The Guardian
The Guardian
The Guardian
Volume 12 | Issue 2
The Guardian
Overall, I think that there was general agreement on five points: first, that our effort
is moving in the right direction; second, that the road ahead will be long and hard;
third, that the elements of success troops, civilians, strategy, growing ANSF
and government capacity are in place, or well in progress; fourth, that we have
regained the initiative; and fifth, that progress is being made, slowly but steadily
and sustainably.
Protecting those we are here to help nonetheless does require killing, capturing, or
turning the insurgents. We will not shrink from that; indeed, you have been taking
the fight to the enemy and we will continue to do so.
The Guardian
Guardian readers,
Welcome to the The Guardian Summer 2010 edition. I am especially pleased to introduce this issue
as it will be my final opportunity as the J-34 Deputy Director for Antiterrorism/Homeland Defense.
The Guardian is loaded with resources for Antiterrorism/Force Protection (AT/FP) professionals and
addresses a broad range of timely and relevant topics:
The Dhofar Campaign The author applies lessons learned by British and Omanis in Dhofar, Oman to Operation
ENDURING FREEDOM in Afghanistan.
Antiterrorism Awareness August is the Army AT Awareness month. AT is an integral part of force protection,
key to ensuring a force capable of achieving mission success, and is every commanders responsibility.
Expeditionary Forensics Forensic science and technology have matured and are now important operational
capabilities. Expeditionary labs are having a real impact on in C-IED and Force Protection efforts in Iraq and
Afghanistan.
Mission Assurance Assessments and the Road Ahead The Defense Critical Infrastructure Protection (DCIP),
Assessments and Resource Division provides a current overview of resources available to assess and mitigate AT
vulnerabilities.
RAVA: The Risk Analysis Vulnerability Assessment Process This process quantitatively measures threats,
assets, vulnerabilities, and risks associated with large and/or small government facilities.
The Serpent & the Sword An analysis of the current range of biological threats and DODs AT/FP capabilities to
counter the growing number of biological threats.
During my time on the Joint Staff, the AT/FP community has continued to adapt to evolving domestic and
international threats, ranging from IEDs in Afghanistan to domestic terror plots. I am confident the AT/FP community
will continue to champion and advocate for robust and forward-leaning AT programs, increased training and
education, and responsive policy. Please contact your Service, Command or Agency representatives with suggestions,
articles, and comments via SharePoint regarding the rewrites of DODD 2000.12 DoD Antiterrorism (AT) Program; DODI
2000.16 DoD Antiterrorism (AT) Standards, the updates to the Level I AT Training modules and the revision of Joint
Publication JP 3-07.2 Antiterrorism.
Upcoming opportunities for AT/FP-related professional education include the Joint Staff Antiterrorism Executive
Seminar 19-21 October 2010. Additional resources for professional development include J-34s AT-focused professional
reading list and book reviews. AT policy, training, and assessment tools exist on the Antiterrorism Enterprise Portal
(ATEP) at Army Knowledge Online (AKO) and J-34s new Intelink SharePoint portal on the SIPRNET.
It has been a privilege to serve as the J-34! The expertise, integrity, and resourcefulness of the men and women
with whom I have had the honor of serving never ceased to impress me. Please continue to assist J-34 in building
and fostering strong AT/FP programs by submitting your comments, suggestions, and articles at the guardian@
js.pentagon.mil or via ATEP. Thank you for sharing your knowledge and experience with the larger AT/FP community
via The Guardian.
Check Six!
The
Dhofar
Campaign
U.S. Army photo by Staff Sgt. William Tremblay/Released
Introduction
Persian Gulf
Gulf of Oman
Muscat
OMAN
Dhofar
Arabian Sea
Cultural learning curve. Local customs can inhibit identification of enemies and friendly forces. Society in southern
Afghanistan exists as a closed tribal society that is hard for outsiders to penetrate and understand. There are alliances
and divisions that go back years but that shift constantly. (U.S. Army photo by Sgt. Teddy Wade/Released)
Narcotics
A well-thought-out communications
program will work wonders. It must tell
the truth at all times; otherwise, it just
becomes a cynical propaganda tool that
people quickly see through.
Conclusion
FIGURE 3. Ratio of Insecurity to Opium Production by Province
(Annual Report: 2008United Nations Office on Drugs and Crime)
Corruption
Corruption, on a level rarely seen elsewhere, is
the other ingredient in the mix that will undermine
the success of any counterinsurgency campaign.
Undoubtedly, corruption would exist, even if the
narcotics did not, because it is part of the way of life
in central Asia. What is certain is that even Afghans
feel that corruption has gotten out of hand and has
reached epidemic levels. Rampant corruption at all
levels of government will prevent a coordinated
multiagency government approach (the armed forces
being but one agency), which is critical to any successful
counterinsurgency campaign. One can put forward the
argument that with the current levels of corruption in the
Karzai regimefrom ministers down to the policemen on
the streetthe insurgency can never really be defeated.
This author firmly believes that the Taliban cannot
win; however, as it stands now, the Taliban will not be
9 The Guardian SUMMER 2010
3 Chris Hughes, The SAS squad lead the manhunt for Afghan
assassin Gulbuddin, The Mirror, 1 May 2009.
4 The author recommends a study of the Selous Scouts from
the Rhodesian war and the book Gangs and Counter-gangs by
General Sir Frank Kitson (see the bibliography). Kitson is the
Bibliography
Book Review
Omar Nasiri, a pseudonym for the Moroccan who successfully penetrated al Qaedas terror network, presents a compelling
inside look at life in the Khaldan Training Camp and challenges some common Western misperceptions and stereotypes
about al Qaeda.
Nasiri beat al Qaedas stringent security and vetting processes and infiltrated the terror training camps in Afghanistan while
working as an informant for European intelligence services between 1994 and 2000. Nasiri was not actively recruited by
intelligence services, and his motives for offering his services as a mole were not altruistic.
Instead, he was driven primarily by a sense of disillusionment and self-preservation. Readers may find the vivid accounts
of Nasiris terrorist training eerily familiar to experiences from Basic Training. At the camp, these mujahedeen pushed their
bodies to the limits of their endurance and were instructed in advanced, hand-to-hand combat techniques. Nasiri expressed
enthusiasm for the weapons training course and indicated that there was never a shortage of weapons or ammunition at
the camp.
In addition to weapons training, recruits learned advanced surveillance techniques and how to create homemade
explosives from common household chemicals. Finally, interrogation resistance techniques, such as how to endure and
use misinformation after capture, were systematically taught. Nasiri claims these tactics were successfully used by Ibn
al-Sheikh al-Libi to bolster Saddam Husseins connections with al Qaeda:
No, Ibn Sheikh did not crack under the pressure of torture. He handled his interrogators with the same
skill that he used to handle his gun. He knew what his interrogators wanted, and he was happy to give
it to them. He wanted to see Saddam toppled even more than the Americans did. As he had told us at
Khaldan, Iraq was the next great jihad. Somewhere, in a secret torture chamber, Ibn Sheikh had won his
battle.
Whether or not the authors account of events is entirely true, the book is useful for its insights into al Qaedas training,
tactics, and mindset.
1LT Venessa Saucier is the Antiterrorism Officer at Gulfport CRTC, Mississippi.
Recommended Reading
J-34 Antiterrorism Reading List
To assist in the professional military education and development of the AT/FP community, J-34 has compiled a
reading list on topics related to antiterrorism.
Benjamin, Daniel, and Steven Simon. The Age of Sacred Terror:
Radical Islams War Against America. New York: Random House,
2003.
Coll, Steve. Ghost Wars: The Secret History of the CIA, Afghanistan,
and Bin Laden, from the Soviet Invasion to September 10, 2001.
New York: Penguin, 2005.
Lewis, Bernard. Crisis of Islam: Holy War and Unholy Terror. New
York: Random House, 2004.
Guardian readers are encouraged to submit articles with analysis that expands on or critiques AT-related topics covered in these books. Send submissions to guardian@js.pentagon.mil.
Antiterrorism
Awareness
U.S. Navy Photo by Chief Mass Communication
Specialist Jeremy L. Wood/Released
When the members of the military and civilians know what to look for,
they can contribute immeasurably to our nations security.
Terrorists are constantly scheming to attack your Army, your country, and even your family.
Specialist Gayonont, 3rd US Infantry Regiment, The Old Guard
Enhancing AT
Awareness
Since October 2008, the
Headquarters, Department of
the Army (HQDA) AT Branch
under the OPMG has taken
deliberate and lasting steps to
instill a heightened sense of
AT awareness and vigilance
across the Army. When asked
why this new initiative was
adopted, Mr. Alex Mascelli, AT Branch Chief, responded
to questions regarding the adoption of this new initiative,
stating: We cannot afford to drop our guard or become
complacent. Just because we havent had a successful
attack for a while doesnt mean terrorists are not planning
for that. In fact, continuing
to prevent future attacks
becomes even harder, and
we must re-double our
efforts to ensure terrorist
threat awareness and
vigilance is maintained.
Army efforts to enhance
AT awareness began
in earnest in 2008 and
are now in full-scale
implementation. These
efforts began with the
realization that sustaining
AT awareness throughout
our communities is tough,
particularly when the
majority of our community
members feel they live
and work within the safest
locations in the country.
The Armys first steps
to increase focus and
resources on awareness are
to enhance AT awareness
throughout the Army
community as a goal in
the ATSP, followed by the
development of a
supporting AT strategic
communication
(STRATCOM) plan.
The key parts of the Army AT STRATCOM plan
include
The Guardian SUMMER 2010 14
AT Awareness Month
On 16 February 2010, the Department of the Army
(DA) senior leadership approved an AT awareness month
for August 2010. During this month, Army installations,
facilities, and forces will focus their efforts to heighten
AT awareness and vigilance to prevent and protect Army
communities from acts of terrorism. By integrating AT
doctrinal principles with constant AT awareness, the
Army ensures the safety
and security of its people
while ensuring mission
success.
The Armys AT
awareness month has four
themes:
Education and Training:
Conducting AT training,
education, and awareness
for military and DA
civilians throughout the
month
Suspicious Activity
Reporting: Increased
emphasis on suspicious
activity reporting,
including the indicators of
potential terrorist behavior
and activities,relevant
categories of information,
and appropriate
authorities
Leadership: A review
and emphasis of AT roles
and responsibilities for
unit leaders and staffs
across operational units,
installations, and standalone facilities
Emergency Preparedness: Enhancing AT preparedness
through emergency response planning and local civilian
and host nation partnerships.
15 The Guardian SUMMER 2010
iWATCH ARMY
iWATCH is a nationwide, modern version of the
neighborhood watch program. Modeled after the Los
Angeles Police Departments terrorist watch program,
iWATCH ARMY encourages and enables citizens to help
protect their communities by identifying and reporting
suspicious behavior
associated with terrorist
activities. The passive
element of iWATCH
ARMY is individual
situational awareness
of surroundings. That
distinction is essentially
learning the difference
between normal and
unusual. The active
element of iWATCH
ARMY involves
individuals taking action
to report suspicious
behavior or activities to
military police or other law
enforcement agencies for
further investigation. The
partnership between the
MP and the community
builds teamwork that
expands information
collection and increases
opportunities to identify
prospective terrorists
before they strike.
We know from
investigations of successful
terrorist attacks that
perpetrators conduct
reconnaissance and
surveillance to determine
vulnerabilities, to select targets, and to develop and
finalize attack plans. The local community can often
observe some of the actions undertaken by terrorists
Disseminating
Awareness Products
To ensure the AT
STRATCOM messages
and products are received
and add value at the
community level, the
Armys AT Branch has
undertaken a significant
effort in order to
disseminate products
and tools to assist leaders
in the development
and implementation of
community awareness programs at the installation,
stand-alone facility, and unit levels. Ongoing efforts
include
Mass distribution of more than 1 million AT awareness and iWATCH ARMY products, including posters,
brochures, and CD/DVD sets to support commanders
and staffs at the local level
Publication of high-impact AT awareness and iWATCH
ARMY posters in the August issue of Soldiers magazine
Provision of information and products to assist commanders and units through the Army Knowledge
Online Antiterrorism Enterprise Portal (ATEP).
Expeditionary Forensics
U.S. Air Force photo by Tech. Sgt.
Michele A. Desrochers/Released
Background: Iraq
A joint expeditionary forensic facility (JEFF) lab was
first established in Iraq in December 2006 to address
a high number of sniper attacks throughout the Iraqi
theater of operations (ITO). The original countersniper
labnow known as the JEFF 3 labsoon acquired its
first piece of evidence: a Dragunov sniper rifle. The JEFF
Triage
U.S. Army soldiers with the Charlie Troop 4-14th Cavalry 2nd Platoon Fort Wainwright, Alaska, search a haystack for weapons
cache outside the city of Rawah, Iraq, during Operation Iraqi Freedom Sep 27, 2005. (U.S. Air Force photo by Tech. Sgt. Andy
Dunaway/Released)
Operationalizing Forensics
The ability to provide time-sensitive, actionable
intelligence to the combatant commander is the most
important aspect of the JEFF 3 lab. The turnaround time
for analysis in an expedited latent print and firearm/tool
mark case is a couple of hours to a day, depending on the
number of items submitted. Expedited DNA processing
takes 2124 hours to complete. These short processing
times allow units maximum flexibility for targeting or
prosecution. JEFF 3 lab staff members have also provided
expert testimony in the central criminal courts of Iraq.
The Latent Print Section is very successful at recovering
and analyzing prints from a variety of porous and
nonporous evidence using various techniques and
items ranging from powder to ultraviolet imaging. The
Latent Print Section has assisted with cases involving
theater internment facility detainees, sniper incidents,
anticoalition force threat letters, and al Qaeda intelligence
documents.
In addition, firearm/tool mark analysis has proven
valuable. State-of-the-art technology enables the Firearm/
Tool Mark Section to perform firearm identification and
19 The Guardian SUMMER 2010
Recommendation
The development of an
enduring capability consisting
of a system of modular
deployable labs built around
commanders requirements
is essential for future
operations. This plug-andplay method would maximize
responsiveness to mission requirements, maximize
available examiner use, and minimize duplication of
effort. The US Army Criminal Investigation Laboratory
has proposed an Army concept that would provide the
enduring capability for such an effort.
Issue 2: Lack of a Common Database
Discussion
Results of forensic analysis and reports are not
consolidated on one central database to ensure BCTs
and analysts can leverage this information to target or
prosecute individuals or to link networks. This unmet
need results in unit-level gaps related to targeting and
intelligence analysis.
Recommendation
Tangible results could be obtained from the
development and use of a common database for reporting
(i.e., Combined Information Data Network Exchange
or CIDNE). One stop shopping for analysts seeking
forensic information for intelligence and FP purposes is a
critical yet often forgotten piece of battlefield forensics.
Issue 3: Forensic Exploitation Training Gap
Discussion
Pre-deployment training is limited and is performed
largely by units through the efforts of the US Army
Intelligence Center and the US Army Military Police
The Guardian SUMMER 2010 20
Conclusions
Recommendation
Once expeditionary labs become an enduring capability
established within the Services, the warfighter will
fully realize the true impact of expeditionary forensics.
A lead has been tasked to develop an enduring DOD
expeditionary capability.
Issue 5: Increasing the Use of Nuclear DNA
Discussion
During my time as officer in charge in Iraq and through
the present, nuclear DNA (nDNA) analysis has provided
superior capability in identifying individuals of interest
and high-value targets and in providing key linkages
to criminal and insurgent networks. This evidence is
very hard to cover up because nDNA remains on many
objects with which one comes into contact. In contrast to
fingerprints, which insurgents constructing, transporting,
or placing improvised explosive devices can mask by
wearing gloves, nDNA is difficult to disguise.
Recommendation
The educational continuation for commanders on the
use of nDNA and the utilization of this capability in
21 The Guardian SUMMER 2010
Mission Assurance
Assessments
>> and the Road Ahead
U.S. Air Force photo by Tech. Sgt. Efren Lopez/Released
Assessment Programs
1. Improve the reporting mechanism for vulnerabilities, remediation, and mitigation plans as
well as risk management strategies.
Following an assessment, there is no formal mechanism
to effectively track the concerns and vulnerabilities
reported by the assessment teams. The Core Vulnerability
Asset Management Program (CVAMP) is intended to
be a repository of vulnerability information that may
be used by commands to track vulnerabilities, request
funds for mitigation, and report to higher commands
on the status of AT measures. CVAMP is structured for
AT vulnerability information rather than DCIP, but it
The inability to track concerns, vulnerabilities, and the assumption of risk in a collective
system prevents the dissemination of accurate data throughout the chain of command.
This lack of data prevents HHQ from having a solid understanding of the DCIP and AT
programs on its installations, and this lack of data also limits the ability to track the
mitigation of vulnerabilities. (U.S. Army photo by Spc. Charles W. Gill/Released)
4. Increase active outreach to reinforce the Combatant Commander Initiative Fund as a valid
option for vulnerability remediation.
Many commands rely on short-term funding to
fix urgent vulnerabilities discovered during JSIVAs
and DCIP assessments. By nature, the mitigation of
vulnerabilities to a bases AT protection should not have
to wait for funding to be programmed in out-years. In
many cases, these are urgent fixes to vulnerabilities that
create significant potential problems for the command
or asset. The COCOMs ability to shape the DCIP and
AT programs and remediate current and emerging
vulnerabilities will be greatly enhanced by fully
leveraging the Combatant Commander Initiative Fund.
Conclusion
RAVA
Risk Management
In risk management, the estimates calculated
from a quantitative risk assessment are used as
the basis for making decisions. The following
definition of risk management is used in the
security engineering field:
Evaluating alternative countermeasures and
design options and selecting from among
them. This involves consideration of political,
social, economic, and engineering information
with risk-related information to develop,
analyze, and compare acceptable options
and to select the appropriate response to a
potential threat. The selection process requires
placing value on such issues as the amount
of risk considered acceptable, the reduction
in risk due to applied countermeasures,
and the reasonableness of the costs of
countermeasures.
RAVA Methodology
The primary purpose of RAVA is to quantitatively
measure threats, assets, vulnerabilities, and risks
associated with large and/or small government facilities.
It establishes a security baseline, explores upgrades,
recalculates vulnerabilities and risks, and recommends
optimized features or improvements for facilities. In
essence, a RAVA identifies current levels of vulnerability
and risk and then identifies improved levels with the
implementation of specified countermeasures (see
Figure 3). In addition, RAVA identifies the associated
cost and impact of the improvements. RAVA includes
the performance of six sub-analyses: threat, target,
vulnerability, optimization, risk, and costbenefit.
RISK =
ASSET X THREAT X VULNERABILITY
VALUE (CAPABILITIES
(SUSCEPTIBILITY
(IMPACT)
& LIKELIHOOD)
TO ATTACK)
Target Analysis
Target analysis is designed to evaluate and measure
the value of all targets to the user and to the aggressor.
Targets could include any type of asset or target
including people, buildings, barracks, hangars, piers,
runways, antenna fields, water tanks, and electrical
power distribution lines. The end result of the target
analysis is a numeric rating based on the target value or
criticality to the user and the target value or usefulness to
the aggressor.
THE ANALYSIS:
Target Analysis: Identifies and appraises specific assets; overall target
value is based on the value of the asset to the user and the aggressor.
Threat Analysis: Identifies and quantifies specific threats to specific targets;
overall threat rating is based on the potential effectiveness of an aggressor,
and the likelihood that the threat will be carried out.
Risk Analysis
Risk analysis is the aggregation of
the threat, target, vulnerability, and
optimization analyses to determine the
calculated value of risk associated with a
specific asset that is being targeted by a
specific threat.
CostBenefit Analysis
Costbenefit analysis compares
the potential results of specific
countermeasures for reducing or
mitigating threats against specific assets.
The costbenefit analysis is based on cost
versus reduction in vulnerability and risk.
Defense-in-Depth
RAVA uses the process of defense-indepth, also known as layers of defense,
as a means to gauge the value of
Risk Analysis: Determination of the probability of occurrence and the
protection afforded each asset. Defenseimpact or effect if a given loss occurs.
in-depth assumes that each layer of
Optimization Analysis: Measure that can be applied to reduce or eliminate
defense provides an opportunity to
vulnerabilities and risk.
deter, detect, delay, or prevent aggressors
from reaching their ultimate goal. RAVA
considers four primary layers of defense
FIGURE 2. Major Elements of the Risk and Vulnerability Assessment Process
when computing the overall value of
vulnerability and risk:
Vulnerability Analysis
Vulnerability analysis is designed to quantitatively
Layer 1: installation perimeter
evaluate and measure how vulnerable a specific asset
is to a specific threat. This phase of RAVA most closely
Layer 2: asset enclave perimeter (if there is one)
reflects a standard assessment done by either a higher
headquarters or the Joint Staff Integrated Vulnerability
Layer 3: asset exterior (e.g., building elevation, wall)
Assessment Team. In this phase, the countermeasures
currently in place for a specific target are assigned a
Layer 4: an enclaved area within the asset (e.g., secured
value based on their effectiveness in mitigating threats.
vault, arms room)
Determine Threat
To the User
To the Aggressor
THE ANALYSIS
Establish exisiting risk and
vulnerability levels (Baselines)
Provide countermeasures that
reduce the risk and vulnerability
(Optimization)
Implement Countermeasures
effective recommendations.
The performance of RAVA is
Sample RAVA Worksheet Chart and Graph
not driven by regulation or
design standards; therefore,
the DBT must be identified
before recommendations can be
generated.
CI662 works with the customer
to identify critical assets
warranting RAVA. In many cases,
commands use their Mission
Essential Vulnerable Area list
as a basis for selecting critical
assets. Additionally, the customer
sometimes considers Single-Point
Failure assets as critical assets.
Unlike standard vulnerability
assessments, RAVA quantifies
FIGURE 4. Sample RAVA Worksheet Chart and Graph
vulnerabilities and risk,
determines the cost effectiveness
of
specific
improvements,
and helps prioritize
RAVA Approach
countermeasures. This in turn allows commanders to
Regardless of the type of analysis or study, the
plan for and seek hard-to-get funding.
resulting recommendations need to be based on a given
threat. As it relates to designing physical measures to
counter the identified threats, the CI662 team performing
RAVA must have a clear understanding of the design
basis threat (DBT) to make appropriate and cost-
EBOLA
In August 1976, an outbreak of a novel pathogen began
in a Catholic Mission Hospital in Yambuku, Democratic
Republic of Congo. Almost simultaneously, the virus
appeared in the Nzara region of southern Sudan.
In 2007, Andrew Speaker, an Atlanta lawyer, was diagnosed with a drug-resistant strain
of tuberculosis. While infected, he knowingly boarded a plane from Atlanta to Europe for
his wedding and honeymoon. During his trip, Speaker visited Italy and Greece in addition
to other European destinations. After being warned by US officials not to return to the
United States due to the risk to other travelers, Speaker flew to Canada and, despite US
Department of Homeland Security warnings, was allowed to return through the Champlain,
New York, border crossing. During his trip, Speaker risked infecting hundreds of travelers.
By ignoring US and international travel restrictions regarding tuberculosis-infected patients,
Speaker may have provided a blueprint for future terrorist attacks, giving adversaries a
view of potential vulnerabilities.
Re-emerging Threats
As noted earlier, the increased understanding of
disease-causing organisms has allowed the developed
world to largelybut not completelyeliminate many
traditional threats. The downside to the decreased
incidence of many of these pathogens, however, is that
worldwide agent-specific vaccination programs have
atrophied, creating the potential for the re-emergence of
these pathogens.
Other factors combine to provide a fertile environment
should such a re-emergence occur. Continued worldwide
urbanization and globalization have removed many
natural barriers to disease spread. Cities in the
SMALLPOX
In 1980, the World Health Organization
(WHO) officially announced that its smallpox
eradication efforts had eliminated the disease
from the natural environment. In the 21st
century alone, prior to the WHOs worldwide
vaccination efforts, smallpox killed more than
300 million people worldwide. The last natural
case of smallpox was reported in Somalia in
1977.
RE-EMERGING THREAT
The WHOs efforts were supported by three characteristics that have thus far proven
unique to the smallpox eradication effort:
There is only one form of smallpox, unlike the influenza virus, which comes in multiple
types, subtypes, and strains. These differences force the creation of unique vaccines.
Conversely, smallpox requires only one vaccine.
Smallpox has no natural reservoir beyond humans. The inability of the virus to seek
out other hosts within the animal kingdom to perpetuate its existence allowed for a
surge in worldwide vaccination to eliminate the virus with little risk of re-emergence.
Unlike bacteria, there are no asymptomatic smallpox carriers. Eradicable viruses usually cause symptomatic disease and do not result in asymptomatic infectious-carrier
states that serve as a reservoir for infecting others. This allows vaccination efforts to
focus on limiting the spread of the virus. Similar to the use of fire-breaks to limit the
spread of wildfires, vaccination efforts strive to achieve herd immunity, thus allowing
the virus to burn itself out.
WHO vaccination efforts achieved almost universal support from the international
community. Through the development of herd immunity, the virus was unable to find
sufficient hosts in which to perpetuate itself and thus died out.
Today, smallpox is only known to exist in state laboratories in the United States and
Russia, although there has never been a means of confirming this fact. With the cessation
of worldwide vaccination programs, the herd immunity that led to the virus eradication is
largely gone. Whether through an act of nature, negligence, or terrorism, the potential reemergence of smallpox stands as a threat to unprotected populations around the world.
Conclusion
J-34
Joint
Staff
Event:
Strategic Significance:
WASHINGTON, DC On June 21, 2010, the US Supreme Court upheld provisions of the Patriot act that made it a federal crime
to knowingly provide material support or resources to a FTO. (The term defined in 18 U.S.C. 2339A(b)(1) as any property,
tangible or intangible, or service, including currency or monetary instruments or financial securities, financial services, lodging,
training, expert advice or assistance, safehouses, false documentation or identification, communications equipment, facilities,
weapons, lethal substances, explosives, personnel (1 or more individuals to include oneself), and transportation, except medicine
or religious materials.
The Supreme Court ruled 6-3 that the First Amendment does not prevent Congress from barring actions taken to aid terrorist
groups simply because the actions may have an expressive component, when it does so based on a reasonable conclusion that
the actions are likely to promote the groups terrorist goals. The Court held that aid provided for a terrorist groups humanitarian
activities can free up resources which can be re-allocated to terrorist activities.1
This decision could increase the Department of Justices ability to prosecute US citizens or groups suspected of contact that
provides support to foreign entities designated a terrorist organization. The decision specifically does not apply to domestic
organizations. The Preamble of the Constitution notes that a key purpose of government is to provide for the common defense.
QUOTES:
Strategic Significance:
Homegrown terrorists are those living in the US who radicalize and initiate attacks with guidance or inspiration from foreign
terrorist organizations such as al Shabaab, al Qaeda, or Tehrik-i-Taliban Pakistan. The July 2005 bombings in London, perpetrated
by Muslims born in the United Kingdom, brought the concerns of homegrown terrorism to the forefront in the US. Since 2001, 12
of approximately 32 domestic terrorist events occurred in 2009, with a corresponding spike in US citizens or residents charged
with participating in terrorist activity. This spike includes five Americans accused of joining al Shabaab in Somalia and five others
from the Washington, DC, area charged in Pakistan with seeking to join jihadis in their fight against Americans in Afghanistan.
The radicalization process begins with the jihadi-Salafi interpretation of Islam and an increasing activist-like commitment to
solve global political grievances through violence. This politico-religious ideology can be effectively espoused via social media by
English-speaking, American radicals, such as Anwar al-Awlaki and Adam Ghadani. These inspirational extremist messages attract
and encourage Americans who are radicalized. Some have traveled abroad and received training from terrorist groups, returning
home to conduct attacks in the homeland. Successful acts of homegrown terrorism and overreaction in combating terror at home
both produce more homegrown terrorismessentially a cycle feeding itself through under- or overreaction.
Given the limited number of attempts, fears of a low-level terrorist insurgency at home are exaggerated.3 The small number
of disaffected radicals have not found the Muslim American target audience as receptive as Muslim minority communities in
Europe, which has had difficulty integrating these large Muslim minorities. These terrorists are often poorly led, subpar operatives
who receive little training and limited guidance or support from terrorist organizations. Often they are turned in before they can
conclude their plots.4 Less than a third of the cases involving Americans in recent years have been successful, suggesting that
intelligence, information sharing, local law enforcement, and community relationship-building efforts to detect and disrupt threats
are working.
QUOTES:
DD AT/HD
Joint Staff, J-3 Operations Directorate
Pentagon
Room MB917
Washington, DC 20318-3000
Note: If your copy of the Guardian has been damaged in shipping or is unreadable, please contact us
at guardian@js.pentagon.mil. We will send out an electronic pdf to replace it.