- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged Stratfor
Are Syria’s Rebels Getting Foreign Support?
Posted by Brian in News, Threat Watch on 23/Jun/2012 13:06
From STRATFOR:
By Scott Stewart
A video recently posted to the Internet depicting an improvised explosive device (IED) attack in Syria has garnered a great deal of attention. A Syrian militant group called the Hawks Brigade of the Levant claimed the attack, which targeted a Syrian government armored troop bus as it traveled along a road near a rebel stronghold in the Idlib governorate. According to the group, the attack depicted in the video employed a type of IED called an explosively formed penetrator (EFP). Though the video was shot from a fairly long distance away, it does appear that the IED punched a substantial and focused hole through the armored bus — precisely the type of effect that would be expected if an EFP were employed against such a target.
EFPs are a logical tool for militants to use against superior government forces that are heavily dependent upon armor. EFPs pose a significant threat to armored vehicles, which the Syrian military has utilized extensively, and quite effectively, in its campaign against Syrian rebel groups.
Studying the IED technology employed by a militant group is an important way to determine the group’s logistics situation and trajectory. It can also be a way to discern if a group is receiving outside training and logistical assistance. Read the rest of this entry »
‘Dark Angel’ and the Mexican Meth Connection
Posted by Brian in News, Threat Watch on 14/Jun/2012 17:19
From STRATFOR:
By Ben West
In a U.S. operation dubbed “Dark Angel,” local and federal law enforcement officers on May 30 arrested 20 individuals involved in methamphetamine trafficking across five states. Authorities confirmed that the leader of the trafficking network, Armando Mendoza-Haro, has links to Mexico, where the methamphetamine was likely produced. The group appears to have used legitimate companies to transport methamphetamine from California to the Denver area and elsewhere in the Western and Midwestern United States. The group then sent the profits back to California, where the cash was wired to banks in China and the Cayman Islands.
Mexico’s methamphetamine trade seems to be booming these days. Earlier in 2012, the Mexican military made the largest single seizure of methamphetamine ever (15 tons, worth around $1 billion) outside Guadalajara. As the United States increased its restrictions on the pharmaceutical chemicals used to produce methamphetamine, Mexican producers stepped in to meet the growing demand. Details from Operation Dark Angel provide insight into how traffickers in the United States are getting their product to market and, more interestingly, how they are laundering their profits. Read the rest of this entry »
Tensions and Operational Challenges in Pakistan
Posted by Brian in Opinion, Threat Watch on 9/Jun/2012 13:24
By Scott Stewart
On June 4, four U.S. diplomats assigned to the Consulate General of the United States in Peshawar, Pakistan, were stopped at a military checkpoint and temporarily detained after refusing to allow their two vehicles to be searched. The diplomats — including a vice consul — were traveling in a two-vehicle motorcade and were accompanied by three Pakistani Foreign Service National (FSN) security officers.
According to media reports, the Pakistani military has charged that the diplomats had traveled to Malakand without first obtaining permission from the Pakistani government. Malakand is a city located about 120 kilometers (75 miles) northeast of Peshawar in the Khyber-Pakhtunkhwa province, formerly known as the Northwest Frontier Province. Because of the problems Pakistan has had with foreign jihadists in its border badlands, all foreigners are required to obtain something called a No Objection Certificate from Pakistan’s Interior Ministry before visiting areas in Khyber-Pakhtunkhwa and the adjacent Federally Administered Tribal Areas. Furthermore, the Pakistani press noted that the Pakistani military also objected to the Americans and their Pakistani FSNs’ being armed and operating vehicles with fake license plates to disguise the diplomatic vehicles. Read the rest of this entry »
A Serial Bomber in Phoenix
By Scott Stewart
A small improvised explosive device (IED) detonated at a Salvation Army distribution center in Phoenix, Ariz., on the afternoon of May 24. Two Salvation Army employees discovered the explosive device, which was concealed inside a yellow, hand-held 6-volt flashlight, as they were sorting through a box of donated items. The IED exploded when one of the employees picked up the flashlight and attempted to turn it on. The blast was not very powerful, and the two employees suffered only minor injuries.
This was the third incident in the Greater Phoenix area in recent weeks involving an IED concealed in a flashlight. Two explosive devices very similar to the May 24 IED exploded May 13 and May 14 in Glendale, Ariz., a city in the Greater Phoenix metropolitan area. Both devices were abandoned in public places. In the May 13 incident, a woman discovered a yellow, hand-held 6-volt flashlight next to a tree outside a Glendale business. When the woman picked up the flashlight and attempted to turn it on, it exploded, causing minor scratches and bruises to her face and hands. It also inflicted minor wounds to a woman beside her. The next day, a man found an identical flashlight in a ditch where he was working in another part of Glendale. He was lightly injured when the flashlight exploded as he attempted to turn it on. Read the rest of this entry »
The End of Counterinsurgency and the Scalable Force
Posted by Brian in Opinion, Threat Watch on 5/Jun/2012 15:07
From STRATFOR:
By George Friedman
The U.S. military for years has debated the utility of counterinsurgency operations. Drawing from a sentiment that harkens back to the Vietnam War, many within the military have long opposed counterinsurgency operations. Others see counterinsurgency as the unavoidable future of U.S. warfare. The debate is between those who believe the purpose of a conventional military force is to defeat another conventional military force and those who believe conventional military conflicts increasingly will be replaced by conflicts more akin to recent counterinsurgency operations. In such conflicts, the purpose of a counterinsurgency is to transform an occupied society in order to undermine the insurgents.
Understanding this debate requires the understanding that counterinsurgency is not a type of warfare; it is one strategy by which a disproportionately powerful conventional force approaches asymmetric warfare. As its name implies, it is a response to an insurgency, a type of asymmetric conflict undertaken by small units with close links to the occupied population to defeat a larger conventional force. Insurgents typically are highly motivated — otherwise they collapse easily — and usually possess superior intelligence to a foreign occupational force. Small units operating with superior intelligence are able to evade more powerful conventional forces and can strike such forces at their own discretion. Insurgents are not expected to defeat the occupying force through direct military force. Rather, the assumption is that the occupying force has less interest in the outcome of the war than the insurgents and that over time, the inability to defeat the insurgency will compel the occupying force to withdraw. Read the rest of this entry »
Terrorism and the Not-So-Exceptional Individual
Posted by Brian in News, Opinion, Threat Watch on 24/May/2012 16:35
By Scott Stewart
In last week’s Security Weekly, we used a thwarted underwear bomb plot, as well as the U.S. government’s easing the rules of engagement for unmanned aerial vehicle strikes in Yemen, as an opportunity to examine the role of exceptional individuals in militant groups that conduct terrorist attacks. Al Qaeda in the Arabian Peninsula’s (AQAP’s) innovative bombmaker, Ibrahim al-Asiri, is one such individual.
Reported by AP on May 7, the news of the thwarted underwear plot overshadowed another event in Yemen that occurred May 6: a U.S. airstrike in Shabwa province that killed Fahd al-Quso, a Yemeni militant wanted for his involvement in the attack against the USS Cole in October 2000. Al-Quso appeared in a video released by AQAP’s al-Malahim Media in May 2010, during which he threatened attacks against the continental United States, its embassy in Yemen and warships in the waters surrounding Yemen. Read the rest of this entry »
Terrorism and the Exceptional Individual
Posted by Brian in Threat Watch on 17/May/2012 18:16
By Scott Stewart
There has been a lot of chatter in intelligence and academic circles about al Qaeda in the Arabian Peninsula (AQAP) bombmaker Ibrahim al-Asiri and his value to AQAP. The disclosure last week of a thwarted AQAP plot to attack U.S. airliners using an improved version of an “underwear bomb” used in the December 2009 attempted attack aboard a commercial airplane and the disclosure of the U.S. government’s easing of the rules of engagement for unmanned aerial vehicle strikes in Yemen played into these discussions. People are debating how al-Asiri’s death would affect the organization. A similar debate undoubtedly will erupt if AQAP leader Nasir al-Wahayshi is captured or killed.
AQAP has claimed that al-Asiri trained others in bombmaking, and the claim makes sense. Furthermore, other AQAP members have received training in constructing improvised explosive devices (IEDs) while training and fighting in places such as Iraq and Afghanistan. This means that al-Asiri is not the only person within the group who can construct an IED. However, he has demonstrated creativity and imagination. His devices consistently have been able to circumvent existing security measures, even if they have not always functioned as intended. We believe this ingenuity and imagination make al-Asiri not merely a bombmaker, but an exceptional bombmaker.
Likewise, al-Wahayshi is one of hundreds — if not thousands — of men currently associated with AQAP. He has several deputies and numerous tactical field commanders in various parts of Yemen. Jihadists have had a presence in Yemen for decades, and after the collapse of al Qaeda in Saudi Arabia, numerous Saudi migrants fleeing the Saudi government augmented this presence. However, al-Wahayshi played a singular role in pulling these disparate jihadist elements together to form a unified and cohesive militant organization that has been involved not only in several transnational terrorist attacks but also in fighting an insurgency that has succeeded in capturing and controlling large areas of territory. He is an exceptional leader.
Individuals like al-Asiri and al-Wahayshi play critical roles in militant groups. History has shown that the loss of exceptional individuals such as these makes a big difference in efforts to defeat such organizations. Read the rest of this entry »
Searching for Connections Amid Terrorist Threats
Posted by Brian in Opinion, Threat Watch on 10/May/2012 15:45
By Scott Stewart
In past Security Weeklies we have often noted how analyzing terrorism is like assembling a puzzle. After an attack has transpired, it is easier to piece the disparate clues together because you have the luxury of knowing what the finished puzzle should look like. You know the target, the method of attack, the time, the place, etc. These factors frame your approach to the bits of evidence you gather and allow you to assemble them into a cohesive, logical framework. While there will certainly be missing pieces at times, having the reference point of the attack itself is helpful to investigators and analysts.
On the other hand, analyzing a potential threat before an attack takes place is far more difficult. It is like sifting through pieces of thousands of different puzzles, all jumbled together in one big pile, and attempting to create a complete picture without knowing what the end result — the attack — will look like. Sometimes pieces look like they could be related, but it is often difficult to determine if they really are without having the picture of the finished attack and the important framework for investigative reference: target, method of attack, time and place. It is often easy to look back after an attack and criticize authorities for not making a critical connection, but it is difficult to piece things together before the attack occurs without the assistance of hindsight. Read the rest of this entry »
The Continuing Threat of Libyan Missiles
Posted by Brian in News, Threat Watch on 5/May/2012 12:39
From STRATFOR:
By Scott Stewart
In March 2011, while many of the arms depots belonging to the government of Libya were being looted, we wrote about how the weapons taken from Libyan government stockpiles could end up being used to fuel violence in the region and beyond. Since then we have seen Tuareg militants, who were previously employed by the regime of former Libyan leader Moammar Gadhafi, leave Libya with sizable stockpiles of weapons and return to their homes in northern Mali, where they have successfully wrested control of the region away from the Malian government.
These Tuareg militants were aided greatly in their battle against the government by the hundreds of light pickup trucks mounted with crew-served heavy weapons that they looted from Libyan depots. These vehicles, known as “technicals,” permitted the Tuareg rebels to outmaneuver and at times outgun the Malian military. Moreover, we have recently received reports that Tuareg rebels also brought back a sizable quantity of SA-7b shoulder fired surface-to-air missiles, also known as man-portable air defense systems (MANPADS). Read the rest of this entry »
Why U.S. Bounties on Terrorists Often Fail
Posted by Brian in Opinion, Threat Watch on 13/Apr/2012 16:16
Republished from STRATFOR:
By Scott Stewart
U.S. Deputy Undersecretary of State Wendy Sherman announced April 3 that the U.S. government’s “Rewards for Justice” (RFJ) program was offering a $10 million reward for information leading to the capture and conviction of Hafiz Mohammad Saeed, the founder of Lashkar-e-Taiba (LeT). In other Rewards for Justice cases involving Pakistan, suspects such as Osama bin Laden, Ayman al-Zawahiri, Abdel Basit and Mir Amal Kansi have hidden in Pakistan and maintained relatively low profiles. In this case, Saeed is a very public figure in Pakistan. He even held a news conference April 4 in Rawalpindi announcing his location and taunting the United States by saying he was willing to share his schedule with U.S. officials.
While the Saeed case is clearly a political matter rather than a pure law enforcement or intelligence issue, the case has focused a great deal of attention on Rewards for Justice, and it seems an opportune time to examine the history and mechanics of the program. Read the rest of this entry »
A Practical Guide to Situational Awareness
Posted by Brian in News, Threat Watch on 16/Mar/2012 12:04
From STRATFOR:
By Scott Stewart
For the past three weeks we have been running a series in the Security Weekly that focuses on some of the fundamentals of terrorism. First, we noted that terrorism is a tactic not exclusive to any one group and that the tactic would not end even if the jihadist threat were to disappear. We then discussed how actors planning terrorist attacks have to follow a planning process and noted that there are times during that process when such plots are vulnerable to detection.
Last week we discussed how one of the most important vulnerabilities during the terrorism planning process is surveillance, and we outlined what bad surveillance looks like and described some basic tools to help identify those conducting it. At the end of last week’s Security Weekly we also discussed how living in a state of paranoia and looking for a terrorist behind every bush not only is dangerous to one’s physical and mental health but also results in poor security. This brings us to this week, where we want to discuss the fundamentals of situational awareness and explain how people can practice the technique in a relaxed and sustainable way.
Situational awareness is very important, not just for personal security but as a fundamental building block in collective security. Because of this importance, Stratfor has written about situational awareness many times in the past. However, we believe it merits repeating again in order to share these concepts with our new readers as well as serve as a reminder for our longtime readers. Read the rest of this entry »
The State of the World: Germany’s Strategy
From STRATFOR:
By George Friedman
The idea of Germany having an independent national strategy runs counter to everything that Germany has wanted to be since World War II and everything the world has wanted from Germany. In a way, the entire structure of modern Europe was created to take advantage of Germany’s economic dynamism while avoiding the threat of German domination. In writing about German strategy, I am raising the possibility that the basic structure of Western Europe since World War II and of Europe as a whole since 1991 is coming to a close.
If so, then the question is whether historical patterns of German strategy will emerge or something new is coming. It is, of course, always possible that the old post-war model can be preserved. Whichever it is, the future of German strategy is certainly the most important question in Europe and quite possibly in the world. Read the rest of this entry »
Detecting Terrorist Surveillance
Posted by Brian in News, Threat Watch on 12/Mar/2012 10:00
This is a report from STRATFOR:
By Scott Stewart
As we noted last week, terrorist attacks do not materialize out of thin air. In fact, quite the opposite is true. Those planning terrorist attacks follow a discernable process referred to as the terrorist attack cycle. We also discussed last week how terrorism planners are vulnerable to detection at specific points during their attack cycle and how their poor surveillance tradecraft is one of these vulnerable junctures.
While surveillance is a necessary part of the planning process, the fact that it is a requirement does not necessarily mean that terrorist planners are very good at it. With this in mind, let’s take a closer look at surveillance and discuss what bad surveillance looks like. Read the rest of this entry »
The State of the World: Assessing China’s Strategy
This report is republished from STRATFOR:
By George Friedman
Simply put, China has three core strategic interests.
Paramount among them is the maintenance of domestic security. Historically, when China involves itself in global trade, as it did in the 19th and early 20th centuries, the coastal region prospers, while the interior of China — which begins about 160 kilometers (100 miles) from the coast and runs about 1,600 kilometers to the west — languishes. Roughly 80 percent of all Chinese citizens currently have household incomes lower than the average household income in Bolivia. Most of China’s poor are located west of the richer coastal region. This disparity of wealth time and again has exposed tensions between the interests of the coast and those of the interior. After a failed rising in Shanghai in 1927, Mao Zedong exploited these tensions by undertaking the Long March into the interior, raising a peasant army and ultimately conquering the coastal region. He shut China off from the international trading system, leaving China more united and equal, but extremely poor.
The current government has sought a more wealth-friendly means of achieving stability: buying popular loyalty with mass employment. Plans for industrial expansion are implemented with little thought to markets or margins; instead, maximum employment is the driving goal. Private savings are harnessed to finance the industrial effort, leaving little domestic capital to purchase the output. China must export accordingly. Read the rest of this entry »