Tuesday, April 23, 2013

SCI REPORT: DR. ROSS L. RIGGS TALKS ABOUT TERROR

April 21th, 2013 | Author: Dr. Ross Riggs

AMERICA is in a state of war. Al Qaeda, AQIM, AQAP, Iran, Hezbollah, HAMAS and an untold number of agents from foreign countries and our own home grown terrorists seek to bring about their desired changes by terrorizing the citizens of the United States into inaction, wrong reactions and worse, surrender. The key to defeating the would-be terrorists is intelligence. Agencies both official and private sector work ceaselessly to prevent further tragedy. Groups like the Langley Intelligence Group (LIGNET)i, Griffith Colson Intelligence Services (GCIS)ii and the Investigative Project on Terrorism (IPT)iiidevelop methodologies for intercepting chatter from across cyberspace and a host of other areas; but their unequivocally best intel comes from viable and vetted HUMINT or human intelligence. HUMINT can be simply defined as: that which you are told by someone in a position to know the truth. Examples are many about those who have trusted a particular source for reasons other than a solid track record and have come up on the short end of quality information at a critical time.

The contingency manager and those responsible for conducting real-time risk analyses depend on all types of sources for their information. Chatter, of course, is one of those. Most sources come with some degree of fallibility because factors change, variables, by their nature, are often unpredictable and let’s face it, the future is not knowable to any degree of certainty. Human Intel, boots on the ground, is the single most reliable source; depending of course upon whose feet occupies those boots. How can you, as a contingency manager, develop the kind of resources you must have to do your work, the work of saving lives by up front, ahead of the curve information that is actionable and accurate? After a short review of the concept of such a resource, the folks at SCI and GCIS have prepared a systematic approach; a plan, if you will, that contingency managers who may be either novices or old hands should find useful. First, understand the Why you need such resources, because they take time to develop, commitment to keep and patience to protect. If you do not fully comprehend their value, you will not find it worth the effort to pursue. That is a decision that eventually you will regret. Begin now with a commitment to limit the number of regrets you carry with you into retirement. Not having good HUMINT does not need to be one of them.

The threat was real. Opposing armies had gathered on the border and were lying with an ambush set. The story here is true; no names are changed because none are innocent. The opposing enemy was from the ancient region of Philistia. Their opponent was the armies of powerful King Saul; King of Israel. Saul needed to know when and where the Philistines would strike. He needed good Intel and he needed it immediately. The historical text reports that Saul went to a medium, a fortune teller, a witch or simply a person who believes (or causes others to believe), that they can communicate with the dead. In this case, the Witch of Endoriv successfully sees the deceased Samuel, Saul’s former advisor. Saul gets his HUMINT directly from the deceased judge of Israel. In this case the news was particularly negative for Saul but there was no denying its veracity.

Professional intelligence agents usually do not contact spirits, mediums or witches. Not only is it an unwise and unfruitful practice, there is a biblical restriction on it. So how do Intel groups help authorities to avoid another Boston, another Benghazi, Oklahoma City, Beirut, or 9-11? The key for this particular article is to look at what has happened to our intelligence matrix because of the source of the Boston bombings. First, we must recap what exactly the Intel Matrix is and then note the changes that Boston has brought to our understanding of it.
The Matrix done correctly is more than a decision making model that looks good at a briefing. It is an every risk manager’s key for keeping his mind focused on situational awareness, contingency planning and risk abatement. How can it be such a miracle and why does the Boston bombing case make such a direct impact on this model? There are two crucial questions which must be wrestled with in order for the answers to make sense. Those who have used it properly have found it to be an amazing tool.

How can the Risk Matrix be such a miracle? First, understand that any tool is only as good as the hands of the artist or craftsman that holds it. The same is true for the Matrix. By thinking through possible and probable risks for any team under the risk categories of criminal, medical, geographical and political, a team can rate those by their probability and their impact. It is not their placement on the matrix that is important, but the movement of a risk over time across the Matrix from SW to NE or from low impact/low probability to high impact/high probability. It is the movement of risk upon the map. A perfect example of this was Benghazi in 2012 where for months the probability of a terrorist attack was increasing and the negative impact it would have was climbing. Pre-Benghazi Intel made a streak across the Matrix that looked like a chart of rising health care costs! In the months since Benghazi new threats or re-awakened older threats have alerted managers to risks that were not even being considered in 2010.

It is within the confines of this example where already in 2013 the probability of events from China and from Korea was realized and what was not seen as a threat was identified as an expanding risk. When two young brothers, originally from Chechnya, brutally bombed the revelers at the Boston Marathon an entirely new risk came to the fore. The complete lack of regard for human life that it takes to set a large explosive at the feet of an 8 year old boy is the trademark of Chechnyan Muslim extremists. Who can forget the Beslan School Massacre perpetrated against children by these madmen who claim to be freedom fighters but in reality have an ostentatious hunger for the cruelest, most vicious forms of homicidal madness?

It is within this context that Americans must now understand their risk matrix is expanded by the probability of further attacks against the U.S. by members of these Chechnyan groups that may well be underwritten by some faction of Al Qaeda. A likely scenario is that the AQAP (Al Qaeda on the Arabian Peninsula) is the state sponsor of this recent series of events in Massachusetts. An official situation report states that the Boston attacks had “…unmistakable parallels with the smaller scale terrorist attacks that radical Islamist groups based in Yemen and Pakistan have attempted in the United States since 2001.”v The situation report quoted here agrees with the analysis of the GCIS and its Executive Council that groups such as AQAP and others have moved toward smaller attacks that can be perpetrated by small cells operating virtually independent of the team. The sitrep quoted here lists similar bombings in the U.S. since 2001:


    •    NY Subway bombing attempt Sept 2009 – an Afghan citizen arrested after attempting to purchase chemicals for a TATP bomb
    •    Underwear bomber Dec 2009 a Nigerian man brings a bomb sewn into his underwear – credit for the event by AQAP
    •    Times Square bombing attempt, May 2010 a Pakistani attempted to blow up a SUV in Times Square. Pakistani group Tehrik-e-Taliban was behind it.


“The Heritage Foundation listed a total of 50 terrorist plots against the United States in an April 2012 report.”vi

AQAP publishes a magazine titled Inspire designed to encourage the young of Islam to reignite the violence against the west. It is the continuation of the propaganda of Al Qaeda that is designed to bring young men from wherever their homes might be to wage Jihad against the West. Available on the Internet, in a recent edition was an article Make a Bomb in the Kitchen of Your Mom by the AQ Chef.vii

Are attacks such as the Boston bombings and the Ricin sent to our Washington leaders an end in themselves or a methodology to divert America’s attention in preparation for a major attack? The Director of GCIS and its Executive Council has considered this question and has determined that if nothing else, Boston has set the stage for just such an event. One of the earmarks of groups such as Al Qaeda is to set up a smaller scale attack to observe the responses of emergency personnel and then fine tune the larger attacks to take advantage of those planned responses.

The term conspicuous by its absence applies to the lack of attacks on the western half of the United States. Could it be that these recent attacks are precursors to attacks which are not only bigger but geographically distant? Certainly, Oklahoma City was in the west, but it was a true homegrown terrorist without Al Qaeda ties. When discussing threats to the western parts of the U.S., groups such as Abu Sayyaf are of interest with their reach from SE Asia to America’s islands and west coast which can be accomplished with very little difficulty.

Still, American authorities in the western states will continue to look toward Asia as well as the Middle East and everywhere in between. Deputy Chief Michael Downing, Commander of the LAPD Counter Terrorism Group recently told GCIS’s Director that “In this region we have active terrorist plots…government of Iran operatives, Hezbollah, sovereign citizen, homegrown violent extremists, animal rights groups” and others.viii

 GCIS invoked a concern that even as the west coast braces for what could be a missile attack from Korea; there remains a paramount concern over the vulnerability of schools, particularly their central charges: the children. Whether it is during the school sessions or as they are in transit to and from the school, engaged in outdoor activities or at school events such as sports competitions the variables multiply which cause the risk factors to continue to grow. It is impossible for any person other than the individual’s themself to protect themselves because we have chosen to live in a free society. That sentence bears repeating. Because we have chosen, as Americans to live in an open and free society where the restrictions on personal movement, choice of locations to live, shop, worship or just ‘be’, are fairly few; we cannot depend on anyone other than ourselves to protect us when someone tries to hurt us. We might be blessed that when a crime starts to happen to us six police officers just happen to be standing next to us, but that is usually not the case. Our safety services do their absolute best to fulfill the commitment that has been unfairly slapped upon them: to protect and serve. It is not logical to expect that anyone will be there when you need help. Police respond to calls for help. The dictionary defines respond as: “Do something in reaction to something else.”ix

Police or guardians throughout history have normally protected the citizens in their care by alerting them of coming danger. The role of the citizen on the watchtower goes back to ancient biblical times. In both the Wisdom writings of Judaism and the Old Testament of the Christian faith, the watchman was required to sound the alarm. He is warned that should he fail to sound the alarm as danger approaches, the blood of the citizens would be on his hands. However, if he did sound the alarm and the citizens ignored it; they would bear their own guilt.x The fine line between sounding the alarm and playing into the terrorists’ hands by escalating the tension and concern in a community is part of the art and wisdom of intelligence reporting. The key point must remain however that the official’s duty was to alert the citizen of the impending danger. It was up to that citizen to act, to be prepared to respond to the threat. Director Griffith articulated the precept well: “I urge the American people to be ever vigilant and cautious, shedding the threat of fear for the spirit of due diligence and American citizenship.”xi


With the role of the watchman understood, contingency managers demonstrate that the Matrix is created to be flexible to bring to bear new threats and new information. One recent example is that the BBC reported that North Korea has placed warheads on rockets in threatening an escalation of their rhetoric.xii Additional terror related attacks and events continue to take place even as, in the U.S., the Boston Bombing story consumes most of the air time. In the Peshawar Province of Pakistan, a suicide bomber got within the secure zone and within 500 yards of the U.S. Consulate, killing 12 and injuring 31 (29 Mar 2013). Sources on the ground report that the target of the attack was the Frontier Constabulary (FC) Commander’s convoy. Tehrik-i-Taliban Pakistan (TTP) claimed responsibility for the attack in retribution for the Constabulary’s on-going actions against the Taliban. The Commander escaped with only minor injuries.xiii

In each of the cases reported here, the primary ingredient that will define the difference between a deadly attack and one that has not only warned the citizens but provided the information necessary for apprehending those responsible is human intelligence (HUMINT). Very simply, this refers to boots on the ground. Individual people, most living their normal everyday lives within a region where trouble is threatened who know what to report, when to report and to whom to report. That is HUMINT. Of course, there are agents of the U.S. living and working overseas with the primary purpose of providing HUMINT back to their agencies. The examination of the need for HUMINT, the development of appropriate sources and their maintenance are critical subject matter for intelligence services. Without HUMINT resources, intelligence groups can only function to re-evaluate the information disseminated by others or take a best guess approach to forecasting. Attempting to create the Matrix without the advantage of people on the ground is to lose the eyes, ears and critical opinion that the Matrix is designed to offer. Each organizational leader must proactively develop new resources for HUMINT.

An incredible example of the need for boots on the ground type of intelligence resulted in the bombings in Boston this month. According to a Security Consulting Investigations Situation Report dated 19 April 2013, “News that two brothers from the Russian break-away province of Chechnya who have lived in the United States for several years were behind the April 16 bombings makes it likely that they were at least (pseudo) “homegrown terrorists,” possibly radicalized by al-Qaeda propaganda on the Internet. There also is a strong possibility that the two men were somehow recruited and trained by al-Qaeda operatives to stage the Boston attack.” A further report indicates that sometime in 2011 or before an ‘unnamed’ foreign government (Russia) contacted the FBI to request that they research the two young men for the possibility of them being involved in extremist and radical behavior as regards to Chechnya. Initial reports stated that the FBI returned an inconclusive report and that was apparently the end of any investigation into either of them. However, more recent reports indicate that the FBI has known of the two brothers as far back as 2009. The mother of the slain bomber stated that, “My son would never do this,” Tsarnaeva said. “He was controlled by the FBI for three to five years, they knew what my son was doing, they knew what actions, on what sites on the Internet he was going,” she said. “So how could this happen? They were controlling every step of his.”xiv According to Tamerlan’s (the slain bomber) father Anzor, he was present when the FBI interviewed Tamerlan in his rooms at Cambridge. NEWSMAX reports also that at one point the Tamerlan who was the older of the brothers, had been involved in a domestic violence altercation and was eligible to be deported but was not.xv

The SCI Situation Report reveals also that: “The possible involvement of Chechen nationals in the Boston bombing would be consistent with efforts by al-Qaeda — especially Al Qaeda in the Arabian Peninsula (AQAP) — to recruit non-Arabs to conduct terrorist activities. This appeared to be the strategy AQAP employed when it recruited Nigerian Umar Farouk Abdulmutallab, the so-called ‘underwear bomber’ who tried to destroy a civilian airliner over Detroit on Christmas Day 2009. Nidal Hassan, the Fort Hood shooter who shot 13 and injured 32 in 2009, had been influenced by and was in email contact with AQAP radical cleric Anwar al-Awlaki, who lived in Yemen at the time.  Al-Awlaki also played a role in influencing other terrorist plots in the United States and the UK.  Al-Awlaki was killed by a U.S. drone strike in September 2011.”xvi Security Consulting Investigations’ continuing analysis indicates that since the strict border requirements along the majority of the U. S. CONUS have made it difficult for Americans to travel overseas for training by Al Qaeda as well as for Al Qaeda operatives to get into the United States. Therefore, the use of electronic media, social websites and training through local mosques has become the standard fare for radicalization of those who seek affiliation with the terrorist organizations. Intelligence operatives within the United States would have very little ability to intercept those here in the CONUS who are taking part in such training unless their international communications tripped a particular set of identifiable words, phrases or locations that alerted super-computers and the analysts working them to review that communication. However, trained boots on the ground in the places where the training is believed to originate could lead operational resources to be able to either capture or destroy the source of the training. Often, it is the only reliable way to apprehend the truth.

HUMINT in places such as North Korea, the Cartels of Mexico, any of Al Qaeda’s branch offices, (including Abu Sayyaf on Mindanao in the Philippines), across the Balkans and the Mediterranean, and particularly in North Africa is more valuable than gold in today’s market! Quality HUMINT, for example, was responsible for redirecting the investigation into who was responsible for the half-hearted attack on the U.S. Embassy in Sarajevo in October of 2011.
xvii xviii

The brand new embassy building, set far back from the street was the focus of one lone gunman who strolled across the street with a rifle in hand as if to make a one man charge against the heavily fortified structure. Bosnian security on the exterior of the building moved haplessly to cut off the path of the intruder, still a good 200 yards away from the exterior walls. Those who sent this misguided, if not brave, zealot on his mission planned to heap the blame for the supposed attack against the U.S. upon the Wahhabi Muslims, a violent sect who live in the mountains surrounding the city of Sarajevo. Their aim was to undercut U.S. and U.N. support for the Muslim population of the Bosnian Federation thus improving the chances for those in the Republik of Serbska (in the Bosnia Herzegovina pseudo-coalition) who desire to break free from the Dayton Accord treaty that keeps the divided country loosely together and are bargaining for Serbska to rejoin Serbia. Boots on the ground were able to clarify that the man was not clearly cognizant of the ramifications of his actions. Also, that he had been led to take such action by evil men who manipulated him. These men knew they were ostensibly sending this man to his death, expecting that when he was shot and killed he could never tell the story of those who played mind games with him to get him to attack the Americans. (A sharpshooter shot him in the kneecap and ended his siege which lasted almost 20 minutes as he shot off 105 bullets, never using his two hand grenades. Although he was, by religion, of the Wahhabis, he was not articulate enough to understand the full ramifications other than he wanted to die a martyr and go to heaven. Neither did he care about the political games in which he had become a disposable pawn. The purpose of recounting this short tale is that no act or artifact is small when it is being parlayed into an international incident driven by evil purposes. HUMINT may be the single strand of truth within the story. HUMINT allows investigators to pull on those loose threads to unravel the sources of these threats and attacks.

Often reports that come from within areas such as Hebron within the West Bank area of Israel show complete unrest and the probability of increased violence against the Jewish quarter of the city and are often vitriolic in their speech and seldom indicate any sense of hope for the communities to survive. Having put my own boots on the ground in Hebron just one week after a reported chaotic and violent episode, it is possible to report on the exact tenor of the Jewish Quarter irrespective of what the conventional wisdom (CW) might be from those who have not been in the Quarter. In contingency management it is crucial to understand the normal disparity that is prevalent between the CW and reality. Even when one cannot get a first-hand reading on the situation, a contingency manager may appropriately factor in a degree of +/- with the CW when preparing analyses. How much of a plus or minus depends a great deal on the experience and artistry of the analyst. There is, as mentioned, a certain amount of art work to developing a strong indication of movement along the Matrix one way or another. Not every person with a computer and an imagination is cut-out to be an analyst.

Selection of the proper personnel for international risk analysis is critical to long-term success of both the analyst and the agency. As with most assignments in cross-cultural settings, the primary qualification for a good boots on the ground type of analyst is language. It is impossible to underestimate the value of strong language skills. Naturally (no pun intended) the best analyst for a given culture is a natural born citizen of that culture. When that is not possible then a good selection is an expatriate who knows the language fluently and is well versed in the geographical area within which he or she is to be operating. Most bog sources are not analysts at all but, just that, sources. They need not be as highly trained or skilled as the analyst but operate under the care and guidance of one. There are particular types of information that are most helpful in any given situation. A bog source that is not intensely trained as an analyst can be taught which type of information is the most helpful in just such a situation. For example, in a criminal or political matter the names of the head of the snake are invaluable but not always available. What can be found is where the movers and shakers of a particular scam or operation, even terrorist cells, are principally operating. In the event of a terrorist cell, the comings and goings of specific individuals is very crucial. Are they leaving the country and if so, at what kind of schedule does there seem to be. When people leave, how many and for how long?

The excellent HUMINT will be able to access that information for the agent without becoming noticed. The operative should look for possible candidates for grooming as a source that come across this type of information in their normal course of business. You do not want someone who lives in one part of town completely opposite where the activity is, nor do you want someone who is obviously western or requiring an excuse to be in the neighborhood and while there is seen as always asking questions. A solid source can gain the information needed without ever asking questions.

The source must not be prone to gambling, girls and gratuities of any kind. To follow the cliché lines of a James Bond movie, those types of folks are just dying to get caught and turned against the handler (people who work on behalf of the analyst or their company to maintain the connection to the source, including dropping payments all planned to keep the actual analyst or the company for which he works unidentifiable by the source if at all possible. This is the way one hopes it will work but it is not often reality. Often time and circumstances do not allow for such an elaborate set up. The source may be someone directly connected to the analyst and is doing what his lot in life has thrown for him to do. The two speak when needed and the analyst will usually come away with some piece of the puzzle. In fact, on the field, he may never see the entire picture, that will be up to the FUSION Centers to keep all the pieces coming together.

We have addressed specifically some of the sources that are used and the methodologies for selecting sources when it comes to counterterrorism. Those are highly prized pieces of information because the fall-out from a missed opportunity there is always in the 5 by 5 or the extreme NE section of the Matrix which is never good. Timeliness of reporting capabilities is a critical factor for a BOG unit. Mentioned earlier were scenarios involving the health outlook for a region or perhaps the housing market if the economy is about to take a nose-drive. In these days, economic collapse of one country, such as the debacle on Crete right now, can cause a domino effect and a myriad of difficulties worldwide. Stock markets are particularly vulnerable to the economic fissures that occur when dictators are thrown out or indictments handed down. The vacuum that can be created in a power structure can also set the stage for major and rapid change. HUMINT on the rapidly changing nature of such series of events are vital for the analysts to know in as close to as real time as necessary. It is unwise to have a source that cannot be in nearly immediate contact. When events occur so rapidly, the delay in information can be a deal breaker. Weather related events can be critical and yet the information on them cab be completely useless if they are not real-time events. The speed at which a tsunami hits will not allow for second guessing because it is not known which way the wind has shifted. Lives will literally hang in the balance when time becomes critical. The nature of the information can be as deadly as the lack of it when it comes to something as dangerous as an international health issue. The avian or bird flu as well as the swine flu that swept across parts of Western and Central Europe sent analysts running to books on the subject for they were attempting to read-up on the risks that they had never accounted for in their mock-ups.xix

Analysts, nor their sources, are expected to be well-versed on every possible threat. They should know, however where to find the accurate information as well as the Best and the Brightest who deal with these risks all the time or have studied them. The world will not (and need not be) impressed with either the source’s or the analyst’s IQ. What will matter is if they are well enough versed in the nature of the event that they can discuss it rationally and without a concern that what they are about to say will be contradicted not out of academic concern for accuracy but from them simply not understanding the facts well enough to speak on the issue.

When the health and safety of one’s fellow countrymen is in the balance, little can be said that is noteworthy if it is not also minute by minute immediately at hand.

The development of quality analyst/source teams is of paramount importance in today’s world. Never before have so many world-class issues on the burner all at the same time. SCI’s careful consideration of the recent events in Boston and Washington D.C. has led us to feel confident that the event in Boston had a two-part Al Qaeda linked plot that was disrupted in part by the quick apprehension of one and the death of the other suspect. They had much more explosive devices upon their persons and in their possession. Those tools are only distributed with a purpose. Theirs’ was not completely fulfilled. Therefore:
   
    •    The brothers, now of notorious reputation, were assigned further roles but failed to fulfill them.
    •    Whether it was the brothers’ assignment or another, SCI believes that a second front was to have been opened by them but it did not materialize.
    •    SCI believes the second front will be somewhere either on the west coast of United States or near there. A primary target is expected to be Las Vegas.
    •    SCI also believes the Hawaiian Islands and Alaska’s oil fields remain a probable, though less so, target.

Developing qualified, vetted and available sources of human boots on the ground intelligence requires first dedicated agents and analysts that will work hand in glove with the resource. The source should preferably be a national partner. If it must be an expat then their language skills must be as close to a natural citizen’s speech. This is not only for the accuracy of the translation but also the subtle nuances of the culture (some are not so subtle). There must be an ability in the source to detect when he is being fed information for purposes other than those which are helpful to our nation. The source must be free from addictions and avenues of entrapment that are so common to men, so well used by women (which argues for female resources over males – an argument I feel free to push forward). The source must be capable of both timely communications with handlers and to step into a hyper-connectivity when things turn critical. Depending upon the nation or culture within which the source is working, he or she must be resilient to the crush of working within shrouds of secrecy that can be more choking than intriguing. When all is said and done, even with the best possible intelligence sources - if the machine into which it is all fed fails to perceive the nuances, track the changes and deliver the warning in a timely manner; all is for naught.

image


Allow us at Security Consulting Investigations on behalf of our team at Griffith Colson Intelligence Services and a myriad of partners across the globe echo Sir Winston Churchill from the days after the British were pushed back to the sea and it seemed the war all but lost.
From the Home Office he issued the following communique: (Strictly Confidential) 28 V 40 (May 28, 1940)

“In these dark days the Prime Minister would be grateful if all his colleagues in the Government, as well as important officials, would maintain a high morale in their circles; not minimizing the gravity of events, but showing confidence in our ability and inflexible resolve to continue the war till we have broken the will of the enemy…”xx
xxi


i www.lignet.com
ii http://griffithcolsonintelcenter.tumblr.com
iii www.investigativeproject.org
iv Note play on words, 1960 television sitcom with Bewitched – the part played by Agnes Moorehead: Endora)
v www.lignet.com Security: the Americas: “Could Al Qaeda Be Behind the Boston Marathon Bombings?”
vi Ibid.
vii Ibid.
viii GCIS Communication 19 April 2013
ix Encarta Dictionary: English North America, accessed 4-21-2013 2312
x Ezekiel 33:1-9
xi GCIS Communication 19 April 2013
xii http://bbc.co.uk/news/world-asia-21974381
xiii http://dawn.com/2013/03/29/explosion-in-Peshawar-casualties-feared/
xiv http://www.newsmax.com/Headline/fbi-interviewed-bombing-suspect/2013/04/19/id/500471?s=al&promo_code=13381-1
xv IBID.
xvi Security Consulting Investigations, LLC Situational Analysis Report 19 April 2013 Dr. R. L. Riggs
xvii http://www.newsytype.com/13222-terrorist-attacks-us-embassy/
xviii http://www.flarenetwork.org/report/syntheses/article/holy_war_state_terrorism_and_organised_crime_in_bosnia.htm
xix atiburrillo.redliberal.com/011080.html
xx atiburrillo.redliberal.com/011080.htmlChurchill, Winston Their Finest Hour The March to the Sea The Riverside Press: Cambridge 1949 p 91
xxi http://www.dailymail.co.uk/debate/article-1207763/Privately-Churchill-called-bloody-Yankees—lovers-ardour-fawned-flattered-flirted-woo-U-S.html

image

ABOUT DR. ROSS L. RIGGS:

Dr. Ross Riggs is a former Louisville Ohio Chief of Police, and trained with the United States Air Force where he was an honor graduate of the Air Force Security Police Training School at Lackland AFB.

After 30 plus years in public safety, law enforcement and military weapons systems security, he now enjoys consulting both on security issues and by conducting private investigations. His company, Security Consulting Investigations, LLC, is licensed by the Ohio Department of Public Safety and Homeland Security as a Class A company. SCI assists private persons, organizations, businesses, schools and religious institutions in developing and maintaining a high degree of security consciousness.

Dr. Riggs also works overseas with both ministries and other organizations to help prepare for crisis intervention in some of the most difficult regions of the world.

He is one of America’s foremost security entrepreneurs.




Wednesday, April 10, 2013

SCI GLOBAL SECURITY UPDATE 
Nuclear and Conventional Missile Threats

April 10th, 2013 | Author: Dr. Ross Riggs



Threats of possible missile strikes by three of the world’s real Mad Men (read: crazed, lunatics) continue to cast a shadow across the world. 

This past weekend, talks requested by Iran (another stalling tactic) that took place in Kazakhstan between Iran and world leaders fell through, and Ahmadinejad’s threats to unleash nuclear attacks against Israel and the United States began anew. 

According to sources within South Korea and Japan, the threat from North Korea has expanded to include the possibility of missile attacks against U.S. military posts in Japan. The Japanese government is said to be readying defenses while the U.S. State Department, concerned that their actions of preparation in the region may be seen as ‘provocative’ are scaling back the rhetoric.

In the Mediterranean, Iran is again ratcheting up their rhetoric against Israel. In conjunction
with the on-going war in Syria where the threats of chemical weapons continue to cast a
shadow over the country; renewed threats of missile strikes against Israel encircle the small
nation. The following map provides a clear understanding of the size of the threat under which the Jewish and Israeli Arabs live every day. According to the 2010 census, over 1.6 million Arab-Israeli citizens, or 20 percent of the country’s population, are put into harm’s way by the Arab-Palestinian HAMAS and Hezbollah daily.


Friday, April 5, 2013

CYBER-WARFARE: A Military Response Capability
  April 5th, 2013 | Author: Dr. Ross Riggs


A short time ago, I presented a lecture series on Cyber-Warfare on ICTOA Radio as part of a Lecture Series: Counter Terrorism in the United States 2013
The following is an update to that lecture:

Cyber-Warfare has become the tool of our enemies; particularly, the Chinese have used this capability to go beyond nuisance hacking to espionage and the deliberate shutting down of resources necessary for the daily functioning of services with a goal of adversely effecting the United State’s economy and its dollar’s showing on world markets. In the recent lecture, SCI took the position that certain of these acts are acts of war against the United States and companies continuing to do business with avowed enemies of the U.S. were committing nothing less than treason. SCI has also held that until recently, the strongest response from those in the ‘IT world’ was to provide counter-measures for attacks after they happen and do very little to track down the perpetrators of the attacks to force them to cease any further attacks by eliminating their capability to do so.


A report released by the Pentagon today has changed the playing field quite a bit. Although much of the report is classified so not all parts can be shared in this venue, SCI can report what has been released on the expanded capabilities of the U.S. military to seek out and destroy those who are engaged in acts of war against the U.S.

The first step was to delineate what, in cyber-technology, constitutes an act of war. There must be a way to articulate what that line is and how it has been crossed to permit a military response in retaliation for the attack. There is a distinction made between cyber attacks that are espionage and/or theft and cyber acts of war. General Keith Alexander, head of the Cyber-Command was quoted as saying, “If the intent is to disrupt or destroy our infrastructure, I think you’ve crossed a line.”[1] Lt. Col. Damien Pickart a Pentagon spokesman confirmed that there have been developed rules of engagement that “provide a defined framework for how best to respond to the plethora off cyber-threats we face.”[2] `

Perhaps the primary effectiveness of the new development in cyber-warfare from the military standpoint is the wisdom the Pentagon has shown in implementing a solid strategy. First, they defined for their commanders what constitutes an act of war in the cyber-world. Secondly, and most encouraging is that they have given military commanders both the clear guidance they need in such instances but also the authority to take retaliatory action without seeking a presidential clearance to act. The military response can be swift, sure and definitive. That is a combination that creates a solid deterrence to those who seek to harm the interests of the United States. 


One CSO of a major security company was quoted as saying, “This is putting the world on notice, particularly the Chinese, that we’re tired of them breaking into private companies.”[3]

In a time when the world has been receiving mixed messages from the Administration about our willingness to protect our own, the Pentagon should be applauded for stepping up to the task of sending a clear message that the line has been drawn and to cross it will bring a definitive response.

_________________________________
 
[1] Pentagon Develops Rules of Engagement for Cyberwar USA Today 5 April 2013 5A
[2] Ibid.
[3] Ibid.