build back doors into our systems, it’s not like en-emy actors won’t know. The fact is, they’ll find

alternate ways to hide their communications, most likely building their one encryption technology in secret. So not only will we still have to crack encryption, we’ll have to find out what it is first.

3. Don’t assume terrorists don’t have access to top tech-nology skills. As an example, back in 2012, I wrote about Iran’s investment in higher education. Despite seeming backwards in some areas, the nation has more than 3.5 mil-lion college students, 40,000 masters-level students, and 20,000 Ph.D. students. Back then, more than 20 million Iranians were online. So while I would never recommend you conflate terrorists with Irani-ans, it’s important to realize that Iran is representative of the sort of nation that produces terrorists -- and many of them are technologically astute.

4. Back doors and encryption flaws open the door to other forms of spying. Don’t just assume that back doors will be exploited only by govern-ments and terrorists. Back doors will open the door to industrial espionage of an unimaginable level. While allies have always spied on each other, once it’s easy to crack encryption, everyone will be doing it -- and no secret or competitive advan-tage will be safe.

5. Privacy isn’t just about people hiding stuff. If bad guys, terrorists, enemy states

or others can access person-al, private information (like normally-protected health care secrets), the potential for blackmail increases ex-ponentially.

6. Engineered-in back doors will be used by individuals as well. Once engineered-in back doors are created, you can bet those exploits will be for sale online. And then you can bet that scumbags (as distinguished from terrorists

and enemy states) will use that information for stalk-ing, harassment, and other run-of-the-mill bad behavior that might otherwise be kept in check.

Perhaps, most importantly, an engineered- in back door gives up our asym-metric advantage. You see, while the terrorists’ asym-metric advantage is they can hit any one target and we have to protect them

all, our asymmetric advan-tage is our enormous eco-nomic and industrial might (and enormous brain trusts like those at the NSA and in companies like Google and Apple).

If we build encryption that anyone can crack with the right codes, anyone can crack it. But if the very best encryption is out there and used by everyone, the only ones with the resources to possibly crack it -- doing it the hard way -- is us, because we have more re-sources than anyone else to throw at the problem.

So here are the talking points you should take back to your agencies, depart-ments, and organizations. One, built-in encryption back doors will be used against us more than it will help us. Two, if we build in back doors, the bad guys will engineer alternate encryption solutions. And finally, if we let encryp-tion be the best it can be, we will be the only ones with the resources to crack that encryption -- the old fashioned way. By actually breaking the code.

And it’s not like we haven’t used our overwhelming code breaking skills before. This is what we do.

About the AuthorDavid Gewirtz is Director of the U.S. Strategic Perspective Institute, Distin-guished Lecturer for CBS Interactive, Cyberwarfare Advisor for the Interna-tional Association of Counterterrorism and Security Professionals, IT Advisor to the Florida Public Health Association and an instruc-tor at the UC Berkeley ex-tension.

So here are the talking points you should take back to your agencies, departments, and organizations. One, built-in encryption back doors will be used against us more than it will help us. Two, if we build in back doors, the bad guys will engineer alternate encryption solutions. And finally, if we let encryption be the best it can be, we will be the only ones with the resources to crack that encryption - the old fashioned way. By actually breaking the code.

10

Page 11: The IACSP’s Counter-Terrorism Journal V21N4

How  prepared  are  you    to  protect  your  business  secrets?  Each  business  day,  some  35,000  executives,  scientists,  consultants  and  lawyers  pass  through  the  nation’s  airports  to  destinations  across  the  globe.  They  carry,  along  with  

Their  goal  is  to  further  their  interests,improve  their  bottom  line,  engage  in  transactions  with  foreign  partnersand  maintain  their  competitive  advantage.

On  the  other  side,  carefully  watching  most  of  those  travelers,  beginning  the  moment  they  arrive  at  the  airport  –  and  often  sooner  –  are  uncountednumbers  of  espionage  ope-­ratives.  These  individuals  work  for  foreign  intelligence  services  and  economic  concerns.  They,  too,  are  pursuing  a  goal:  to  separate  international  business  travelers  from  their  trade  secrets.  

About  the  author  Luke  BencieFor  the  past  15  years,  Luke  Bencie  has  traveled  to  more  than  100  countries  on  behalf  of  the  U.S.  Government  as  

espionage.  He  has  seen  the  lengths  to  which  foreign  intelligence  services  and  other  hostile  global  competitors  

will  go  to  steal  American  business  secrets.

”A  marvelous  book!  ...  The  most  handy,  the  most  accessible    ’how-­to’  book  to  be  aware  of  the  threats  that  we’re  facing.”                

“You  should  consider  Among  Enemies  a  must-­read  if  you  travel  overseas,  whether  on  business  or  even  to  gain  an  understanding  of  the  hidden  threats  you  could  face.”    

”An  indispensable  and  authoritative  companion  for  every  business  traveler  engaging  in  overseas  business  activities.”      

www.among-­enemies.com

Page 12: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.412

The U.S. Justice Department has prosecuted more than 60 individuals in terrorism-related cases in 2015.

Speaking before the International Institute for Justice and the Rule of Law’s Event on More Effective Responses to the Foreign Terrorist Fighter Threat in New York City this past September, Assistant Attorney General for National Security

John P. Carlin stated that since the previous year’s meeting, foreign ter-rorist fighter cases in the United States increased from about a dozen to more than 50.

U.S. JusticeDepartment’sNational Security DivisionProsecutes Record Number of Terrorism-Related Cases By Paul Davis

Page 13: The IACSP’s Counter-Terrorism Journal V21N4

“In total, since 2013, we have publicly charged more than 70 individuals, in over 25 districts, for foreign terrorist fighter or homegrown vio-lent extremist-related con-duct. And the FBI has open investigations of suspected supporters of ISIL in all 50 states,” Carlin told the group. “At the U.S. Department of Justice, we fight against ISIL to protect the American pub-lic, here and abroad. But we also understand that our work contributes to global efforts to eliminate the threat ISIL poses to innocents around the world. We recognize our collective responsibility to prevent our citizens from going overseas or funding others to join ISIL in a campaign that uses rape, sexual slavery and the murder of civilians, including chil-dren, as tactics for success.”

According to the Justice De-partment, Carlin said that the U.S. uses law enforcement investigative tools and tech-niques that are both effective and protective of individual rights and the rule of law. So-phisticated undercover opera-tions disrupt those who plan to travel to engage in terrorism, allowing the government to identify the threats early – be-fore potential fighters travel, train or return.

“We criminalize providing a broad range of material support for terrorist activity. These

are tools we have used for many years and ones that are now globally recognized as invaluable in our fight against terrorism,” Carlin said.

Carlin explained that ISIL uses social media – the language of youth and a global marketing tool designed to reach house-holds around the world. Ac-cording to FBI Director James Comey, ISIL now has about 21,000 English-language fol-lowers on Twitter alone. ISIL exploits social media to recruit, to disseminate messaging and to plan attacks. We have seen each of these borne out in the United States.

“We know that ISIL used Twit-ter to terrorize Mosul before their attack. ISIL also uses social media to make public calls for lone offender attacks in the West,” Carlin said. “ISIL continues to target the young, including children, in its recruit-ing efforts, and its message is getting through. In the United States, over 55 percent of defen-dants in foreign terrorist fighter cases are under 25-years-old. Over a third are 21 or younger”

Carlin went on to say that the U.S. is witnessing a surge in what we call homegrown violent extremists (HVEs) – individuals inspired by this extremist ideol-ogy to conduct attacks inside the United States. ISIL and its sup-porters have repeatedly called for attacks right where potential at-

tackers live. Terrorism with the reach of mass, global marketing: No passport or travel required.

Carlin, a career federal prosecutor who serves as the Department of Jus-tice’s top national security attorney, oversees nearly 400 employees responsible for protecting the country against international and domestic terrorism, espio-

nage, cyber, and other national security threats.

The National Security Division (NSD) was created in March 2006 by the USA PATRIOT Reauthorization and Improve-ment Act. The mission of the National Security Division is to carry out the Department’s

highest priority: to combat terrorism and other threats to national security.

The NSD’s organizational structure is designed to ensure greater coordination and unity of purpose between prosecutors and law enforcement agencies, on the one hand, and intelli-gence attorneys and the Intel-ligence Community.

In a recent and notable case, the NSD announced on December 30th that Enrique Marquez Jr., 24, of Riverside, California, a longtime friend of Sayed Riz-wan Farook, the male shooter in the San Bernardino, California, terrorist attack, was named in a federal grand jury indictment that charges him with conspir-

ing with Farook in 2011 and 2012 to provide material sup-port to terrorists.

The NSD also reported that Marquez was also charged with two counts of making a false statement in relation to the purchase of two assault rifles that were used in the deadly shooting at the Inland Regional Center (IRC) on Dec. 2, 2015.

“We know that ISIL used Twit-ter to terrorize Mosul before their attack. ISIL also uses social media to make public calls for lone offender attacks in the West,” Carlin said. “ISIL continues to target the young, including children, in its re-cruiting efforts, and its mes-sage is getting through. In the United States, over 55 percent of defendants in foreign ter-rorist fighter cases are under 25-years-old. Over a third are 21 or younger”

Asst Attorney General John Carlin

Page 14: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

The five-count indictment addi-tionally charges Marquez with marriage fraud and making a false statement on immigra-tion paperwork in relation to an alleged sham marriage with a member of Farook’s family.

Marquez is currently being held in federal custody without bond and was arraigned in U.S. District Court in Riverside on Jan. 6, 2016.

“Enrique Marquez Jr. has been indicted for his role in plotting terrorist attacks on American soil with Sayed Rizwan Farook in 2011 and 2012, attacks which were, for-tunately, not carried out. He is also charged with firearms violations for making straw purchases of weapons for Farook – weapons that were eventually used to carry out the recent terrorist attack in San Bernardino,” Carlin said. “This indictment is the next step in holding Mr. Marquez accountable. I would like to extend my gratitude to all the members of law enforcement involved in this ongoing investigation.”

“Mr. Marquez is charged for his role in a conspiracy several years ago to target innocent civilians in our own backyard with cold-blooded terror attacks, and with providing weapons to an individual whose endgame was murder,” added David Bowdich, the Assistant Director in Charge of the FBI’s Los Angeles Field Office. “The covert nature of the defendant’s alleged ac-tions is a stark reminder of the challenges we face in preventing attacks planned in the name of violent jihad, and underscores the critical need for those with knowledge about terror plots to come forward.”

The NSD reports that the indictment charges Marquez with conspiring with Farook to provide material support and resources, including weapons, explosives and personnel, to terrorists, knowing and intending that such support was to be used in preparation for and in carrying out the use of fire or explosive to maliciously damage or destroy any institution or organization receiving federal financial assistance and property used in interstate or foreign com-merce or in any activity affecting interstate or foreign commerce.

“Marquez is also charged with two counts of making a false statement when purchasing two assault rifles for Farook – a Smith and Wesson, model M&P-15 Sport, 5.56-caliber rifle that was bought on Nov. 14, 2001, and a DPMS, model A-15, 5.56-caliber rifle that was bought on Feb. 22, 2012 – which, according to an affidavit previously filed in

this case, were used in the Dec. 2 attack on the IRC that killed 14 people and wounded 22 others. Specifically, he is charged with stating on a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) form that he was the actual buyer, a statement that was, and which defendant knew to be, false.” the NSD announcement stated. “The final two counts in the indictment allege that Marquez entered into a sham marriage with a member of Farook’s family in November 2014 and that on July 17, 2015, he signed an immigration form, under penalty of per-jury, that he was living with the purported spouse in Corona, California, when he was not actually living there.

According the NSD the charge of providing material support to terrorists carries a maxi-mum sentence of 15 years in federal prison. The charges of making a false statement in connection with acquisition of firearms each carry a statutory maximum penalty of 10 years in federal prison. The marriage fraud count carries a statutory maximum sentence of 5 years in prison, and the charge of making a false statement on immigration paperwork carries a statutory maximum sentence of 10 years in prison.

In another recent and notable case, the U.S. Attorney’s Office for the Middle District of Pennsylvania announced on December 22nd that Jalil Ibn Ameer Aziz, 19, a U.S. citizen and resident of Harrisburg, was in-dicted by a federal grand jury in Scranton on charges of conspiring and attempting to provide material support to ISIL, a desig-nated foreign terrorist organization

According to U.S. Attorney Peter Smith, the Indictment alleges that from July 2014 to December 17, 2015, Aziz knowingly con-spired to provide, and attempted to provide, material support and resources, including personnel and services, to ISIL

“Aziz used at least 57 different Twitter accounts to advocate violence against the United States and its citizens, to dis-seminate ISIL propaganda and espouse pro-ISIL views. Aziz allegedly posted a hyperlink containing the names, ad-dresses, and other identifying informa-tion of 100 reported members of the U.S. Military and calls for violence against them,” the announcement stated. “On at least three occasions, Aziz allegedly used his Twitter accounts and other elec-tronic communication services to assist persons seeking to travel to and fight for ISIL. In one instance, Aziz alleg-edly acted as an intermediary between a person in Turkey and several well-known members of ISIL.”

14

Eric Marquez Mugshot

Jalil Aziz Mugshot

Nicholas Teausant Facebook Photo

Syed Farook

Page 15: The IACSP’s Counter-Terrorism Journal V21N4

YOU ARE DRIVEN TO

LEADWE ARE DRIVEN TO HELP YOU GET THERE.

To learn more visit, www.PublicSafetyatAMU.com/IACSP

At American Military University, we understand where you’ve been, what you’ve done andwhat you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join 100,000 professionals gaining relevant skills that can be put into practice the same day. Take the next step, and learn from the leader.

JournalCounterTerrorism_0114.indd 1 1/9/14 10:51 AM

Aziz also passed location information, including maps and a telephone number, between these ISIL supporters and a search of a backpack located in Aziz’s closet iden-tified five loaded M4-style high-capacity magazines, a modified kitchen knife, a thumb drive, medication, and a balaclava (ski mask).

The case is being investigated by the FBI’s Joint Terrorism Task Force (JTTF), which includes the Pentagon Force Protection Agency and the Pennsylvania State Police, with assis-tance from the Harrisburg Bureau of Police. This case is being prosecuted by Assistant

According to the NSD, the maximum penalty provided in the statute is 20 years’ imprisonment and a $250,000 fine. A third recent and notable case was an-nounced on December 1st, by Carlin and U.S. Attorney Benjamin B. Wagner con-cerns Nicholas Michael Teausant, 22, of Acampo, who pleaded guilty to attempting to provide material support or resources to a foreign terrorist organization.

According to court documents, on March 17, 2014, Teausant was arrested near the

Canadian border en route to Canada with the intent of continuing to travel to Syria to join ISIL. On March 26, 2014, Teausant was indicted on one count of attempting to provide material support or resources to a terrorist organization. He pleaded guilty to the single count in the indictment without a plea agreement. Teausant is scheduled to be sentenced by United States District Judge John A. Mendez on March 8, 2016.

“Nicholas Michael Teausant attempted to travel overseas to join ISIL and to provide material support to the terrorist organiza-tion,” said Carlin. “The National Security Division’s highest priority is counterterror-ism, and we are committed to stemming the flow of foreign fighters abroad and holding accountable those who attempt to provide material support to designated foreign ter-rorist organizations.”

“This case, like others in communities across the United States and around the world, is an example of how a young person from any place and any background might make the terrible decision to try and become part of a terrorist organization,” added U.S. Attorney Wagner. “Fortunately, the FBI intervened in this case before any harm could be inflicted

upon innocent persons. We hope that this case will be a reminder to us all to stay vigilant and involved in the lives of our youth, and in particular, with respect to the dangerous influ-ences they may be subject to on the Internet where these organizations are very active.”

Teausant faces a maximum statutory penal-ty of 15 years in prison and a $250,000 fine. “Law enforcement will remain a strong tool in this battle. But it alone is not enough. Our first goal ought to be to dissuade would-be foreign fighters from joining ISIL in the first place,” Carlin said. “That requires us to engage with our communi-ties and support efforts to identify possible interventions at every step of the foreign terrorist fighter development cycle, from recruitment and radicalization, to mobiliza-tion and return. We must work together to disrupt and detain those who have already gone, while simultaneously deterring those who seek to follow that path.”

About the Author

Paul Davis is a frequent contributing edi-tor to the Journal of Counterterrorism & Homeland Security International.

Page 16: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

TheEnemyWithinViolent Extremismin the United StatesBy Jerome Kahan

16

Tashfeen Ma-lik, (L), and Syed

Farook are pictured passing through Chicago’s

O’Hare International Airport in this July 27, 2014 handout photo

obtained by Reuters December 8, 2015. U.S.-born Farook, 28, and his spouse, Malik,

a native of Pakistan who lived in Saudi Arabia for more than 20 years, died in a shootout with police hours

after a December 2, 2015 attack on a holiday party at the Inland Regional Center social services agency in San Bernardino,

California about 60 miles (100 km) east of Los Angeles.

Page 17: The IACSP’s Counter-Terrorism Journal V21N4

Who exactly are these enemies in our midst? What dangers do they pose? What are the reasons individuals become violent ex-tremists? How can we counter these threats? Are there roles for citizens as well as federal agencies and local police in rooting out and prosecuting these hidden hazards? This article will address these issues and draw some conclusions.

Who is the Enemy?

Jihadist violent extremists are Americans who may have traveled abroad to become exposed to the extreme ideologies of terrorist groups and returned radicalized and prepared to carry out domestic terrorism in the name of a jihad –defined as a holy war waged on behalf of Islam as a religious duty. They are found in communi-ties, often as part of clandestine terrorist “sleeper cells,” waiting for direction by their foreign masters to take violent action against specified targets, inspired by jihadist beliefs to take action when and as they see fit, or independently undertaking extremist activities against people or property at a time and place of their own choos-ing. Other individuals with unhappy or unrealized lives looking for a new direction and meaning can stay in the U.S and become

inspired by jihadism or even self-radicalized by propaganda placed on the Internet by terrorist organizations such as ISIS who also publish and broadcast anti-West and pro- terrorist messages via a series of online magazines and social media outlets. Suicide attacks are one of the most serious threats posed by jihadist extremists, reminiscent of Kamikaze pilots of WWII.

Domestic violent extremists, on the other hand, are U.S. citizens driven to violence by personal beliefs or extremist ideologies having no relationship to foreign terrorists. They are drawn to vio-lence as a means of supporting a variety of scary causes including sovereign citizen anti-government movements, racism, bigotry, anarchy, white supremacy, right-wing militants, neo-Nazi views, anti-religious views, right wing and left wing political extrem-ists, left wing civil liberties advocates, and even environmental extremists. These domestic extremists can act alone, but often join militant, ideologically motivated groups, who form their own small communities in which individuals with shared extreme beliefs live together in small “communities” and by their own rules of society without breaking the law-- disseminating extremist propaganda and retailing the ability to suddenly commit egregious acts. While

The Enemy Within, a PBS FRONTLINE special TV broad-cast in 2006, exposed the unpleasant fact that there was an enemy within our midst composed of a network of Islamic extremists living in a small town in California that sought “to encourage, to energize, to activate ... ex-tremist Islamic sentiments, to carry out acts on behalf of these terrorist groups and their extremist beliefs” here in

the United States. In addition to these so-called home-grown terrorists, who have grown in numbers since the PBS special, the enemy within also includes an expanding group of extremists of all stripes capable of carrying out violent attacks on the nation’s people and property in the name of their causes, which are not related to the jihadist terrorist ideologies. Surprising as it may seem, given the plethora of security dangers we face, the Obama administration has identified violent ex-tremism as the “pre-eminent” threat to the United States.

Page 18: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

terrorist attacks since 9/11 have made more headlines and tend to instill greater fear in the population, more Americans have been killed since 9/11 by such non-Islamic domestic ter-rorists than jihadist extremists.

The most immediate threat to the nation, as assessed by the FBI , however, are from “lone wolf” violent extremists – antisocial and disengaged individuals, as in the case of Dylann Roof who massacred nine citizens in a South Carolina church, motivated to take action by personal grievances, familial problems, individualistic ideologies, psy-choanalytic dynamics, or extremist Islamic

beliefs. Studies done by the SPLC indicate that these “lone wolves” are responsible for the large number of domestic extremist attacks that have occurred over the past five years.

Countering Violent Extremism

The causes of violent extremism are com-plex and numerous, shaped by the lure of terrorism as well as deep rooted political, social, cultural, and economic grievanc-es as well as isolation from society. For these reasons, the Obama Administration’s Strategic Implementation Plan (SIP) for Countering Violent Extremism (CVE) is-sued in 2011 stressed the importance of finding and eliminating the root causes through enhancing engagement with local communities that may serve as “breeding grounds” for violent extremists, building government and law enforcement expertise

for preventing violent extremism, and seek-ing “to protect, strengthen, and empower these communities” to discover and remove the basic drivers of violent extremism. The strategy acknowledges that an effective CVE strategy must first identify potential jihadist extremists and only then can there be interventions designed to halt if not reverse their path to radicalization or, if already radicalized, to thwart efforts to take destructive actions including suicide attacks. The strategy also entails efforts to counsel other forms of violent extremists who make themselves known in ways that make them see a productive future within existing society, while at the same time

seeking to identify and track other domestic violent extremists in order to block and then reverse their efforts to turn distorted and dangerous beliefs into destructive actions.As a practical matter, the above strategic objectives are virtually impossible to achieve, especially the all-important step of identifying individuals ripe for jihadist radicalization or those already radicalized. Most of these individuals already know how to blend into communities across the nation, staying in touch with other members of a small cell, typically with no visible signs of being dangerous to their societies. This is also the case for individual domestic violent extremists who can hide within communi-ties, as distinct from those who live as part of outlier communities with their colleagues where they walk the line to avoid arrest.

Lone wolfs of any persuasion are especially hard to identify, given their relatively iso-

lated lifestyles and the ability to plan and act without worrying about being part of a group activity, but may not be able to easily instigate a complex and high-consequence incident. This form of extremism poses a special danger, since it is easier for law en-forcement to penetrate plots “concocted by several people than individuals who act on their own “given that the lone wolf’s chief asset is no one else knowing of any plans for violence, making this threat exceedingly difficult to disrupt,” as stated in the Age of the Wolf: A Study of the Rise of Lone Wolf and Leaderless Resistance Terrorism, by the Southern Poverty Law Center (SPLC) in February 1, 2015.

If individuals monitored for a number of years exhibit no further progression in the radicalization process and provide no basis for intervention, these targets “fall off the radar screen” – often to surface later and conduct an act of violence. As in the case of other open Western nations, the U.S. faces a monumental challenge in trying to identify and then track potential violent extremists. In words that ring true to American authorities, a former senior French counterterrorism official noted there are “too many of them, too few of us [….and] that monitoring one suspected individual “re-quires three to ten agents for round the clock surveillance and such resources are not avail-able to monitor all these people,” as reported by CNN, Washington, January 8, 2015.

Role of Federal Agencies

The Administration’s CVE strategy expects all relevant federal agencies – primarily

18

FBI and police investigator are seen around a vehicle in which two sus-pects were shot following a mass shooting in San Bernardino, Cali-fornia December 3, 2015. Authori-ties were working to determine why Syed Rizwan Farook, 28, and Tash-feen Malik, 27, who had a 6-month-old daughter together, opened fire at a holiday party of his co-workers in Southern California, killing 14 people and wounding 17 in an attack that appeared to have been planned. REUTERS/Mike Blake

Page 19: The IACSP’s Counter-Terrorism Journal V21N4

the FBI and the Department of Homeland Security (DHS) as well as the National Counterterrorism Center (NCTC) – to pursue specific programs within their areas of responsibility, relying upon and improv-ing existing programs and instituting new initiatives. At a White House Summit on Countering Violent Extremism in February of last year, the President called for federal agencies to build awareness of the dangers of violent extremism at the community as well as national level, and be prepared to intervene in order “to undermine the attrac-tion of extremist movements and ideologies that seek to promote violence […efforts to] address the root causes of extremism…”

As presented by the Bureau’s Director be-fore a Senate Committee, the FBI has estab-lished partnerships with federal, state, and local law enforcement agencies and built closer relationships with communities for countering the threat of domestic violence by jihadist or other extremists, whether groups or lone offenders. FBI special agents in charge (SACs) continue to run CVE educational programs for communities and assign designated points of contact in this issue at over two dozen FBI Field Offices. FBI field offices host the Community Rela-tions Executive Seminar Training (CREST) program to develop positive relations with minority groups in their communities and in particular to dispel feelings among Mus-lims that government agents treat them all as extremists. Joint Terrorism Task Forces (JTTF) under FBI leadership, have been modified and upgraded to take the primary role in investigative, surveillance, source

development, and other efforts to identify and take actions to disrupt violent extrem-ist plots, both jihadist violent extrem-ists and domestic violent extremists. In response to concerns over civil liberties, FBI agents have been encouraged to use the least intrusive methods possible in their investigations.

Coordinated by a Senior Executive, ef-forts of DHS to counter violent extrem-ism cover a spectrum of activities across most of its major components, including the Intelligence and Analysis Division (I&A) tracking individuals who leave the U.S., become radicalized, and later return;

Immigration and Customs Enforcement (ICE) uncovering dangerous extremists who may be illegal immigrants; and Cus-toms and Border Patrol (CBP) preventing individuals with radical extremist beliefs from entering the country or potentially fleeing if they fear authorities are about to disrupt their plans for conducting violent actions. As bluntly put by the Reuters news service this past June, the Depart-ment’s Transportation Security Admin-istration (TSA) has largely failed in its longstanding struggle to deal with the fact that terrorists have become increasingly adept in circumventing airport security when boarding international flights to the U.S.

DHS seeks to engage local communities in the fight against violent extremism, coordinating as appropriate with the FBI and other agencies at the federal, state,

and local levels. Efforts along these line as appearing in DHS’s Approach to Coun-tering Violent Extremism, issued in 2012, include working with the Department of Justice (DOJ) and state and local law enforcement partners “to train front line officers, first responders, and community leaders […on such topics as effective and ethical policing] and best practices in community outreach […in order] to improve communication, build trust, and encourage collaboration between officers and the communities they serve and pro-tect.” Community Awareness Briefings (CAB), developed and delivered by DHS in partnership with NCTC, are scheduled

to share unclassified information on the threat of violent extremism with commu-nity leaders and discuss how this danger can be dealt with at local levels.

Community Policing for CVE

Local law enforcement and federal gov-ernment officials have the experience to engage and build relationships with the communities they serve – a longstanding approach for fighting crime that can have value in curtailing violent extremism of all kinds. With such capabilities, police mov-ing about communities and tapping their sources can hear about or come into contact with individuals acting suspiciously, might observe indicators of radicalized behavior or other signs of violent extremist leanings, and might be able to recognize potential dangers that could be missed by federal authorities, such as terrorist related sleeper

As in the case of other open Western nations, the U.S. faces a monumen-tal challenge in trying to identify and then track potential violent extrem-ists. In words that ring true to American authorities, a former senior French counterterrorism official noted there are “too many of them, too few of us [….and] that monitoring one suspected individual “requires three to ten agents for round the clock surveillance and such resources are not available to monitor all these people,” as reported by CNN, Wash-ington, January 8, 2015.

Page 20: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

cells or underground extrem-ist groups. Indeed, over the years, local law enforcement agencies have played a criti-cal role in containing violent extrem ism in their communi-ties, working with state and

federal authorities to disrupt many plots and in some cases to dismantle local branches of terrorist organizations.

If building and exploiting relations at the community level are not done with care, however, community members, notably Muslims, could conclude that they are being treated as priori suspects and not as partners working to lower the dangers of extremism. Federal agencies need to

avoid what has been termed “securitizing” relations with the Muslim community that risks maintaining trust due to perceptions that a peaceful group of citizens are being subjected to extra governmental scrutiny. As local law enforcement officers work with their communities, moreover, they themselves are targets of attacks from violent extremists primarily representing anti-governmental ideologies. Anti-gov-ernment extrem ist such as mili tia groups and sov er eign cit i zens believe that police are agents of the ille git i mate gov ern ment and should be attacked, as is the case of white suprema cists who, as reported by the Anti-Defamation League (ADL) last year, believe police are tools of the “Jewish-controlled” gov ern ment.

Local authorities in thousands of communi-ties across the nation face a demanding and resource-heavy process in identifying and tracking high risk extremists, often as part of intense and time consuming federally-led JTTF investigations, while continuing to

execute their normal responsibilities. This has led to requests from local law enforce-ment for federal assistance. At the same time, identifying, tracking, and intercepting the potentially violent actions of what now has become thousands of potential terrorists and other extremists residing in the U.S. is overwhelming federal assets, notably the FBI that needs help “to keep tabs on… hundreds of possible terror suspects, “as CNN reported in its program, FBI strug-gling with the surge in homegrown terror cases” on May 30, 2015. Oddly enough, this has resulted in the dilemma of federal agencies calling for local police assistance in CVE, while community law enforcement agencies ask for federal help to identify and root out would be violent extremists.

Unfortunately, the lack of more resources to recruit substantially large numbers of additional local and federal law enforce-ment personnel to beef up the fight against violent extremism has led to a an impasse. However, this proverbial Gordian Knot might be cut through greater active support in CVE from alert citizens.

Citizen involvement in CVE is already being implemented in the Suspicious Activity Reporting (SAR) program, for instance, which involves citizens, busi-nesses, and banks as well as local law enforcement authorities in a procedure for identifying and reporting actions of individuals that might represent unusual activities by extremist individuals or groups. If You See Something, Say Some-thing is a DHS initiative that supports SAR through a nationwide campaign that enhances awareness of the need to report suspicious activities as well as programs that award prioritized state and local grants for developing such programs.

IWATCH complements SAR by creat-ing tailored opportunities for citizens to observe and report unusual activities that seem out of place in their own community, not only signs of terrorist planning but also indicators of all kinds of potentially violent extremist behavior. As recently put by the Secretary of Homeland Secu-rity in April 2015 as a guest on the CBS TV Show 60 Minutes, “If you feel you’ve observed something suspicious, do not dismiss it […as many] terrorist plots have been averted just because someone was observant enough, and reported what they saw to the authorities. Programs relying on alert citizens to report suspi-cious behavior may be uneven in results and can lead to as many false positives

as credible leads, but they are a useful element of CVE.

Where Do we Go From Here?Most Americans do not worry in their daily lives about the threat of violent extremism within our borders, but enjoy their freedoms while accepting more traditional dangers such as natural disas-ters and accidents as well as criminals and gangs that rob and kill. This public attitude has been influenced by experts who purport to demonstrate that many extremist plots have failed due to local law enforcement efforts, FBI overt and covert operations, or sheer incompetency on the part of the perpetrators. As of 2013, it was estimated that since 9/11, almost all of over four dozen terrorist planned attacks against the nation were thwarted. Recently, a series of jhadist extremist plots to bomb high profile tar-gets, including banks, capital buildings and commercial establishments were

Citizen involvement in CVE is already being implement-ed in the Suspicious Activity Reporting (SAR) program, for instance, which involves citizens, businesses, and banks as well as local law enforcement authorities in a procedure for identifying and reporting actions of in-dividuals that might represent unusual activities by ex-tremist individuals or groups.

20

Page 21: The IACSP’s Counter-Terrorism Journal V21N4

disrupted. Some extremists managed to get their hands on explosives or materials to make a bomb, with more than half of these acquiring components for bombs from federal informants or agents as part of a sting operation, as reported by the Heritage Foundation a few year ago.

Yet it only takes one such incident making headlines to remind us that violent actions by extremists in the U.S. do in fact occur on a regular basis, and that it would be fool-hardy not to take seriously the threats posed by jihadist and domestic violent extremists as both these vectors of violence become more numerous, capable, and dangerous.

Consider the recent anti-racist slaughtering of innocent people in Charleston as men-

tioned earlier, the jihadist-driven bombings at the Boston Marathon in 2013, or the mass murdering of theater goers in Colorado three years ago.

Federal agencies have sought to enhance their ability to counter the plans of violent extremists by employing intelligence, surveillance, investigational, and inter-ventional capabilities while striving to protect the public’s constitutional free-doms. In the view of the FBI, the Attorney General, and the President, this challenge would be far more difficult without key features of the Freedom Act, including the modified but vital NSA programs for gathering and being able to access meta-data on phone records of U.S. citizens and business given a court order. However, the Freedom Act still requires the govern-ment to respect the constitutionally based laws of individual privacy and liberty.

While these federal agencies have the re-sponsibility to provide top down policies

and programs for CVE, they also need to engage in programs that help com-munities deal with the issue of violent extremism. However, resource constraints plus the lack of confidence in federal agencies found in some communities, limit the ability of “the feds” to make sustained contributions to CVE at this level. This is why it is essential to build trusting relationships between police and their communities that can open up op-portunities to identify at-risk individuals or groups in time to enable appropriate interventions before violent actions are committed. As the Guardian wrote in a June 25, 2015 piece titled “Beyond Dylann Roof,” actions to prevent or at least identify potential violent extremists

need to “go beyond law enforcement … to family members, friends, teachers, sports coaches, religious mentors and mental health professionals who all require train-ing to spot what the secret service terms ‘stressors’ – triggers that will turn violent words into action.”

While strong community-oriented polic-ing can contribute to CVE, however, pres-sures are rising from public officials as well as the officers themselves for police to revert to more “traditional” approaches as they face increasing problems in en-gaging with communities suffering from high crime rates, serious socio-economic problems, reduced budgets, and individu-als bent on using force against the cop on the beat. More generally, until and unless major changes are made by state and local law enforcement on one side and demonstrators and their leaders on the other, many communities across the nation with their imploding situations and strained police relations will remain ripe

for radicalization and violent behavior with little hope of reversing this unin-habitable environment and returning to relative normalcy.

In conclusion, it is clear that strategies for meeting the challenges of CVE, which can be quite persuasive when articulated, are difficult to implement in practice, of-ten leading to results that do not work or trigger counterproductive consequences. This led a Brookings Institution expert in February of last year to suggest either ignoring ineffective CVE engagement programs that do nothing but can cost a lot or to “do no harm” by avoiding “pro-grams that might exacerbate the situation and alienate communities already vulner-

able to radicalization.” Nevertheless, from a positive perspectives, it can only be hoped that this article will generate new interest in developing and carrying out governmental and community level programs to counter if not conquer the enemy within through effective and af-fordable means that result in successful and measurable ends.

About the Author

Jerome Kahan is currently an independent writer and analyst, having worked for over 40 years in the national security, arms control, and homeland security fields. At the State Department, Mr. Kahan held positions on the Policy Planning Staff, as Dep-uty Assistant Secretary with the Political-Military and Intelligence Bureaus, and as Politico-Military Counselor in our Embassy in Turkey. Mr. Ka-han has written and/or contributed to a number of books, published articles in a variety of journals, and taught for ten years as an Adjunct Professor in the School of For-eign Service at Georgetown University.

Federal agencies have sought to enhance their ability

to counter the plans of violent extremists by employing

intelligence, surveillance, investigational, and interven-

tional capabilities while striving to protect the public’s

constitutional freedoms.

Page 22: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

NewTrendsIn TheTerrorist ThreatsAgainst TheBusiness Sector By Dr. Joshua Sinai

22

WTC NY 9-11-2001

Page 23: The IACSP’s Counter-Terrorism Journal V21N4

In the recent period, in addition to bomb-ings and shootings, terrorist groups have begun employing other types of warfare tactics against their business adversaries. In the first development, terrorist groups and their supporters (as well as state spon-sors of terrorism, such as Iran) now employ cyber weapons to inflict economic damage against their adversaries, such as the cyber-attacks by pro-Hamas Palestinian hackers against the website of the Israeli stock exchange on April 7, 2015. In a second development, with terrorist groups such as the Islamic State (IS/ISIS) controlling vast amounts of territory in weak and fragile states, they also employ terror to loot and appropriate for themselves bank accounts and illicitly sell the oil from the production and storage fields in the areas they govern, particularly in Iraq and Syria, in order to substantially grow and expand their funding sources (in addition to forcibly taxing the populations and busi-nesses in those areas).

As mentioned earlier, terrorism utilizes elements of military, economic and psycho-logical warfare against the targeted country and its economy. In terms of psychological warfare, terrorists aim to spread fear, anxi-ety and panic throughout the wider society by transforming a specific terrorist incident beyond its localized setting, thereby creat-ing a perception that every citizen and critical node in a country’s infrastructure is vulnerable to attack. Thus, when a na-tion is incapable of deterring or preventing the terrorist adversary from attacking its businesses, whether restaurants, shopping malls, hotels, transport, and even public gatherings such as movie houses and con-cert halls, it causes the affected government to appear inept and incapable of protecting its citizens and critical infrastructure from terrorist harm. Repeated and large-scale terrorist targeting of the business sector, therefore, has cascad-ing effects on other critical infrastructure sectors. As explained by Campbell Har-

vey, a professor of international business at Duke University’s Fuqua School of Business, “This is all about vulnerability.” “When consumers feel less safe, it changes their spending patterns. Businesses will change their investment and employment plans. Lack of confidence negatively impacts growth.” And terrorism not only disrupts normal business activity, but also increases the costs of doing business, either directly through economic damage or indi-rectly through the consequences on society of increased terrorism risk insurance rates and costly security measures. Countries or regions that experience frequent and large scale terrorist attacks, such as Afghanistan, Pakistan, Iraq, Syria, Yemen, and Somalia, have virtually no tourism industry, which also results in low levels of consumer spending and minimal foreign investment.

Even highly developed countries that ex-perience less frequent terrorist incidents suffer economically from such attacks. This was demonstrated by the ISIS-led si-

The business sector constitutes one of the primary strategic targets of contemporary terrorism be-cause attacking it can cause severe and cascad-ing economic damages to the targeted businesses and other sectors in the country’s overall critical infrastructure as well. In such a way, inflicting cascading damage on a country’s economy is one

of the four objectives, alongside human fatalities/injuries, phys-ical damage on the targeted facility, and psychological dam-age on a country’s population, of terrorism’s overall objective to damage, undermine, and extort political and other concessions from the threatened government and its economic sector.

Page 24: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

multaneous attacks on November 13, 2015 against busi-ness targets in Paris, France, where res-taurants, the Bata-clan concert theater,

and a packed sports stadium were intentionally targeted, in which 130 people were killed, and some 368 others were injured. Such mega terrorism incidents end up affecting every sphere in a country’s economic activity, for instance, in this case, resulting in a drastic decline in foreign tour-

ism, with hotels and restaurants experiencing substantially lower revenues. Interestingly, in what became known as the “Charlie Hebdo” (and follow-up) attacks in Paris on 7-9 January 2015, in which a total of 16 people were killed and 22 injured, these at-tacks resulted in less economic damage than the later Novem-ber 13 attacks because they were considered “one-off” type incidents. Once these attacks were followed by a mega, mass casualty attack, however, both attacks cumulatively demon-strated the severity of the ISIS/al Qaeda terrorist threats against France’s economy, whether by local or foreign operatives, and the government’s security forces inability to prevent them, thereby

inflicting a greater impact on the country’s economy. Even ‘low level’ impact terrorist knifing attacks that might aver-age one to three fatalities and injuries per an attack’s shooting, knifing, car ramming, or stone throwing, can lead to a country’s overall economic decline. This has been the case in Israel, where revenues at restaurants, hotels and the overall tourism industry have sharply declined, particularly in an important tourism city such as Jerusalem, which is highly

dependent on a steady stream of tourists for its economic well-being. In Jerusalem, moreover, even local residents have become wary of dining at restaurants or shopping at popular outdoor markets such as Machane Yehuda. Even more seriously, Arab res-taurants in Israel, whether in East Jerusalem, Nazareth, or in Jaffa’s mixed Jewish-Arab neighbor-hoods, have been experiencing sharply reduced volumes of Jew-ish customers, resulting in much reduced revenue and increased Arab-Jewish friction. Finally, in non-Western countries such as Egypt and Tunisia, tour-ism has been sharply reduced as a result of al Qaeda/Islamic State attacks in those countries,

including stoppage of some air-line flights from Egypt’s popular Sharm el-Sheikh resort following the blowing up of the Russian pas-senger airplane that had departed its airport. In an example of the most sig-nificant economic disruption in the aftermath of a terrorist event, al Qaeda’s simultaneous suicide airplane attacks against the World Trade Towers on September 11, 2001caused the loss of life of some 3,000 civilians, with the terrorists likely expecting thousands more

fatalities). In terms of economic losses, as reported by a June 30, 2004 New York Times article, the attacks cost the city’s economy 143,000 jobs a month and $2.8 billion in lost wages in the sub-sequent three months. Overall, it also resulted in $40 billion in insurance losses, with the ripple effects of the attacks impacting the country’s airline industry, as well. The attacks also resulted in additional billions of dollars in indirect consequences, as well. Types of Terrorist Threats Against the Business SectorThe business community, whether in the form of its personnel, facili-ties, or operations, is threatened by a continuum of terrorist attacks

ranging from low to high com-plexity and lethality of weaponry and tactical execution As suggested by this notional illustration, the business sector, like the rest of society, faces a continuum of types of potential terrorist attacks, weapons, and lethality. These tactics range from relatively low impact “conven-tional” attacks, such as shootings and bombings to cyber-attacks in the form of computer viruses, de-nial of service, and data breaches, to those involving biological,

chemical, radiological or nuclear (CBRN) “unconventional” weap-ons and devices. To forecast the likely type of terrorist threat, weapons, lethality and impact on the targeted business, it is neces-sary to consider the terrorist adver-sary’s intent to damage particular businesses, its past attack history, local presence and support, and its capability to conduct an attack of various levels of complex-ity of tactics and weaponry, and, especially, its ability to physi-cally reach its targeted location, or, in the case of a cyber-attack, to breach its IT defenses.

It is also important to note that terrorist threats do not affect all businesses alike. Bigger compa-nies, for example, especially those

24

Egypt’s Prime Minister Sherif Is-mail (2nd L) and Tourism Minister Hisham Zaazou look at the remains of a Russian airliner which crashed in central Sinai near El Arish city, north Egypt, October 31, 2015. The Airbus A321, operated by Rus-sian airline Kogalymavia under the brand name Metrojet, carrying 224 passengers crashed into a moun-tainous area of Egypt’s Sinai penin-sula shortly after losing radar con-tact near cruising altitude, killing all aboard. REUTERS/Stringer T

Page 25: The IACSP’s Counter-Terrorism Journal V21N4

with extensive overseas presence, such as multinational corporations in oil and gas, automobile manu-facturing, military equipment sales, hotel chains, and restaurants, may more be vulnerable to certain types of terrorist attacks than smaller and more localized com-panies. In addition to the different motivations by terrorist groups to target their perceived business adversaries, some multinational companies, such as hotel chains and restaurants, may present much softer targets than their more hardened automobile, oil and gas,

and military sales company coun-terparts. Similarly, businesses in regions that are frequently targeted by terrorists, such as the Middle East and North Africa, face more frequent and higher lethality threat risks than those in areas that ter-rorists do not consider vital for attack because of their hardened defenses, such as Western Europe, where terrorist attacks, as a result, are less frequent although still more ‘sought after’ because of the worldwide publicity such attacks generate for their cause.

Categories of Businesses Targeted by Terrorism

Certain business categories are of greater risk to terrorist attack than others. These include trans-

portation (aviation, ground and maritime), energy (nuclear power, oil and gas facilities, and chemical plants), financial institutions (such as stock exchanges and banks), tourism (hotels and restaurants), and shopping malls. The terrorist risks to these business sectors are discussed in this section.

Transportation Sector

Throughout the history of terror-ism, the transportation sector has been among the most frequent targets of terrorist attacks, as

reinforced by recent terrorist in-cidents, such as the bombing on November 24, 2015 by an ISIS affiliate in the Sinai Peninsula of the Russia-bound Russian airliner in mid-flight, killing all 224 people on board. As demonstrated by this and other attacks, for terrorists determined to indiscriminately kill in high quantity in order to cause economic disruption and psychological anxiety, aviation transportation (airplanes), ground transportation (trains, subways and buses), and maritime transpor-tation (cruise ships and oil tankers) are iconic targets.

Aviation

The aviation sector has long been targeted by terrorist groups. In

the 1970s and 1980s, hijacking was a pervasive terrorist tactic. This tactic was transformed in 9/11 when the terrorist goal was not to hijack and then land the aircraft but to use planes as suicide bombs to cause mass destruction. In response, as security has been hardened at airport terminals and aircraft (especially by automati-cally locking cockpits), instead of hijacking planes, terrorists have turned to other tactics such as bombing them by firing shoulder-launched Stinger missiles at flying aircraft. This was demonstrated by

al Qaeda’s unsuccessful attempt to down the Israeli Arkia Boeing 757 aircraft, carrying 261 passen-gers, that had just taken off from Mombassa’s airport in Kenya in late November 2002. In another new trend that was successfully executed, ISIS operatives report-edly exploited weak Egyptian security at the Sharm al-Sheikh airport to plant a soda can that had been converted into bomb to explode the Russian aircraft while in flight. Airlines are also highly concerned that insiders, such as radicalized pilots, who might intentionally crash their aircraft in mid-flight. Although still under investigation, it might be possible (although unproven) that the crash in international waters of Malaysia Flight 370, which mysteriously

disappeared on March 8, 2014 while flying from Kuala Lumpur International Airport near Kuala Lumpur, Malaysia, to Beijing Cap-ital International Airport in Beijing, China, might have been caused by one of the pilots. In another case, although not terrorism-related, the deliberate crashing on March 24, 2015 of Germanwings Flight 4U525 by Andreas Lubitz, its co-pilot, in the French Alps while the aircraft was en route from Barce-lona to Dusseldorf, demonstrates the potential for radicalized insiders to carry out such attacks.

GroundTerrorists seek to exploit new vulner-abilities in their adversary’s defenses, so as one sector is hardened, those that are considered soft and less fortified will be attacked. Thus, as the aviation or maritime sectors have become more secure than they were prior to Sept. 11’s aircraft hijackings, terrorists turn to less protected targets such as commuter trains, buses and subways which they attack with greater frequency. Interestingly, only one attack against the transportation sector has involved a weapon of mass destruction, which occurred on March 20, 1995, when Aum Shinrikyo’s operatives employed sarin gas to attack Tokyo’s subway system, kill-ing 12 and injuring more than 5,000 persons. Since then, attacks against

Throughout the history of terrorism, the transportation sector

has been among the most frequent targets of terrorist attacks,

as reinforced by recent terrorist incidents, such as the bombing

on November 24, 2015 by an ISIS affiliate in the Sinai Peninsula

of the Russia-bound Russian airliner in mid-flight, killing all

224 people on board.

Page 26: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.426

ground transportation have involved “con-ventional” weapons such as guns, bombs, and knives. Examples of targeting subways include a 1997 plot by

two Palestinian operatives (who may have been acting on their own) to carry out suicide bombings in New York City’s subways, which was foiled by the New York Police Department, the February 6, 2004 bombings by a Chechen suicide bomber of a Moscow underground train (killing 41 and injuring about 120 people); the bomb-ings by al Qaida-affiliated terrorists of Madrid’s trains on March 11, 2004 (191 fatalities and more than 1,800 injured) and the suicide bombings of London’s underground (and above

ground) trains on July 7, 2005 (52 fatalities and more than 700 injured), and the plot in September 2009 by Najibullah Zazi and two associates to conduct a suicide bombing of the New York City subway system, which was also thwarted a few days prior to the date of the intended bombings. In countries such as Israel, buses have long been targeted by Palestinian ter-rorists, with such attacks intensifying during the al Aqsa intifada (September 2000 to early 2005), and again, in what is considered the Third Intifada, beginning in September 2015, with Palestinian terrorists attacking Israeli passengers, primarily with knives, on board buses or at bus or train stops.

Maritime The threat of maritime terrorism is particularly significant because just

like ground and aviation terrorist war-fare, groups that engage in maritime warfare seek to damage the overall economic well-being and sense of security of their state adversaries. For example, when terrorists belonging to the Egyptian Al-Gama’a al-Islamiyya (also known as Islamic Group – IG) attacked cruise ships along the Nile River on four occasions from 1992 to 1994, tourists kept away from Egypt. In the Philippines, when the Abu Sayyaf Group (ASG) attacks cargo vessels or abducts foreigners from a tourist resort (as it did in 2001), it im-pacts on the entire country’s trade and economy. In Somalia, when al Sha-baab militiamen hijack foreign ships sailing off the country’s coastline, vessels steer away from that region. The January 1996 seizure of a Turk-

ish passenger ferry by pro-Chechen terrorists exposed the vulnerability to terrorist attack of passenger ferries in the Bosporus, Aegean and Black Seas astride the straits. The October 2000 suicide bombing of the USS Cole by al Qaida operatives in the Yemeni port of Aden, killing 17 U.S. Servicemen; the thwarted plot in June 2002 by al Qaida operatives to bomb American and British warships in the Gibraltar Strait; and the October 6, 2002 suicide bombing of the French Limburg tanker in the Gulf of Aden—all represented stark reminders that the world’s military and economic vessels represent ‘trophy’ targets of opportu-nity to terrorist groups. Since these ter-rorist attacks against maritime vessels, most attacks against this sector have involved criminal piracy, although terrorist groups such as Abu Sayyaf, which is affiliated with al Qaida, and

operates in the southwestern part of the Philippines, also engages in piracy as a means to raise funds for its operations.

The highly popular international cruise industry is a potential terror-ist target. Moreover, new classes of mega cruise ships are in service that exceed 140,000 gross tons, carry up-wards of 5,000 passengers and crew members—making them desirable ‘trophy’ targets to ambitious terrorist groups, such as al Qaeda. A terrorist attack against such mega ships would not only cause a catastrophic number of casualties, but threaten the entire cruise industries’ economic viabil-ity. To counteract such threats, the cruise industry has instituted security measures guided by regulations set

forth by the International Maritime Organization (IMO), such as em-ploying security officers and security watchmen aboard ships, restricting access to ships, maintaining security zones around ships, screening of pas-sengers and luggage, and monitoring the supplies that are loaded onto ships.

Energy Sector

The energy sector, especially the gas and oil industries on which a nation’s energy supply is so dependent, is per-ceived by terrorists as an important strategic target. Currently, al Qaeda and its affiliates, and the Islamic State, represent the primary terror-ist threats against the energy sector, although threats are also presented by other localized conflicts. The FARC’s insurgency in Colombia, for exam-ple, has targeted that country’s energy

sector, but that insurgency, which is in its final phase, has been primarily localized. In Africa, separatist rebels in Nigeria have been attacking the facilities and employees of foreign oil companies, such as Royal Dutch Shell, in the oil-rich Niger Delta.

Other types of threats to the gas and oil sectors are presented by the al Qaeda and ISIS insurgencies, which have become transnational and created ripples throughout every critical node in the affected coun-tries’ economic infrastructures. The facilities and personnel of Western oil companies, for example, have been attacked by al Qaeda and its affili-ated terrorist groups in Algeria, Iraq, Kuwait, Pakistan, Saudi Arabia, and Yemen. In one of the most prominent

of such attacks, in mid-January 2013, al Qaeda linked terrorists affiliated with Mokhtar Belmokhtar’s group, took foreign workers hostage at a gas facility near Amenas, in Algeria, kill-ing some 39 of the hostages (along with an Algerian security guard).

In another type of terrorist threat against the oil and gas sector, the ISIS group, which captured numerous oil fields in Syria, which are primarily located in the eastern region border-ing Iraq, enable it to reportedly earn, according to a Financial Times report, an estimated $1.5 million a day from its black market oil sales to various customers in Syria and Turkey.

Financial Sector

Financial institutions and banks have been directly targeted by terrorist

In countries such as Israel, buses have long been targeted by

Palestinian terrorists, with such attacks intensifying during the al

Aqsa intifada (September 2000 to early 2005), and again, in what

is considered the Third Intifada, beginning in September 2015, with

Palestinian terrorists attacking Israeli passengers, primarily with

knives, on board buses or at bus or train stops.

Page 27: The IACSP’s Counter-Terrorism Journal V21N4

DONA

TE T

ODAY

@ ia

csp.c

om/fo

unda

tion.p

hp

Page 28: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

faced such attacks, there is concern that a suicide attack on a single shopping mall would cause the public to consider all malls to be unsafe. At the same time, however, although retail centers were not directed targeted, the detonation of the pres-sure cooker bombs by the Tsarnaev brothers of a block of Boylston Street filled with spectators and runners near the finish line of the Boston Marathon on April 15, 2013 (killing 3 people and injuring 264 others), caused an economic and psychological toll on the owners and employees at the stores and offices in that area, some of which were shut down for several weeks afterwards.

Other countries, however, have experienced mass casualty terrorist attacks against their shopping malls, notably the September 21, 2013 mass shoot-ing attack by al Shabaab gunmen at the Westgate shopping mall in Nairobi, Kenya, which resulted in an estimated 67 fatalities and more than 175 injured.

Conclusion

As demonstrated by the types of terrorist attacks that have targeted various business categories, for business executives, ranging from security directors to financial executives, managing and mitigating the risk from terrorism in all its mani-festations is now part of their overall business decision-making process in order to make their enterprises as hardened and resilient as possible against such threats. To manage their risk to ter-rorism, business managers need to prioritize the types of terrorist threats likely to challenge their businesses and allocate protective resources in response, based on those measures that will likely yield the greatest return on investment. Specifically, business security directors are aware that effective defensive responses to the challenges presented by terrorism require their enterprises to be continuously vigilant, putting in place appropriate security and risk mitigation measures and protocols and continu-ally updating and testing their emergency response plans as these threats continue to evolve, often in unpredictable directions. They also need to ensure that their commercial property insurance policies are supplemented with terrorism insurance to cover losses that might be caused by a terrorist attack. Finally, in case of a major terrorist attack, business security directors also understand the need to imple-ment continuity of business operations measures. As examples of such foresight, in the aftermath of 9/11 the New York Stock Exchange— a perennial potential target of terrorist attacks—established an alternative trading floor outside New York City, as have other financial institutions since then to repli-cate their business operations outside their municipal areas in case of terrorism-caused catastrophes.

About the AuthorDr. Joshua Sinai is Director of Analytics & Business Intelligence at CRA (www.cra-usa.net), in Vienna, VA. He can be reached at [email protected].

28

groups for attack. Terrorist groups such as al Qaeda, its affiliates, and ISIS, regard the financial sector as extensions of Western economic power and dominance. Noteworthy terrorist attacks or plots against this sector have included the following:

* The November 2003, dual suicide bomb attacks in Istanbul, Turkey, against the British consulate and the local headquarters of HSBC bank, kill-ing at least 50 people. Al Qaeda and a Turkish Islamic militant group, the Great Eastern Islamic Raiders’ Front (IBDA-C), claimed responsibility for the attacks.

* In summer 2004, the U.S. government raised the terror alert for financial institutions in New York City, Newark, NJ, and Washington, DC, after uncovering an alleged al Qaeda plot to at-tack the Citicorp building in New York and the NYSE; the International Monetary Fund and World Bank buildings in Washington; and the Prudential building in Newark. The alert was lifted after several weeks.

* In August 2005 the police chief for London’s financial district (the “City”) warned that terror-ists might strike that business hub, where they had been surveying targets. London’s business quarter includes hundreds of banks, insurance companies, law firms and other critical institutions—includ-ing the London Stock Exchange and the Bank of England. It is also a leading international center for trading in metals, oil, and other commodities. The City of London was targeted in previous years by the Provisional Irish Republican Army (PIRA).

While no high profile terrorist attacks against the banking sector have occurred in Western countries since this earlier period, banks continue to be tar-geted by terrorist groups. In a new trend, terrorist groups and their supporters have attempted in sev-eral instances to conduct cyber-attacks against their adversaries’ banking institutions, such as the April 7, 2015 attacks by pro-Hamas Palestinian hackers against the website of the Israeli stock exchange.

In another type of terrorist exploitation of the banking sector, such groups and their associated commercial/charity fronts have reportedly used the international financial system for money laundering or to move funds from one country to another, posing another form of substantial risk to the financial sector.

In an especially worrisome new trend, terrorist groups, such as ISIS, use their captured territory in weak and fragile states to appropriate funds from its banking sector. In a prominent example, in June 2014, with ISIS’s capture of Mosul, Iraq, which is one of Iraq’s main oil centers, it report-edly appropriated, according to a Financial Times report, an estimated $500 million in funds from its central bank, including gold bullion. It reportedly also seized additional funds from banks across the

region. The same type of bank funds appropriation also likely has taken place in the territory under ISIS’s control in Syria. Such massive bank thefts have elevated ISIS to the world’s best-resourced terrorist organization.

Tourism Sector

Tourism is vital to a nation’s economy because it impacts on a government’s revenue, national income and employment. In many nations, tour-ism is a major economic sector and source of revenue, so attacking it leads to economic reces-sion and unemployment. Thus, in such susceptible countries, terrorist groups perceive hotels (and especially Western hotel chains), restaurants and tourist resorts as major targets for attack, as demonstrated by recent incidents. In one of the most prominent examples, on June 26, 2015, an Islamist terrorist carried out a mass shooting at the tourist resort at the Tunisian Port El Kantaoui, killing 38 people, of whom 30 were British tour-ists. This followed an attack in on March 18, 2015, when al Qaeda-affiliated terrorists conducted an attack by three Islamist terrorists in the Bardo National Museum, in Tunis, killing 22 people, of whom 20 were foreigners who were visiting the museum. With tourism contributing an estimated 10 percent of Tunisia’s gross domestic product (according to a recent news article), as well as employing 400,000 people directly or indirectly, these terrorist attacks (as well as uncertainty over future attacks) resulted in an estimated 80 percent decline in foreign tourism, with more than 70 hotels forced to shut down.

Although the war-torn and economically poor West African country of Mali is not a tourist destination, the November 20, 2015 terrorist attack on the luxury Radisson Blu Hotel in its capital Bamako, in which 22 people were killed, was a reminder that foreigners working in eco-nomic development and humanitarian assistance programs, who constituted most of the victims, are continuous targets of terrorists who seek to undermine a country’s return to stability.

In response to such terrorist threats, the hotel in-dustry around the world has beefed up its security departments, implementing a range of security measures to protect guests at their properties, rang-ing from deploying armed guards to erecting concrete barriers and metal detectors, although se-curity breaches continue to be exploited by terrorist groups as demonstrated by such recent incidents.

Retail Sector

As iconic symbols of a nation’s wealth and con-sumerism, the retail sector’s shopping malls are especially attractive targets to terrorists. With their open spaces and bustling shoppers, they represent “soft” targets because of their lack of controlled access and other security fortifications. Even though American shopping malls have not yet

Page 29: The IACSP’s Counter-Terrorism Journal V21N4

In-House Training Options for Corporations & Government Agencies

The International Association for Countert-errorism and Security Professionals can pro-vide anti-terrorism and homeland securitytraining for corporations, NGOs, and govern-ment agencies worldwide. Our instructors in-clude experts from a diverse range ofbackgrounds including FBI, CIA, DEA, and allbranches of the military.

Most on-site courses are offered in a standardformat designed for a diverse audience. How-ever, most programs can be customized to meetspecific training requirements.

For more information or to request a proposal,contact Steve Fustero, IACSP Executive Director:[email protected]

Advanced IED Search and Response TechniquesPrimary Audience: Security & Police / Standard Course Duration: 4-Days

Anti-Terrorism Officer (ATO) TrainingPrimary Audience: Security & Police / Standard Course Duration: 4-Days

Risk Assessment & Security PlanningPrimary Audience: Security Managers / Standard Course Duration: 3-Days

Bomb Threat ManagementPrimary Audience: Security / Standard Course Duration: 1-Day

Chemical & Biological TerrorismPrimary Audience: Security Managers / Standard Course Duration: 1-4 Days

Human Intelligence for Law EnforcementPrimary Audience: Police Intel Personnel / Standard Course Duration: 2-Days

Human Intelligence for Special Operations PersonnelPrimary Audience: Military Special Ops Personnel / Standard Course Duration: 7-Days

Islamic Culture & The Jihadist MindsetPrimary Audience: Police / Standard Course Duration: 1-Day

Mail SecurityPrimary Audience: Security & Mail Personnel / Standard Course Duration: 1-Day

Suicide TerrorismPrimary Audience: Security & Police / Standard Course Duration: 2-Days

Terrorism Financing & Money Laundering InvestigationPrimary Audience: Police Intel Personnel / Standard Course Duration: 2-Days

Let IACSP be your source for anti-terrorismand homeland security training!

Standard Course Options

IACSP_inhouse_ad_fullpage:Layout 1 3/31/2009 11:27 AM Page 1

Page 30: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

TerrorismAs AMultidimensional Phenomenon: Implications for an Ethical and Legal Homeland Security and Counter Terrorism ResponseBy Jonathan Appel, Ph.D. and Dohee Kim-Appel, Ph.D

30

A French sol-dier secures the

access to a Jewish school in Paris as part

of the highest level of “Vigipi-rate” security plan after last week’s

terror attacks January 12, 2015. Jewish schools and synagogues in France have been

promised extra protection, by the army if neces-sary, after killings by Islamic militants in Paris, the head

of the community’s umbrella group said on Sunday after a meeting with the French President. REUTERS/Gonzalo Fuentes

Page 31: The IACSP’s Counter-Terrorism Journal V21N4

Since the terrorists attacks of September 11 there is even more reason than ever to con-duct a vigorous analysis into the causes, impact, prevention, and understanding of violence and terrorism in a modern day and multidimensional context. Ter-rorism is often over-simplified as a religious, fundamental or irrational act. Terrorism is best seen as a dynamic and ever-changing phenomenon—but one that is best organized trough a multi-dimensional lens. It stands to reason without a prop-er and accurate understanding of terrorism—the response will be less than optimal, and lack firm ethical and legal moor-ings. It is “wide lens” view of terrorism that will offer the best

hope of organizing an appropri-ate and effective response for homeland security and counter-terrorism efforts.

The ChangingMeaning of TerrorismThe meaning of terrorism has changed over time. Many ex-perts suggest the concept of modern terrorism originated from the 18th century. This notion of terrorism, at least from the Western perspective, grew from the French Revo-lution (1789–1799), and was originally used to describe the actions of a government, not a band of revolutionaries (White, 2010). Terrorism developed and expanded throughout the nine-

teenth century, changing forms and ideology, and was often used as a tool to combat perceived imperialism. After World War II, the meaning of terrorism changed again and often became associ-ated with the horrific acts perpe-trated by the Nazis regime. By the mid-1960s to early 1980s, the term terrorism was most often ap-plied to the actions of violent left-wing groups, as well as those of nationalists or even official states. Several authors (Kushner, 1998; Carr, 2002) have distinguished between government-sponsored terrorism and terrorism done by non-governmental groups; however, a typology especially relevant to criminal justice was developed by Wolf (1981). Wolf referred to government terrorism

as enforcement terrorism, used by nations internally to maintain so-cial control. Examples included the “white terror” of Chile’s military intelligence services, the Death Squads in Brazil, the White Warriors Union in El Salvador, and the K.G.B. in the U.S.S.R. (Wolf, 1981). Many countries that report extremely low crime rates may be charac-terized by enforcement terror-ism. Non-government terrorism, which Wolf characterized as agitational terrorism, is done by small groups of individuals who want to alter the country’s status quo, but must do so within restricted time and space pe-rimeters and must restrict their organizational membership to a handful of persons (Wolf, 1981).

IntroductionTerrorism did not begin in a vacuum, nor is it merely a mod-ern phenomenon. Many Americans only became acutely aware of modern terrorism after the first World Trade Cen-ter bombing in 1993 and the bombing of the federal build-ing in Oklahoma City in 1995. Yet, modern terrorism began decades, even centuries, before these recent activities in

the United States. As Walter Laqueur (1996) observes, the meaning always changed with the flow of historical circumstances, and dif-ferent time frames gave various meanings to terms like terrorism, socialism, and anarchism. The past 30 years have witnessed an unprecedented growth in the number of bombings, kidnappings, arsons, assassinations, and other forms of violence and terrorism as tactics to achieve political objectives.

Page 32: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

and the American Homeland as a target as exemplified by the WTC/Pentagon 9/11 attacks. The United States is now lon-ger protected by its geographic isolation –as terrorism has truly found a transnational home in the global age.

The “New Terrorism”

There is perhaps a dividing point between “old” and “new” terrorism in the late 1980s and early 1990s. This dichotomy is between selective and nonselec-

tive destruction. Laqueur (1996) argues that modern terrorists are more ruthless and more violent than their historical counter-parts. Laqueur also states that modern terrorism has been typi-fied by indiscriminate violence and the intentional targeting of the civilian population. The “New Terrorism ” or ter-rorism since the 1980s --can be categorize as a truly global phenomenon not bound by geo-graphic—but also as a process not bound by traditional organi-zational hierarchies or structural

limitations. This new terrorism is cell-based or asymmetrical, has access and use of modern technologies, and may have the capacity to develop exceedingly lethal methods -- including with WMD or biological weapons potentials (White, 2010).

The newest forms of terrorism also while often politically vague is also often fundamen-tally religious driven (but often in a religious-political hubris). While some see the new ter-rorism as primarily driven by

religious ideology, other experts note that radical Islamic terror-ism is first and foremost a politi-cal and psychological response to contemporary political issues and does not reflect the es-sence of Islam (Esposito, 1999). Armstrong (2005) contends “fundamentalism is often a form of nationalism in religious dis-guise,” and suggests one should not over-generalize that such atrocities are caused by Islam or that the entire motive for terror-ism is religious. It is noteworthy to point out that while widely associated with religious funda-

32

Most suicide bombings are moti-vated by strategic, political, and territorial reasons. Religion can serve as a justification and can even help motivate the bombers, but not all terrorism is inspired by religion idealogy and religious fundamental-ists. Even religious fundamentalism is unlikely to be a single cause of terrorism, but it may reflect other aspects of group and personal dy-namics (Borum, 2004).

Into the 1980s, the meaning of terror-ism changed once again as terrorism was now the tactic of Middle Eastern groups with the use

of hostage taking and the target-ing of U.S. interests around the world. Some violent activities of hate groups were also in-cluded in the evolving defini-tion. As terrorism has evolved into the new millennium – there has been an increase in the diversity of offender groups. There is now terrorists who are independent from a state, hold violent religious fanatics, and/or are groups or individuals that terrorize for a particular cause such as the environment. The nature of the post- Cold War world has seen a change in the dynamics of the inter-national system where nations do not clash merely over eco-nomic or territorial issues, but now also over long-submerged cultural issues. According to Huntington (1993) the division of the world in the future will be exceedingly based upon a clash of civilizations and their people’s cultural and religious identities (Huntington, 1993, p.25). This appears to be the case with a comparison of Is-lamic and democratic nations and is reflected in the increase of conflicts and terrorism in the last few decades.

But, as terrorist attacks have increased sizably since the 1970s, and the plurality has been directed against United States citizens abroad—espe-cially diplomats and persons doing business. While “tradi-tional terrorism” was Marxist-Leninist in ideology, since the dissolution of the Soviet Union, the “new terrorism” has been seen as largely inspired by the Shi’a Islamic faith. Along with this trend into the 21st century has been increasing lethality

mentalism, suicide bombers are not exclusively religious; only 43% are identifiably religious (Brym, 2007) Most suicide bombings are motivated by strategic, political, and territo-rial reasons. Religion can serve as a justification and can even help motivate the bombers, but not all terrorism is inspired by religion idealogy and religious fundamentalists. Even religious fundamentalism is unlikely to be a single cause of terrorism, but it may reflect other aspects of group and personal dynamics (Borum, 2004).

One must also carefully distin-guish between terrorism rooted in Palestinian nationalism and terrorism rooted in Islamic fun-damentalism. The former has its roots in radical leftist groups, not religious fundamentalism. The two have very different be-liefs and agendas although they have influenced each other over the years (Poland, 2011). This is important because it helps to undermine the belief that Islam is monolithic and that Middle Eastern politics is homoge-neous. Moreover, many often lump all terrorist groups from the Middle East together – an error that often leads to a gross misunderstanding of the region and its people.

The Multidimensionalism of TerrorismAs suggested earlier, much of the “new terrorism” has been the product of the emerging independence of Islamic coun-tries and is multi-dimensional with political, psychological, social, and religious aspects. This multi-dimensional process exists both on an individual and at a country and state level. It involves groups of people form-ing associations, defining social realities, and taking actions based on the meanings given to those realities. Terrorism con-sequently has become the new

Page 33: The IACSP’s Counter-Terrorism Journal V21N4

reality for the United States (a reality it was really unprepared for). Unlike many other social processes and realities-- terror-ism is violent and is conducted in situations where violence is not expected. Motivation for terrorism and an effective response cannot be considered apart from political, historical, psychological, familial, social, and group dynamics, and even purely accidental factors.

Political Aspects of Terror-ism. Terrorism (and counter-terrorism) can be viewed as a political process. It is violent political activity designed to force particular interpretations of reality on others. Through-out history, many nationalists who found themselves under foreign control adopted the tac-tics of the terrorists in order to fight foreign powers occupying their lands. Nationalist groups throughout Europe turned to the philosophy of the bomb, and nationalistic terrorists began to follow the pattern set by the violent anarchists (according to White, 2001- Terrorism in the modern sense came from violent anarchists in the late 1800s). Nationalists believed they were fighting patriotic wars. They often adopted the tactics of the anarchists. The nationalist Irish Republican Army (IRA) rose from such nationalistic growth against colonialism (Laqueur, 2004). Conflict over secession and self-determination has grown in many postcolonial nations, resulting in extended and of-ten far-reaching campaigns of violence, civil war, and terror. Nation-states with a colonial past are significantly more likely to experience secession-ist conflicts by both ruling and excluded groups of people, suggesting that segments of the population are accustomed to self-rule, even under indirect colonialism, and then likely to

resent the shift to direct rule by the modern nation-state (Blanton, R., T.D. & Mason, Athow, B. 2001). Prior to 1945 the world was multi-polar, but after WWII, it became bi-polar with regards to a deterrent com-petition known as the “cold war” between two super pow-ers. After the collapse of the Soviet Union, the U.S. began to enjoy and assume a position of primacy. According to Betts, the U.S. confused primacy with invulnerability (Betts, 2002). Scholars of all disciplines have extensively argued the long-lasting adverse effects of co-lonial control in a post-colo-nial world is that it unleashed violent ethnic conflict. This is one of the many negative side effects of colonial control (Blanton et al. 2001; Lange et al. 2003; Lange and Dawson 2009; Ratner 1996). Pluchinsky (1998) has suggested “blood feud terrorism”—retaliatory acts of violence to satisfy the vengeance code of a clan—will only see an increase through the early part of the 21st cen-tury. Blood feud terrorism seems likely in the 15 newly independent states of the for-mer Soviet Union. In the more modern era—CIA covert activities, including assassination and regime de-stabilizing missions and U.S. nation-building efforts (IRAN is offered in the text as the classic example) have a back-lash potential with indigenous populations. It often creates the hotbed of conditions that foster the development of resentment and terrorism. Vengeance is often a ‘trigger’ in terrorism individuals engaging in terror-ism violence is a complicated problem and the question why they engage in terrorism is still more difficulty to determine than we can conclude on face value. The demand for retribu-tion or expression as vengeance

can serve as merely a public justification or excuse. Terror-ism is likely the result from a combination of other multiple factors as well.

Social Aspects of Terrorism. Terrorism and counter-terrorism is also a social process. Bandura (1990) noted that the path to terrorism can be shaped by fortuitous factors as well as by the conjoint influence of personal proclivity and social inducements. Horgan and Tay-lor (2001) have noted: “What we know of actual terrorists suggests that there is rarely a conscious decision made to be-come a terrorist. Most involve-ment in terrorism results from gradual exposure and socializa-tion towards extreme behavior.” The “Social-Developmental” approach has been suggested, in various forms, by a wide range of researchers and observers. Terrorism, in this view, is not the product of a single decision, but the end result of a dialec-tical process that gradually pushes an individual toward a commitment to violence over time. The process takes place within a larger political and social environment involving the state, the terrorist group, and the group’s self-designated political affliation. The interac-tion of these variables in a group setting is used to explain why individuals turn to violence and can eventually justify ter-rorist actions. Three factors - injustice, identity, and need for belonging –have been found often to co-occur in terrorists and strongly influence decisions to enter terrorist organizations and to engage in terrorist activ-ity (Borum, 2004).

Psychological Aspects of Ter-rorism. Terrorism and counter-terrorism is also a psychological process. Individuals take ac-tions within associations, ap-plying interpretations of reality and reacting to environmental

stimuli and possible motivators. Psychology has tried to profile terrorists with limited success as they constantly change over time. Former CIA psychiatrist, Jerrold Post (1984) built on the earlier models that sought to explain terrorism a form of psy-chopathology or personality de-fect, arguing that two different forms of dysfunction produced two different patterns of terror-ist behavior. The first type was the Anarchic-ideologue. These individuals were hypothesized to come from severely dys-functional families where they likely had suffered severe abuse or maltreatment, leading them to have hostile feelings toward their parents. Their extremist ideology was a displacement of their rebellion and hostility onto the state authority. That is, they acted out hostility by rebelling against the state of their parents (Post, 1984). In contrast, the second type, the “Nationalist-secessionist was not hostile, but loyal to his parents, and his extremism was motivated to retaliate or avenge the wrongs done to his parents by the state. In essence, they rebelled against external society out of loyalty to their parents” (Post, 1984 p.16). Crenshaw, (1992) notes that the idea of terror-ism as merely the product of mental disorder or psychopath is unlikely to be accurate as a psychology of terrorism cannot be considered apart from politi-cal, historical, familial, group dynamic, organic, ideological, and even purely accidental, coincidental factors.

Religious Aspects of Terrorism. Finally, since the last part of the twentieth century, terrorism has often become embedded in a religious process, that is hard to separate from other contexts. Religious and Spiritual tradi-tions across cultures and epochs have traditionally focused on the transpersonal accepts of living, but as psychological

Page 34: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.434

science evolves, there may be a rec-ognition and the need to study this transpersonal level of self and group ideologies. (Ap-

pel & Kim-Appel, 2010). The Transpersonal domain repre-sents the need for an “expansive” identity beyond the personal ego and the desire to experi-ence “transrational” stages of consciousness (see Walsh & Vaughan (1993). It is at the transpersonal sphere of influ-ence one can be driven towards aggressive acts. It is from this level one can express what Grof (1985) calls “malignant destruc-tiveness.” Grof indicates the need to distinguish “defensive” or “benign aggression” which is in service of the (perceived) survival of the individual or the species. “Malignant destructive-ness” is a form of aggression that can be done with even without any biological or economic reasons. “Malignant destruc-tiveness” is born out a lack of an integrated transpersonal perspective (e.g. experiencing a discontinuity among living organisms) as well as in a striv-ing for transcendence in the context of desiring death-rebirth. A transpersonal search can be worked through in a constructive moral and ethical system, or it can be abandoned in despair and/or existential crisis. This innate desire for purpose, meaning, and transcendence beyond a finite material life can also be per-verted or hijacked by spiritual or religious systems that advocate self or other destruction

Islam and Muslim countries are not a monolithic entity, and we must educate ourselves on the nuance of its plurality, internal dynamics, and historical com-plexities. Our national policies, laws and counter-terrorism strat-egies should reflect this fact.However, Islamic terrorism is still only one of countless forms

of terrorism today, including revolutionary, political, national-ist, cause-based, environmental, criminal, religious, enforcement, maverick, splinter, and even psychotic or lone-wolf terrorism. The “new domestic terrorist” movement includes Christian Identify advocates, Klan mem-bers, militias, Freemen, skin-heads, survivalists, Populists, gun enthusiasts, militant anti-abortionists, tax protesters, and neo-Nazis.

The Legal andEthical Framework in a Multidimensional Address of Terrorism

Most important, Homeland Security and most importantly our legal system should develop a clear definition of terrorism, such as that suggested by the Terrorism Research Center, which excludes singling out one ethnic or religious group or nonviolent acts of protest by American citizens that are not potential violent crimes against persons. Davis & Jenkins (2002) note to successfully deter terror-ism we must:

“Manifest strength and, perhaps even more important, manifest purpose and determination.” These authors go on to say:

“We must also show: (1) Con-sistency with American values in war and a moral validity ap-parent to others with whom the United States needs to work; and (2) A balance between efforts to crush a particular terrorist orga-nization and efforts to mitigate the factors that give the organiza-tion appeal and power (requiring consistent attention by policy and lawmakers and those who execute the strategy)” (p.25).

This approach also indicates efforts through interdiction—which includes gathering in-formation and intelligence and

disrupting terrorists operations and arresting planners. Profiling was also identified as a possible means of prevention (as part of deterrence)—but this can prob-lematic if based solely on racial or religious factors because it could alienate the very com-munities in which one needs to engage for information and pre-vention efforts. Profiling should be based on a multidimensional analysis of the multipath factors that come together to create the tipping point for expression of terrorist behavior.

Former Defense Secretary Robert Gates advocates the developmen-tal of relationships. He believes security begins by developing a concept he calls partner capac-ity (Gates, 2010). The prime goal of this policy is to help countries develop the means to defend themselves and creating alliances to support them and the right towards democratic rule. Partnerships require new cooperative intergovernmental relationships, assistance from allies, and pooling resources to solve security problems. Secular Muslim nations are also critical players in international security--so to blindly frame terrorism as a problem inherent in Islam itself is a strategy that is unlikely to be effective.

Universal Jurisprudence

“Universal jurisprudence” is a broad concept and embedded in the idea that:

“The nature of the crime, with-out regard to where the crime was committed, the national-ity of the alleged or convicted perpetrator, the nationality of the victim, or any other connec-tion to the state exercising such jurisdiction.” (The Princeton Principles on Universal Jurisdic-tion, 2001, p. 1).

These crimes are usually so hei-nous and universally condemned

that any civilized society would denounce them. This includes (but is not limited to-- (1) piracy; (2) slavery; (3) war crimes; (4) crimes against peace; (5) crimes against humanity; (6) genocide; and (7) torture (The Princeton Principles on Universal Jurisdic-tion 28, Princeton University Program in Law and Public Af-fairs, 2001). Many countries can use principles of Universal jurisprudence to provide a uni-fied approach to addressing these issues including dealing with terrorism.

Slowly but surely over time, the principle of universal jurispru-dence appears to be develop-ing world- wide (Van Alstine, 2009). This is in regards to the protection of human rights and environmental concerns and now towards a global stance against terrorism. Such an ap-proach would not have coun-tries operating in isolation—but in extended partnerships and universal rule applications.

Human Rights and Democratization as Central to Ethical and Legal Actions

The United States took the lead after World War II in the adop-tion of Human Rights agree-ments, but more recently human rights have taken a back seated to global politics (Carr, 2002). Right after World War II the United States was essential to establishing institutional and legal infrastructure intended to develop peace while promoting human rights. In light of the hu-man travesties of World War II the United Nations developed the Universal Declaration of Human Rights. The United Nations Universal Declaration of Human Rights (UDHR) is the most famous human rights agreement in the world. The key messages of the Universal Dec-laration of Human Rights are

Page 35: The IACSP’s Counter-Terrorism Journal V21N4

References• Appel, J. K., & Kim-Appel, D (2010). The

multipath approach to personality: Towards a unified model. Psychology Journal.

• Bandura, A. (1990). Mechanisms of moral disengagement. In W. Reich (Ed.), Origins of terrorism: Psychologies, ideologies, theologies, and states of mind (pp. 161-191).

• Cambridge, England: Cambridge Univer-sity Press.

• Banks, W. C., Nevers, R. D., & Wallerstein, M. B. (2009). Combating terrorism, strat-egies and approaches.Washington, D.C.: CQ Press.

• Brym, R. (2007). Six lessons of suicide bombers. Contexts 6, 40-45.

• Borum, R. (2004). Psychology of terrorism. Tampa: University of South Florida.

• Carr, C. (2002). The lesson of terror: A his-tory of warfare against civilians: Why it has always failed and why it will fail again. New York: Random.

• Cole, David (2003). Enemy aliens: Double standards and constitutional Freedoms in the war on terrorism. New York City: The New Press.

• Davis, P. K., & Jenkins, B.M. (2002), Deter-rence an influence in counterterrorism: A component in the war on al qaeda. Santa Monica, Calif.: RAND Corporation.

• Esposito, J. (1999). The Islamic threat: Myth or reality. New York: Oxford University

• Gates, W. (June 2010) Helping others de-fend themselves: The future of U.S. secu-rity assistance. accessed at: http://www.foreignaffairs.com/articles/66224/robert-m-gates/helping-others-defend- themselves)

• Grof, S. (1985). Beyond the brain: Birth, death and transcendence in psychotherapy. State University of New York, New York.

• Horgan, J. and Taylor, M. (2001). The making of a terrorist. Intelligence Review, 13(12), 16-18.

• Huntington, S. P. (1993). The clash of civili-zations? Foreign Affairs, 72, 3, 23-49.

• Jones, S. and Libicki, M. (2008), How ter-rorist groups end: Lessons for countering al qa’ida

• Washington, D.C.: RAND.• Kushner, H. (1998). The new terrorism (pp.

3-20). In H. Kushner (Ed.) The future of ter-rorism: Violence in the millennium. Thou-sand Oaks, CA: Sage.

• Laqueur, W. (1996). Postmodern terrorism. Foreign Affairs, 75, 5, 24-36.

• Laqueur, W. (2004). No end to war: Terror-ism in the twenty-first century. Continuum International Publishing Group.

• Pike, G. H. (2006). USA PATRIOT Act: What’s next? Information Today, 23, 4, p.1-5.

• Poland, J.M. (2010). Understanding terror-ism: Groups, strategies, and responses. NJ: Prentice Hall.

• Princeton Project on Universal Jurisdic-tion (2001). The Princeton principles on universal jurisdiction 28. Princeton University Program in Law and Public Af-fairs. Accessed at: http://lapa.princeton.edu/hosteddocs/unive_jur.pdf

• Pluchinskya, D. A. (1998). Terrorism in the former Soviet Union: A primer, a puzzle, a prognosis. Studies in Conflict & Terrorism, 21, 119-147.

• Silke, A. (ed.) (2011). The psychology of counter-terrorism. London: Routledge.

• Silke, A. (2003). Terrorists, victims and soci-ety: Psychological perspectives on terrorism and its consequences. Chichester: Wiley.

• U.S. Department of Homeland Security (2006). DHS six-point agenda. Accessed November 8, 2012 at: http://www.dhs.gov/xabout/history/editorial_0646.shtm

• Walsh, R & Vaughan, F. (1993). On Transpersonal definitions. Journal of Transpersonal Psychology, 25 (2) pp. 125-182.

• White, J. (2010). Terrorism: An introduction. Belmont, CA: Wadsworth Wolf, J.B. (1981). Fear of fear - A survey of terrorist operations and controls in open societies. New York, NY: Plenum Publishing.

that human rights are globally universal, equal, interdependent & indivisible (Than, & Shorts, 2003). This document can serve as a scaffold for an ethical and legal framework for a universal counterterrorism effort.

A more central human rights guiding philosophy protect rights of individuals—even those accused of the heinous acts of terrorism. This would not mean releasing or going “soft” on those suspected terrorists who are detained. But what this means—would be more guar-antee of due process—humane treatment (psychological and physical) within a context of fair justice. This would be in a contrast to a legal or criminal justice process that might be a “knee-jerk” or a revenge-retribution based systems. Au-thoritarian state tactics may ultimately negatively impact the outcome of counterterror-ism efforts as exemplified by the abusive interrogation and detention procedures used at Abu Graib Correctional Facility by Coalition forces in Iraq (Cole, 2003). It is still not known what other abuses have occurred with some 1200 persons detained under the PATRIOT Act because their detention is shrouded in secrecy. But if the United States is seen as abusive in their pursuit of terrorism—this can hinder needed partnerships and moral and ethical authority.

We must work diligently to understand why and how some people become terrorists. We must also become aware of the processes, developments, and factors contributing to the end of Terrorism. There have been terrorists organizations that have disbanded which we can learn from –and since 1968, 268 terrorist groups have disbanded according to Jones & Libicki (2008). Jones and Libicki (2008) found that the most common way for

terrorist groups to end was by joining the political and the legal process—either through a peace settlement with the government and abandonment of violence or through “civic action” in the absence of an explicit agreement. Accord-ing these researchers of the 268 groups that have ended since 1968 114 (or 43 percent) did so by entering nonviolent politics in one way or another. Examples include the Irish Republican Army (IRA), the Farabundo Martí National Liberation Front in El Sal-vador, and the Mozambican National Resistance. Impli-cations for such groups as al Qaeda remain unknown, but perhaps political solutions to extraneous supportive affilia-tion could weaken the synergy of terrorist’s causes. A more universal and human rights approach to terrorism would also involve the inclu-sion and use of exceedingly more international legal mecha-nisms. This would include more counterterrorism operation partnerships, as well as, use of more international legal structures—such as the use of international laws to prosecute alleged terrorists and more use of international courts. This also would include the development of perhaps of a more inclusive political processes that could hear international complaints and grievances (thus allow-ing the venting of anger that otherwise would be expressed through terrorist actions).

So we must show force and perseverance—but in a mea-sured and consistent way. This consistency must also be in line and congruence with American moral and legal values we profess. It must also be seen as part of universal human values that exist, not merely for self-serving benefit of a particular nation-state.

Conclusion Ultimately, the individuals in-volved in terrorism require a more complex response from society than simply a quest for their apprehension and blind persecution. Responses to ter-rorism, including security and legal ones based on inaccurate and misleading characterizations will lead inevitably to damaging policies and deficient outcomes as campaigns of violence are needlessly prolonged. It is from a narrow perspective that the concerns will arise with those who fight terrorism – and the policy makers and laws that guide them. We must replace the fragmented view of terrorism as a single issue (e.g. religious) and examine the phenomena from a wide lens. It is from this enlarged vantage point that we might be able to see interven-tion in different pathways as we move forward towards homeland and world security-- while maintaining the ethical and legal high ground.

About the Authors

Dr. Jonathan Appel has worked in the field of Behavioral Health for almost three decades. He is currently a Full Professor in the Department of Behav-ioral and Social Sciences, within the School of Criminal Justice and Social Sciences at Tiffin University. Dr. Appel, teaches criminal justice and psychology as has developed and taught a “psy-chology of terrorism” course for Tiffin University, and is certified in the Psy-chology of Terrorist by the American Psychotherapy Association. Dr. Appel has degrees in psychology and criminal justice with a specialization in Home-land Security.

Dr. Kim-Appel was born and raised in Seoul, South Korea, where she got her undergraduate degree in Art from Seoul Women’s University. She came to the United States in 1991. She then ob-tained two masters degrees (one in Art Therapy and one in Family Counsel-ing). Her Doctorate was then earned in Counseling with an emphasis in Family Therapy and a Cognate in Gerontology. She currently is an Associate Professor of Counseling and Art Therapy at Ursu-line College, and she has taught at both the undergraduate and graduate levels.

Page 36: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.436

Secure Driver:

Is Perception andReaction Time Overlooked?By Anthony Ricci

Is Perception and Reaction Time an often over looked skill or just one that is taken for granted? This is a skill that cannot be taught in one lesson, but it is a technique and muscle response that can be practiced and understood over time. Many Officers/road users take these two words or actions at face value. We first hear of these topics in High School Driver’s Ed class: the classroom teacher ad-

dresses the importance of “scanning the road - our eyes never stop moving” or “we need to look 12 to 15 seconds down the road and be ready to react” and of course in some PD Academies there may be discussions on time and distance and even some math to show students just how fast things really do happen.

Page 37: The IACSP’s Counter-Terrorism Journal V21N4

The reason this topic cannot be taught in one lesson is that there are so many underlining factors involved. For example we tell our students to scan the road but we forget to tell them how to scan, how the eyes and mind work, and what to look for. In some instances looking at the car down the road may not be enough but glancing down at the tires may give you a better indication of which way that car is going to start moving. By knowing what to look for the driver can save time and start to react sooner.

As we are approaching the next blind curve or the next car pulling out to cross the intersection what should we be thinking about? It is one thing to teach a student to see the car well ahead, but to tell the student to begin the information processing technique from the time they approach the vehicle to the time they get out takes on a whole new meaning. WE MUST CONSTANTLY PROCESS INFORMATION – SEE-ING IT, DOES NOTHING BUT IDENTIFING, REC-OGNIZING AND REACT-ING QUICKLY and ACCU-RATELY, SAVES LIVES. A Law Enforcement Officer must take this process to a much deeper level. He/she has to scan the roads for many things, not just potential ac-cident situations.

Perception time: the time it takes for the brain to identify an object as a potential hazard is at best .5 to .75 seconds if the driver is alert and ready to react.

Reaction time: the time it takes your brain to tell your hands and feet to do some-thing again it can take .5 to .75 seconds if the driver is in ready mode. While your brain is telling your foot to get to the brake-pedal, time is quickly passing and you are getting much closer to the dreaded contact point. Remember at this point the brakes have not been activated and your vehicle is still traveling at the same speed. Hopefully you will have enough space left to allow the brakes and steering wheel to work. The less space you have the more skill and luck you will need.

You’ve been called to a break-in where a female

caller is hiding in a downstairs closet. Your mind is set on the im-portance of the situation, saving a life, catching a thief, a potential confrontation of a weapon and maybemore than one suspect, your own well being, oh and I almost forgot DRIVING TO THE SCENE SAFELY. En route a car pulls out in front of you 300 feet down the road (football field). Your PPCV is traveling at 60 MPH with lights and siren. The question is do you have enough time to stop and/or avoid the vehicle?

Since accidents happen in feet not hours we first have to change MPH to FPS. An Accident Re-constructionist would multiply 1.47 times 60 MPH = 88 FPS which is exact. However, for the sake of this article let’s make it easy by multiplying 60 by 1.50: (60MPH/2= 30) (30 + 60 = 90 FPS) At 60 MPH for every second you travel you

are traveling 90 feet. Using the BEST case scenario if it takes you .5 second to recognize the car as a potential hazard and another .5 second for your brain to tell your hands and feet to do something, you have just covered 90 feet and are still moving at 60 MPH or 90 FPS. Problem is before you saw the car you were looking down at the police radio for only a split second, which put you 90 feet deeper into the acci-dent zone. You now have 120 feet and approx. 1.3 seconds to stop, this situation just got real serious. If the driver froze on the steering wheel and slammed on the brakes, which is quite common, your vehicle would end up 30 feet through the obstacle. A PPCV should be able to stop from 60 MPH in approx. 140 to 150 feet if using correct braking technique.

Since the driver does not con-trol braking distance the only place to make up time and create more distance is in the perception and reaction process. Driving is mostly a skill of the eyes and mind and trainers need to focus a large amount of time on how and what the officer perceives as dangerous and reacting quickly and properly to it.

About the Author

Anthony Ricci is President of ADSI 1adsi.com.

Since accidents happen in feet not hours we first have to change MPH to FPS. An Acci-dent Re-constructionist would multiply 1.47 times 60 MPH = 88 FPS which is exact. How-ever, for the sake of this article let’s make it easy by multiply-ing 60 by 1.50: (60MPH/2= 30) (30 + 60 = 90 FPS) At 60 MPH for every second you travel you are traveling 90 feet.

Page 38: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

A IACSP Q & A

With FormerNew York CityPolice Commissioner Ray Kelly

38

Ray Kelly, the author of “Vigilance: My Life Serv-ing America and Protecting Its Empire City“, served twice as the New York City police com-missioner. In his book, Ray Kelly writes about the sixteen terrorist plots against New York City that were thwarted after 9/11. He also of-fers his views and insights into the challenges

and controversies facing law enforcement today.The son of a milkman and a Macy’s dressing room checker, Ray Kelly grew up on New York City’s Upper West Side. He served as a Marine officer in Vietnam

and later became a New York City police officer. Kelly rose quickly through the NYPD ranks and he became the police commissioner under Mayor David Dinkins,

where he oversaw the police response to the 1993 World Trade Center bombing and spearheaded programs that would help usher in the city’s historic drop in crime.

Page 39: The IACSP’s Counter-Terrorism Journal V21N4

Eight years later, after the 9/11 attacks, newly elected Mayor Michael Bloomberg appointed Kelly to be NYC’s commissioner once again. After a decade serving as Un-der Secretary of the Treasury for Enforcement, overseeing U.S. Customs, and com-manding an international police force in Haiti, Kelly believed that the city could not afford to rely solely on the federal government for security. Kelly created and improved the NYPD’s counterterrorism and intel-ligence bureaus.

Ray Kelly retired from the Marine Corp Reserves with the rank of colonel after 30 years of service. He holds degrees from Manhattan College, St. John’s Univer-sity School of Law, New York University Graduate School of Law and the Ken-nedy School of Government at Harvard University.

(Editor’s note: Mr. Kelly was interviewed prior to the terrorist attack in San Ber-nardino, California and the shooting of a Philadelphia police officer by a man who confessed to the crime and supporting ISIS).

Ray Kelly was interviewed by Paul Davis, a contributing editor to the Journal. IACSP: Why did you write this book?

Kelly: I’ve been blessed with a lot of experiences and op-portunities and in those ex-periences are lessons learned and I wanted to memorialize it. My predecessors all wrote books, so as I was the lon-

gest serving commissioner I thought that I should put down some of the things that I was engaged in. I enjoyed the experience and it made me reflect on a lot of things. I tried to make it a readable book and it didn’t have a lot of numbers and that sort of thing.

IACSP: It had some good stories.

Kelly: I hope it was a good read.

IACSP: In addition to being police commissioner twice during tumultuous times, you also had other experiences, such as serving in Vietnam, Washington and Haiti. You could have written an entire book just on your time over-seeing international police operations in Haiti. Kelly: You’re absolutely right. They say that about 85% of the people there are Catholic, but 100% believe in Voodoo. That fatalistic spiritualism basically says that when problems arise they come from evil spirits.

IACSP: One of the things you should take credit for is creating a robust coun-terterrorism bureau and you enhanced your intelligence bureau, including sending NYPD detectives overseas. Was this effective? Was it worth the time and money?

Kelly: Yes, I think it was. First of all, the funding for the overseas program comes from a private foundation. The only thing that was on the public payroll was the salaries and living expenses

It got us what I was looking for, which was trip wires and listening posts for New York. For instance, during the London bombing, I was on the phone with our person in London before the head of the Metro-politan Police knew about the bombing. We didn’t know if this was part of worldwide series of attacks or what. We got granu-lar information very quickly. We didn’t have anyone in Mumbai during the bombing there, so we sent three officers there just after the shooting stopped. They were able to gather some really detailed information.

Page 40: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

and how we can better protect ourselves. Is there a possibility of something like this happen-ing in New York?

IACSP: And meanwhile the bad guys are communicating immediately worldwide via the Internet, emails and telephones.

Kelly: Yes.

IACSP: Did your detectives meet any resistance from foreign governments or our government, like the State Department, the CIA, the FBI and so on?

Kelly: They didn’t receive it. There was some grumblings on the ground level, but Bob Mueller, who was the FBI di-rector then, supported it. Some ambassador wanted them to report to him, but our position was this is a cop-to-cop rela-tionship. Now I was the Under Secretary of the Treasury for Enforcement and then the U.S. Customs Commissioner and one of the things we did was to have out LEGATs, our legal attaches, in other embassies throughout the world. I was aware of that program, but this was going to be different. This was between cops and it worked very well. We now have cops in the NYPD who were born in 106 countries. This gives the department tremendous diversity. We were able to match individuals with the country based on language skills and that sort of thing. As far as I know, it is still work-ing well.

IACSP: In your book you do a good job of describing the thwarting 16 terrorist plots against New York. Can you give us an overview of what

you thought was the most seri-ous of those plots and how they were thwarted?

Kelly: I want to be clear: basi-cally, it was 16 plots that were thwarted, but I never stated that the NYPD did it. The FBI does great work and the NYPD does great work, and oh, by the way, we were lucky. We’ll take luck every time. One attack in particular, where the individual drives into Times Square in 2010, finds a parking spot for his SUV on 45th and Broad-way, and sets off this bomb. He walks away, sets off a fuse and thinks he’s going to blow up this car. It only smoked. There was a vendor near there and a police officer on horseback who saw the smoke coming out of the car, reported it and the fire department came and ultimately the bomb squad came. What he had done was dumb-down the formula he was given. He was a natural-ized Pakistani. He had gone to Pakistan and came in contact with the Pakistan Taliban and they gave him the instruc-tions on how to do this with readily available equipment. However, he thought that he looked Pakistani and he would raise suspicions, so on his own volition, he dumbs down the formula. He uses a lessor grade of fertilizer because a higher level would be reported to the federal government. He goes to Pennsylvania to buy fire-crackers, but instead of buying M-80 firecrackers, which are very powerful, he buys M-88 firecrackers. So he kind of outsmarted himself. IACSP: Thankfully.

Kelly: He gets away but we’re able to track him based on the

40

of the officers. We did that from the get-go because I knew there would be problems and issues. You have

a guy in Brooklyn whose car was broken into and, hey, you have a detective in Abu Dhabi? It got us what I was looking for, which was trip wires and listen-ing posts for New York. For instance, during the London bombing, I was on the phone with our person in London before the head of the Met-ropolitan Police knew about the bombing. We didn’t know if this was part of worldwide series of attacks or what. We got granular information very quickly. We didn’t have anyone in Mumbai during the bombing there, so we sent three officers there just after the shooting stopped. They were able to gather some really detailed information. They landed on a Sunday and by the following Friday I had a 75-page report from them. We had 400 people in our audience listening to them when we had a hook-up. These were security directors in the New York and surround-ing area. We had a tabletop exercise that I administered with our executive corp. I sent the 75-page report to the FBI and they had it that morning, and we had an actual exercise in the field, roughly approxi-mating what had happened in Mumbai. That’s what I was looking for from the program – speed. Speed is information. It worked. It wasn’t only look-ing at the culture they were assigned to, but being able to travel to other locations and get information quickly. We don’t want to wait two years for a federal government report. We want to learn what happened

transaction where he bought the car in Connecticut. We identified him the next day. The FBI goes to his house in Bridgeport and surrounds his house thinking he’s in there, but he’s not. He drove to the airport with an M-9 rifle, which he was going to use to shoot his way out. When he gets to the airport, he leaves his rifle in the car, pays cash for a ticket and gets on a plane to Abba Dhabi. The plane pulls away from the ramp but brought back and he’s taken off the plane. He’s arrested and confesses to all of this. If in fact that bomb had worked, it would have killed probably scores of people. Times Square on a warm May night was packed with people. You would have had a lot of people killed. IACSP: In your book you called terrorism “theater.”

Kelly: That’s what it is. They want to make a show. Terror-ism sort of by definition means they are trying to level the play-ing field. Terrorists are fighting against a much biggest force or entity – the U.S. Government or another government – so what they are trying to do is instill fear in people, and that’s the theatrical part. And quite frankly, New York is still the world’s biggest stage. It is the financial capital, the communi-cations capital and the cultural capital. So you get more bang for the buck, no pun intended, by attacking New York City.

IACSP: Why did you write in your book that after the 1993 attack World Trade Center bombing you believed we were facing a new breed of Islamic jihadists that were more daunt-ing than anything America

Page 41: The IACSP’s Counter-Terrorism Journal V21N4

Protective DrivingExecutive Awareness

Security Driver Bodyguard SeminarProtective Security Operations

Threat DetectionNanny Driving & Security Awareness

High Risk DrivingFirearms Programs

Corporate Fleet Driver TrainingSport Utility Vehicle (SUV) Training

ADSI is an internationally recognized advanced driving school, specializing in training Security Drivers, Execu-tive Protection Teams and hosting many Corporate Fleet Safety Programs. We have the ability to design and imple-ment courses for a wide audience,specializing in Corporate Security, Military and Law En-forcement training.

Advanced Driving & Security Inc.5 Franklin Rd. Suite 5East Greenwich, RI 028181-401-294-1600 OfficeExt 2 Corporate/Private Security / LE / MIL Ext 3 High Performance1-401-398-7932 [email protected]

Page 42: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

Kelly: Yes. I think the sub-total of my ex-periences are pretty varied and defused. They certainly helped me. I think I was sort of the right guy at the right time. I had been in the federal government, I ran a federal law enforcement agency in the federal government and I had seen what the federal government could do. I had been in Haiti and worked with federal authorities and I worked for a long time as a street cop, running police commands and that sort of thing. So it all sort of came together for me to get the job done just three and a half months after the horrific events of September 11th. The city was in the doldrums and I like to think that under the leadership of Mayor Bloomberg we did a good job of bringing back the spirit of the city and reducing violent crime by 40% at the same time. This was done, by the way, with 6,000 fewer police officers than the previous administration. IACSP: What was your high point as police commissioner and your low point?

Kelly: The lowest points are always when police officers are shot and killed. We had on my watch two instances where two cops were killed at the same time. You have to make those announcements to the family and it is always gut-wrenching. The best moment was when I was appointed. We sent out the three Cs, we called it: crime suppression, counterterrorism and com-munity relations. I think we succeeded on all fronts. No successful terrorist attacks and we had crime reduced to record lows. We had record low shootings and record low shootings by police officers. We’re proud of it.

IACSP: I read that ABC is producing a TV series based on you and your book. Can you tell us anything about that?

Kelly: Well, we met with them and I have an ABC contract and we are starting to put it together now with a writer. We’ll see how it develops.

IACSP: Thank you for your long service and thank you for speaking to us.

has ever seen before? More daunting than Nazi Germany and Imperial Japan?

Kelly: The Internet has been a game-changer in terms of

motivating people and also in showing the means of how to conduct mayhem - I’m sure you know about Inspire magazine. So it is a very different threat from the threat we faced from the Japanese or the Germans. Fighting a standing army is one thing, but being able to identify a needle in a haystack and prevent a terrorist attack is very difficult. IACSP: How does law enforcement and intelligence agencies deal with the lone wolf terrorist?

Kelly: With great difficulty. In the book we talk about Jose Pementel. He was born in the Dominican Republic and he comes here when he’s three or four years of age and he later becomes a Muslim. He is motivated by films he saw on the Internet, including the alleged atroci-ties that happened at Abu Ghraib. So he wants to kill U.S. troops returning from Afghanistan. We got lucky by getting a confidential informant next to him. He’s using the confidential informant’s apart-ment, which we totally wired, so while this case is going on, I’m watching him make elbow bombs, three-joint bombs, basically. Making the fuel for that was 600 match tops. He took the tops off of the matches. The simplicity of it makes it very, very difficult to identify these people. We get into these chatrooms and pick up some concerns, but a lot of times now the chatrooms are password-protected and it is a one-on-one conversation. It is difficult to monitor that sort of thing. But because of our increased diversity we are able to have someone undercover interacting on a chatroom who uses the dialect or the street jargon of Karachi, because they were born in Karachi. IACSP: If I may change gears and cover crime, why do you think proactive police tactics like “Stop & Frisk” are effective? I read that you prefer the term “Street

Inquiries,” or “Stop, Question & Some-times Frisk.”

Kelly: It is common sense. It says that if people, particularly young people, have a tendency to carry a gun and have the po-tential for being stopped and having that gun found, they are less likely to carry it, therefore you will have less spontaneous shootings. When stops are done at a rea-sonable level I think it will reduce shoot-ings. We’ve seen it here in New York and we’ve seen it in other cities. There was an article in The NY Times in the last month or so saying there is an increase in shoot-ings in 30 cities in America. That’s not a coincidence. That’s a result of backing off from these types of tactics and strategies. It is perfectly lawful. It has been validated by a Supreme Court case, Terry vs. Ohio, and it works. The NYPD has cops from 106 countries, so to think we have a policy of racial profiling is wrong. “Stop & Frisk” is not a be-all or end-all, but the total tactics and strategies that we used in the Bloom-berg administration’s 12 years that resulted in almost 9,500 fewer murders than in the 12 preceding years. That is a phenomenal number. And if history is any guide, those lives saved are men of color. IACSP: I’m against most forms of gun control, but taking illegal guns away from street criminals is true gun control, in my view.

Kelly: You’re absolutely right.

IACSP: The DEA chief recently backed up the FBI director by agreeing that there was indeed a “Ferguson Effect” on police officers. Do you agree?

Kelly: I totally agree. Just ask the cops. They’re the best source. Don’t ask the White House. Ask a cop on the street.

IACSP: In addition to your long service with the NYPD, you also served as a Marine officer, a federal law enforcement official and a corporate security executive. Do you think these experiences helped you in your job as the police commissioner, especially during your second tour?

42

Page 43: The IACSP’s Counter-Terrorism Journal V21N4
Page 44: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.444

IACSPHomelandSecurityBookshelfBy Dr. Joshua SinaiThe following are noteworthy recently published books on various aspects of homeland security. The capsule reviews are arranged alphabetically, by authors’ last names.

Critical Infrastructure System Security and ResiliencyBetty Biringer, Eric Vugrin, and Drake Warren, (Boca Raton, FL: CRC Press, 2013),229 pages, $75.96 [Hardcover], ISBN: 9781466557505.

This is a valuable textbook on the methodologies and technologies required to mini-mize risks and upgrade resilience in critical infrastructure. The book is divided into two sections. The first section discusses the methodologies involved in conducting security risk assessment (e.g., estimating security risk by conducting threat and consequence analysis on ‘undesired events’, whether terrorism or natural disas-

ters, against critical assets, and assessing the effectiveness of protection systems). The second section focuses on the evaluation and design of resilient systems (e.g., a discussion of the current state of qualitative and quantitative resilience assessments, measuring the costs of resilience in terms of absorptive capacity and recovery costs); and case studies of how to apply the study’s infrastructure resilience analysis framework to assessing an entity’s level of resilience.

Page 45: The IACSP’s Counter-Terrorism Journal V21N4

The concluding chapter discusses future directions in resilience assessments. The appendices include an example of the ap-plication of a root cause analysis-type ‘fault tree’ to examine the elements that might cause the potential breakdown of an electric power transmission in order to understand how to prevent such events. The chapters are accompanied by numerous tables and diagrams, including a chapter summary and reference resources. Two of the authors are senior members of the technical staff at San-dia National Laboratories in Albuquerque, NM, where the third author had worked until he joined the RAND Corporation in 2011.

Disaster’s Impact on Livelihood and Cultural Survival: Losses, Opportunities, and MitigationMichele Companion, editor, (Boca Raton, FL: CRC Press, 2015), 354 pages, $79.96 [Hardcover], ISBN: 9781482248432.

This is one of the few books that compre-hensively examine the discipline of disaster management as it is applied to managing disasters around the world. This edited volume is divided into five sections: a dis-cussion of disaster risk reduction in general; post-disaster resettlement and implications for rebuilding in the cases of the Ecuadorian Andes, Honduras, Algeria, and Japan fol-lowing the 2011 earthquake and tsunami; the components involved in rehabilitating livelihood in cases involving natural ca-

tastrophes such as in Kansas, China, India, and Thailand; the impact of natural disasters on indigenous populations in cases such as Mindanao, Indonesia, and Louisiana, U.S.; and the role of local communities in helping recovery efforts.

Active Shooter: Preparing for and Responding to a Growing ThreatKevin T. Doss and C. David Shepherd, (Boston, MA: Butterworth Heinemann/El-sevier, 2015), 318 pages, $44.96 [Paper-back], ISBN: 978-0-12-802784-4.

This book provides a comprehensive and detailed examination of the measures required to prevent active shooter events, ranging from preparing for, responding to, and recovering from such incidents. Following an introduc-tory overview of the threat presented by ac-tive shooters primarily against private sector workplace facilities, the chapters cover topics such as how to profile the behaviors and mindsets of active shooters, including triggers that might drive such susceptible individuals into violence; the components involved in preparing preventative programs, including response and recovery programs; how to train and exercise employees in understanding how to respond to such violent events, such as in accordance with the ALICE response protocol of alert, lockdown, inform, counter, and escape; understanding the roles and responsibilities of first responders with whom affected security personnel need to coordinate effective response measures during such incidents; how to con-duct internal and external crisis communica-

tions during such incidents; and the processes involved in recovering from such incidents, including having a fully implemented busi-ness continuity plan in place. The Appendices include a series of checklist questions and issues to consider in preparing pre-incident pre-ventative and post-incident recovery programs. The authors are veteran practitioners in public safety, with Mr. Shepherd also a retired high ranking FBI official in counterterrorism and a former director of security for the Venetian Resort Hotel Casino, in Las Vegas, NV.

Counterterrorism LawStephen Dycus, William C. Banks, Peter Raven-Hansen, and Stephen L. Vladeck, editors, [Second Edition] (New York, NY: Wolters Kluwer Law & Business, 2012), 912 pages, $209.00 [Hardcover], ISBN: 9780735598638.

This highly useful legal textbook presents a comprehensive and detailed overview of counterterrorism law within the larger field of national security law. The book is divided into eight parts: an introduction, authorities and limits in the war on terrorists, detecting terrorist threats, detaining and interrogating terrorist suspects, criminalizing terrorists, prosecuting terrorists and their supporters, applying counterterror-ism law in homeland security, and applying “noncriminal sanctions” against terrorists and their supporters by means of public sanctions and launching lawsuits against terrorists and their supporters. The textbook’s chapters are ac-companied by excerpted sections from relevant criminal codes and criminal cases, including notes and questions for discussion.

Page 46: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

Investigative Interviewing: Psychology, Method, and Practice Eugene F. Ferraro, (Boca Raton, FL: CRC Press, 2015), 389 pages, $63.96 [Hard-cover], ISBN 9781466590861.

This is an authoritative, comprehensive and detailed examination of the practice of investigative interviewing whether in criminal proceedings or in the private sector where due process still has to be followed. The book’s chapters cover topics such as the process of investigations (investigation terminology, the elements of successful in-vestigation, whether physical or electronic, including undercover, or via interviews); the difference between public and private sector investigations; the fundamentals of interviewing, including collecting evidence in the course of such interviews, evidence retention and the chain of custody over such evidence); differentiating interviews from interrogation; methodologies to detect de-ception and, when appropriate, overcoming deceitful denials by suspects; handling legal challenges to interrogations; future trends in investigative interviewing; and methods to improve results in interrogation interview-ing. The appendices include a glossary of investigative terms and terminology, an in-vestigations checklist, a preprinted statement form, and an employee statement checklist. The author, a veteran expert practitioner in compliance (including in the U.S. military), is Chief Ethics Officer of Convercent, Inc., in Denver, CO.

Policing in Israel: Studying Crime Control, Community Policing, and CounterterrorismTal Jonathan-Zamir, David Weisburd and Badi Hasisi, editors, (Boca Raton, FL: CRC Press, 2016), 263 pages, $79.96 [Hardcover], ISBN: 9781498722568.

The contributors to this edited volume, who are prominent Israeli criminologists, examine three significant aspects of polic-ing in Israel: crime control (e.g., analyzing crime “hot spots”, measures to ensure road safety, and the impact of the organization of the criminal justice system on crime rates); police and community (e.g., the re-lationship between the police and minority communities, such as Israeli Arabs); and policing terrorism, with the Israeli police also responsible for maintaining internal security. Also discussed is media cover-age of police performance, including in confronting terrorism. Although the Is-raeli police has recently experienced several high-profile scandals involving financial corruption and mismanagement of criminal cases, it is hoped that the installation of Roni Alsheikh, the former deputy head of the General Security Service (Shin Bet) as Police Commissioner, will restore the type of efficient policing that is so well discussed in this important volume.

The book’s chapters cover topics such as the process of investigations (investigation terminology, the elements of successful investigation, whether physical or electronic, including undercover, or via interviews); the difference between public and private sector investigations; the fundamentals of interviewing, including collecting evidence in the course of such interviews, evidence retention and the chain of custody over such evidence); differentiating interviews from interrogation; methodologies to detect deception and, when appropriate, overcoming deceitful denials by suspects; handling legal challenges to interrogations; future trends in investigative interviewing; and methods to improve results in interrogation interviewing.

46

Page 47: The IACSP’s Counter-Terrorism Journal V21N4

Save on the Latest Books for Security Professionals from CRC Press

Sign up for our emails and get more special savings!

Visit www.crcpress.com to see our complete selection of titles and use promo code AWQ35 to receive a 25% DISCOUNT.

CRC Press is a premier publisher of books on Counterterrorism and Security Management.

Page 48: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.448

Homeland Security and Pri-vate Sector Business: Cor-porations’ Role in Critical Infrastructure ProtectionElsa Lee, [Second edition] (Boca Raton, FL: CRC Press, 2015), 354 pages, $79.96 [Hardcover], ISBN 9781482248432.

This practitioner-based handbook provides a comprehensive and detailed overview of all the components involved in conducting risk assessments to safeguard private sector business facilities against the spectrum of threats, such as terrorism, cyber breaches, and malicious employee insiders. The book’s chapters cover topics such as an overview of the Department of Homeland Security and its National Infrastructure Protection Plan (NIPP); trends in the evolution of the terrorist threat and warfare, including how terrorists plan their attacks; the components involved in conducting risk assessments, in which risk is defined as the product of threat x vulnerability; how to conduct an intelligence investigation in cooperation with law enforcement; and how to exercise a facility’s security plan. The handbook includes numerous highly useful tables and diagrams that serve as templates for putting together the security plans discussed in the chapters. The author, a former U.S. Army Counterintelligence Officer and Special Agent, is the CEO and founder of Advance SCI, LLC, a professional services firm in security and investigations.

Policing Terrorism: Research Studies into Police Counterterrorism InvestigationsDavid Lowe, (Boca Raton, FL: CRC Press, 2016), 203 pages, $71.96 [Hard-cover], ISBN: 9781482226836.

Written by a former British counter-terrorism detective, this highly useful practitioner-focused book is divided into two sections on policing terrorism. The first section, “The Law Governing Ter-rorism Investigations,” discusses the law governing terrorism investigations, in-cluding how terrorism is legally defined, government policies and statutory pre-ventative measures against terrorism, the need to balance the interests of national security and individual civil liberties in conducting surveillance and information sharing on terrorist suspects, how terror-ism is funded, and a comparative study of how terrorism-related laws are applied in a number of states. The second section, “Investigating Terrorism,” discusses is-sues such as the need for police officers to understand the levels of legal powers granted them to track the radicalization of individuals into terrorism, how to re-cruit informants and how they need to be handled, including in court proceedings.

Risk Analysis and Security Countermeasure SelectionThomas L. Norman, [Second edition] (Boca Raton, FL: CRC Press, 2016), 483 pages, $55.96 [Hardcover], ISBN 9781482244199.

This reference handbook is a comprehen-sive examination of the methodologies and technologies required to conduct risk analysis and to select effective counter-measures required to develop a security program. The handbook, which is intended for security professionals, is divided into three sections: selecting appropriate methodologies and tools to conduct a prioritized risk analysis of one’s assets, in terms of the probability of the threat to their being attacked; the components in terms of policies, standards, guidelines and procedures involved in implement-ing a security program; and metrics of effectiveness in selecting and budgeting for countermeasures in terms of security personnel and technologies, as well as the author’s guidelines for writing threat and vulnerability assessment reports. The author is a veteran security risk manage-ment consultant.

Page 49: The IACSP’s Counter-Terrorism Journal V21N4

Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA): The U.S. Military’s Role to Support and DefendBert B. Tussing and Robert McCreight, editors, (Boca Raton, FL: CRC Press, 2015), 224 pages, $71.96 [Hardcover], ISBN 9781466595675

The contributors to this highly useful textbook examine the roles and missions of the U.S. armed forces in support of civil authorities in homeland defense, particularly during emer-gency and disaster events, such as natural disasters and terrorism. The chapters cover topics such as the constitutional and legal frameworks governing the support of the military to civil authorities (including the role of US NORTHCOM in homeland defense), the air, land, and maritime domains where the military supports civil authorities, the military’s role in counter-ing potential weapons of mass destruction (WMD)-type events, and emerging challenges in homeland defense in areas such as competition over the Arctic Region, cyber security, and unforeseen catastrophes. Each chapter includes diagrams, tables, discussion questions, and reference sources. and legal frameworks governing the support of the military to civil au-thorities (including the role of US NORTHCOM in homeland defense), the air, land, and maritime domains where the military supports civil au-thorities, the military’s role in countering potential weapons of mass destruction (WMD)-type events, and emerging challenges in homeland defense in areas such as competition over the Arctic Region, cyber security, and unforeseen catastrophes. Each chapter includes diagrams, tables, discussion ques-tions, and reference sources.

Please note that three of the capsule reviews originally appeared in the December 2015 issue of the online journal “Perspectives on Terror-ism” (www.terrorismanalysts.com). Reprinted with permission.

About the Reviewer

Dr. Joshua Sinai is Director of Analytics & Busi-ness Intelligence at CRA (www.cra-usa.net), in Vienna, VA. He can be reached at [email protected].

Intelligence-Based Security in Private IndustryThomas A. Trier, (Boca Raton, FL: CRC Press, 2015), 187 pages, $55.96 [Hard-cover], ISBN: 9781498722032.

This is a highly useful practitioner-based overview of the components involved in conducting in-house intelligence-based security assessments and the guidelines required to mitigate a private business’s risk and vulnerability to criminal, workplace violence and other types of illicit activities. The book is divided into six sections: an in-troductory overview of intelligence and the advantages of an intelligence-based security program; assessing a security program in terms of its capabilities and compliance to security standards; building consensus among stakeholders for a security program; the components of a security assessment in terms of external, internal, and industry threats vis-à-vis vulnerabilities; planning and resourcing involved in conducting an intelligence program assessment; develop-ing a strategic and tactical plan to mitigate enterprise risk; and case studies that dem-onstrate best practices in implementing an intelligence-based security plan. The author, a retired former high-ranking FBI official in intelligence management, provides advisory services to the private sector through his firm, Security Intelligence Consulting, LLC.

Page 50: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

Page 51: The IACSP’s Counter-Terrorism Journal V21N4

Now Enrolling!

Go.EKU.edu/IACSP I 859-622-7428

100% ONLINEHOMELAND SECURITY

n Fully accredited, nonprofit brick-and-mortar institutionn Ranked by U.S. News among the best universities offering online degreesn Rated by Military Times as one of the Top 5 schools for veterans in the nation

Advance Your Homeland Security Career 100% Online Degree

EKU-15140 HomelandSecuity_IACSP_fullpageAd.indd 1 9/30/15 4:21 PM

Page 52: The IACSP’s Counter-Terrorism Journal V21N4

Journal of Counterterrorism & Homeland Security International Vol. 21, No.4

YOU ARE DRIVEN TO

LEADWE ARE DRIVEN TO HELP YOU GET THERE.

To learn more, visit www.PublicSafetyatAMU.com/IACSP

At American Military University, we understand where you’ve been, what you’ve done and what you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join 100,000 professionals gaining relevant skills that can be put into practice the same day. Take the next step, and learn from the leader.