Thursday, October 2, 2014

Ebola - A Global Terror Vector

This is a copy of an article submitted to the Yale Global Health Review in February, 2014 for publication.  It was never published.  This paper was a self study project undertaken by my daughter.  With the current emerging global Ebola crisis, this information is too important not to release to the web.  YGHR missed the boat on a critical global health issue. 

Joe Mazzarella 
Global Health Risks of Non-state Transnational Terror
Grace Mazzarella
January, 2014

In September of 2000, the United Nations, through its member states, agreed on Millennium Development Goals (MDGs).  The MDGs are a series of goals aimed at making measurable improvements in alleviating worldwide poverty, hunger, disease, illiteracy, environmental degradation, and discrimination against women within a 15 year period.  Since its adoption, the World Health Organization (WHO) has reported that great strides have been in the intervening years.[1]  These gains are the result of concerted governmental and non-governmental programmatic efforts.   Despite this progress, these gains are vulnerable to being undermined by both well-known and less well-known and understood emerging systemic threats.  One of these less well-known and understood threats is the emerging systemic risks associated with the agents and causes of geopolitical conflict.   In the area of global health, the new paradigm of multinational, non-state sponsored terrorism represents a significant and growing risk factor with unique challenges for the world health community.   

Most state efforts to combat terrorism are motivated by a desire to prevent acts of terrorism and their immediate impacts, namely the indiscriminate loss of life and injury to civilians and noncombatant personnel.   While acts of terrorism catch worldwide media attention, terror groups can have significantly greater far reaching and lasting effects through sustained low intensity conflict.  Terror in itself is not the objective for terrorist groups inasmuch as it is to create conditions of increasing civil instability to achieve various ends.  These ends are often political, ethnic and/or religious in nature.  As a consequence, civilian populations are often targeted based upon on their ethnic and religious composition and political alignments.  For the ideological modern terrorist, the objective is to inflict not only death, but to instigate mass displacement and removal of objectionable segments of the civil population.  This, in turn, creates enclaves of control to stage, assemble and support larger operations with the intent of further challenging incumbent government forces, disrupting national systems of civilian and military support, such as commerce and transportation routes and utility infrastructure, and creating successively greater instability within the state.   These strategies and mass displacement effects have been observed in a variety of conflicts including Iraq, Syria and the Sudan.
Focusing on Syria, one needs to only consider the scale of humanitarian tragedy occurring in Syria to understand the scope and nature of this problem.    As of the writing of this Article, the United Nations High Commissioner Refugees (UNHCR), reports that over 2.3 Million refugees have been displaced from their Syrian homes as a result of ongoing civil war, and it is predicated that the refugee population could reach 4 Million if the conflict continues along it present course.[2]  Despite its political characterization, the greater reality is that the Syrian civil war is being fueled by an influx of multinational Islamic fighters, many of which are aligned with known terror groups such as Al-Qaeda and external state sponsors of terrorism like Iran.[3] Beyond the effects of conventional fighting between insurgents and government forces, civilian populations have been brutalized by numerous reported attacks of barbarity designed to terrorize and incite mass civilian departure.  In one of many similar reported incidents, on January 17, 2014, Al-Qaeda insurgents reportedly overran the western-backed Free Syrian Army held town of Jarabulus located in Northern Syria.  Al-Qaeda fighters then initiated an indiscriminate killing spree, murdering men, woman and children.   Among their heinous acts, over hundred men were rounded up and Al-Qaeda fighters began slaughtering them, including beheading their victims and posting heads on spikes.  As a result of this terror, nearly 1,000 civilians fled for the safety in Turkey.[4]   Syria’s civilians, much like in other recent modern terror infused conflicts, are suffering extreme and indiscriminate brutality which is driving mass population displacement.

But Syria is not unique.  In many of today’s conflicts around the globe, terrorist organizations operate to destabilize government institutions by sowing fear and insecurity among the populace, and eroding the will and capacity of government institutions to carry-out the delivery of basic services.[5]  Whether one begets the other is open for debate, however it is generally recognized that terror groups tend to coalesce and root themselves in places where governments are politically weak and have failing civil institutions.  Cases on point include Iraq, Afghanistan, Pakistan, South Sudan, Somalia, Libya, Algeria, Nigeria, the Palestinian Territories, Lebanon, Indonesia and Yemen, among others.[6]  In fact, the number of displaced person has risen year over year and reached its highest since 1994 with an estimated 45 Million refugees, and the UNHCR reports that vast percentage of refugees are arising within the aforementioned countries.[7] As non-state actors foment civil unrest and spread terror, large civilian displacement becomes a major pandemic disease vector that has broad regional and global implications.
By way of example, the Syrian war has given rise to an outbreak of polio, a disease that has been effectively eradicated from most of the global community, save a few, through decades of vaccination efforts.  Prior to the conflict, the last reported case of polio in Syria was reported in 1995.  In November of 2013, the WHO raised an alarm with an outbreak of up to 37 confirmed cases of polio. [8]    As result, a massive immunization effort has been launched to stem the outbreak.  Nonetheless, this in turn has raised fears that there is high risk of a polio outbreak in Europe given that large numbers of Syrian refuges may begin to migrate from temporary camps in neighboring countries to Europe as they search for better living conditions.[9]
Other places where polio has gained a foothold through disease importation include the African horn nation of Somalia, which is home to a nominally functioning government and numerous terror camps.  Other countries of polio importation, as reported by the WHO, include several African countries with terror based insurgencies such as Niger, Mali and the Congo.[10]  Meanwhile, the countries of Afghanistan, Pakistan and Nigeria remain polio endemic.  All of these locations share another common thread besides polio.  They are each suffering from ongoing conflict spurred by endemic terror groups operating within their borders are main drivers of forcible displacement.
 Overall, the Syrian conflict serves as a powerful example of the role that non-sate terror organizations play in breeding conditions for global health emergencies and potential pandemics.  While the twentieth century was occasioned by state conflicts, the twenty-first century has given rise to a new form of non-state entity conflict that is transnational in nature.  Hallmarked by internal destabilization, these forces operate to sow political instability and fear among the populace and ignite civil strife.   Unlike traditional sovereign conflicts, the ability for world organizations to reach into and operate in these conflict areas to stem global health emergencies is often hampered due to non-existent diplomatic functions and no reliable or formal command and control leadership capable of brokering necessary conditions of security and safety for non-combatant relief workers.   In Syria, the effort to provide humanitarian relief has been thwarted in many cases and nation-states have been unable to provide consistent meaningful humanitarian aid.[11]
In the emerging reality of geopolitical conflicts characterized by non-state terror groups, it is possible that global health emergencies may be exploited as another tactic to create large scale destabilization and fear.  In this vein, while seemingly remote, it is not unreasonable to assume that terror groups could seek to spread highly contagious diseases in target populations through one or more terrorist cells.  In essence, the dynamics of population displacement, nonfunctional health delivery systems, and access to contagious diseases becomes a vehicle for biological warfare, or coined another way its own weapon of mass destruction (WMD).  While polio would be an unlikely candidate due to mass vaccination, infectious diseases such as the hemorrhagic Ebola or Marburg viruses could be used to create a large scale pandemic with a small team of sickly volunteers. Further, proximate access to and vectors for movement by a multinational terror organization are present because they are coincident with terror endemic areas, notably the Sudan, Uganda (bordering South Sudan) and Democratic Republic of Congo.[12]  These viruses can be opportunistically identified in the population and then intentionally passed from a host to willing conspirators. Placing “ground zero” patients inside of highly dense refugee camps along and infecting several disparate international targets has the potential to create global impacts that could overwhelm response systems and resources.  This tactic, albeit crude by today’s standards, has a historical precedent within North America when British forces used infected blankets of small pox to eradicate Native Indians during the French Indian Wars.[13]
More generally, non-state controlled areas with largely collapsed or inoperative healthcare systems and large refugee populations present conditions for pandemic outbreaks that can impact local, regional and global security.   This risk requires collaboration and attention among not only world health authorities but political and policy leaders, security experts and institutions of research and higher learning in order to create the necessary programs to monitor, identify, respond to and mitigate these hazards.    As the world community makes progress towards its MDGs, it is important that it recognize emerging changes in geopolitical dynamics and be prepared to adapt its programs and strategies to counter their associated risks. 

[1] United Nations, The Millennium Development Goals Report 2013, 1 July 2013, ISBN 978-92-1-101284-2, available at:
[2] Syria Regional Refugee Response, UNHCR Interagency Information Sharing Portal –Regional Overview, Web. 20 Jan. 2014 (
[3]  Laub, Zachary, and Masters. "Al-Qaeda in Iraq (a.k.a. Islamic State in Iraq and Greater Syria)." Council on Foreign Relations, March 2013.
[4] Hunter, Isabel, Al-Qaeda slaughters on Syria's killing fields, AL Jazeera Online (January 21, 2014) (
[5] Audrey Cronin, Ending Terrorism – Lessons for Defeating Al Qaeda, International Institute for Strategic Studies (Adelphi Paper 393, 2008), Ch. 1.
[6] National Counter Terrorism Center, Counterterrorism Calendar 2014 – Interactive Map, Web, accessed January 22, 2014 (
[7] UNHCR-Global Trends Report 2012, Displacement-The New 21st Century Challenge, June 19, 2013 (
[8] Global Alert and Response, World Disease News, Polio in the Syrian Arab Republic – update, World Health Organization (November 23, 2013), Web (
[9] Eichner &Brockmann, Polio emergence in Syria and Israel endangers Europe, The Lancet,  Volume 382, Issue 9907, Page 1777, 30 November 2013 (Elsevier Ltd, pub. online November 8, 2013,
[10] Polio Global Eradication Initiative Annual Report 2012, World Health Organization (WHO, Geneva, March 2013). (
[11] Blanchard, Humud & Nikitin, Armed Conflict in Syria: Overview and US Response, Congressional Research Service, Rel. RL33487, January 14, 2014 (avail., 10. “As with humanitarian assistance, U.S. efforts to support local security and service delivery efforts to date have been hindered by a lack of regular access to areas in need. According to Administration officials, border closures, ongoing fighting, and risks from extremist groups have presented unique challenges.”
[12] CDC, Known Cases and Outbreaks of Ebola Hemorrhagic Fever in Chronological Order, Web, accessed January 23, 2014, and CDC, Known Cases and Outbreaks of Marburg Hemorrhagic Fever, in Chronological Order, Web, accessed January 23, 2014. (
[13] F. Fenner et al., The History of Small Pox and its Spread Around the World, (Geneva, WHO, 1988): 239.] See, also, Sheldon J. Watts, Epidemics and History: Disease, Power and Imperialism (Yale University Press, 1999) for a comprehensive exposition on the geopolitical impacts and epidemics in the Western world.

Monday, July 21, 2014

Moving Towards Smarter Immigration and Border Control

Significant political debate swirls around the issue of illegal immigration within the United States. Despite the great divergence of opinion regarding immigration policy, one would believe that controlling border entry is an area of consensus. If nothing else, a porous border presents significant risks of importation of disease, criminality and terrorism. One aspect of the border and immigration problem that has been overlooked is the effective use of systematic information gathering and sharing to begin to discover the source, means and methods being used to exploit our borders. Simply stated, a tremendous amount of intelligence with immense value is being left on the table. Whether intentionally or unintentionally so, we are operating with blinders as we play cat and mouse games at the border.

In large measure, the influx of illegal immigrants into the United States is being facilitated by systemic processes fostered by transnational drug cartels and other organized criminal groups that seek to profit from human smuggling. Successful border exploitation is a result of decades of experience through trial and error associated with drug trafficking. In the evolution path to human smuggling, there is the early experience of the “mule”. These are illegal aliens encouraged to cross borders with contraband. Enterprising criminality quickly recognized that humans themselves are merely another form of contraband form which to profit. Human smuggling is simply a natural outgrowth of a matured and operationalized illegal drug trafficking phenomena.

In this regard, Illegal immigration bears the hallmarks of a large scale, organized criminal enterprise with hierarchal command, divisions of labor and functions, specialization, communication and transportation systems and money laundering infrastructure. The picture of a poor immigrant family picking up roots on their own and making their way to a new way of life is outdated. Illegal immigration is big business. Criminal syndicates operate across borders through untold numbers of “street soldiers” recruited through gangs operating in the United States and abroad. Beneath the surface, a highly adaptive and effective system exists consisting of recruiters, safe houses, look-outs and counter intelligence, document forgers, identity thieves, chop shops and auto-body repairers, transporters, enforcers, money facilitators, and guides. Drug trafficking, human smuggling and gun smuggling all share the same ecosystem of illicit activities. When we fail to gather information that helps to define the nature and extent of this far reaching system and how it operates, we limit our understanding and deprive ourselves of the ability to effectively combat and defeat these activities.

In many ways, we are currently hindering our ability to discover essential information. Currently, efforts to police illegal immigration are effectively segregated from other law enforcement activities that focus on criminal activities. This is further compounded by numerous federal, state and local law enforcement agencies have different jurisdictional and enforcement mandates rendering day to day cooperation and information sharing among agencies challenging. Local law enforcement is the most effective day to day information gathering agency because it is embedded in the local community and has a more intimidate understanding of what is happening on the street. Yet, as a matter of federal policy, local law enforcement is unable to enforce illegal immigration laws and detain illegal aliens. The best local law enforcement can do is refer the matter to Immigration and Customs Enforcement which, in turn, is overwhelmed and allows individuals to remain free on their own recognizance except in the most egregious cases. Being by nature transient and wishing to evade enforcement, most illegal aliens never report back and melt into the landscape. On the other side of the coin, Immigration and Customs Enforcement has no idea where most illegal immigrants are located at any point in time and the data that is available is often stale or erroneous.

Despite these problems, illegal aliens have been given access to public educational and health and welfare programs without any form of verification as to their stay status, and in many cases stolen social security numbers and other false documentation is presented. Public welfare institutions and healthcare facilities are blocked from verifying identity or reporting the presence of illegal aliens to law enforcement. So, at all levels, the ability to gather information about the whereabouts of illegal immigrants, is either nonexistent or exists in silos.

Therefore, one of the first steps to beginning to solve illegal immigration problem is knowing the nature and extent of the problem, and beginning to unravel the means, methods, persons and organizations behind this phenomena. This can occur with a combined effort among federal, state and local agencies to actively track and record the presence of illegal aliens. Law enforcement, schools, hospitals, and public benefits programs must be enlisted to report the identity and presence of illegal immigrants. Further, the use of social security numbers should be required to be reported to a national database to begin to ferret out identify fraud. Assuming there will be policy towards allowing illegal immigrants to stay under a documented worker program, there should be a requirement that illegal immigrants provide key information that can assist authorities in developing a better understanding of the system they are fighting. This information would include where illegal immigrants came from, how they were recruited, who recruited them, who helped them and how they made their trip, where did they stop, etc. Just like an employment application, truthfulness and accuracy should be required as a condition to stay and any inaccuracy should be grounds for deportation.

Over time, a reservoir of data and associated trends and correlations will begin to emerge. Americans have an uncanny ability to tackle complex problems when they put their minds to it. Being able to track, quantify and analyze illegal immigration should be something that stands above immigration policy. Information collection will empower policy makers and those with the responsibility of enforcement. When we begin to recognize that the border does not stop at the border, and illegal immigration effects every community, we will recognize that border protection is an internal matter that is best addressed by all communities working together, and it starts with gathering and sharing information.

Monday, October 14, 2013

The Global Crime & Sex Syndicates & the Internet

On a recent trip to a foreign country, I had the opportunity to meet with a leading law enforcement official of a major city who provided a glimpse into a typical “global ground zero” problem – a poverty racked slum area where drugs and sex intersect with the vulnerable poor of the world.  This location was one of countless other locations around the globe that are incubators feeding organized crime and terror.   Here, the buildings were ramshackle, itinerant men and woman, mostly young, mingled about in the shadows as drug and sex were sold in a virtual open market environment.    From a security camera we were able to observe in a matter of moments a potentially violent sexual act about to occur in a public area.  Police were called in and the two were arrested.   But this small incident is one of hundreds occurring every day.  Law enforcement can do little but standby and contain the area and address only the most egregious of situations.  In that moment, I had a realization.  These areas of abject poverty are merely a reflection of a greater disturbing global reality.  This city in a far-away place was connected to the US, and we connected to it in profound ways.   It is the money generated from the sale of illicit drugs, human trafficking and pornography that is undoubtedly financing the continuing growth of increasingly complex and interconnected global criminal and terror organizations.  These organizations have worldwide reach and shadow connectivity through the power of the internet.  Perhaps this is not a major revelation given that it has been printed elsewhere, but it takes on a new meaning when directly faced with the reality of poverty from the eyes of law enforcement.   For most, slums are not areas visited by tourists, and in most instances great efforts are made to keep tourists from “unsafe” areas and likewise to keep inhabitants of these from secure tourism areas.  This is done for good reason, but in another way it does a great disservice because it hides from the eyes of the well to do the reality of the rising criminal exploitation of global poverty.  Simply put, whether it is drugs, prostitution or pornography, these seemingly victimless vices are hardly that.  They are fed by the exploitation of the poor at ground zero.
After my visit, I conducted a few simple Google Searches.  The first search was the name of the subject country plus the search term “woman”.  This search returned numerous “dating” and “marriage” sites aimed at foreigners.   It seemed rather obvious that these sites, for the most part, were thin veneers for sex tourism.    Any business man or tourist on a visit could seemingly be easily arranged with a young woman for a “date”.   I next conducted a search with the country name in question coupled with the not overly explicit term for a woman’s chest – a rather basic search that would be performed by any overly inquisitive male youth in Anytown, USA.   Google images returned literally thousands of explicit images most of which were considerably more graphic than the search term implied.    A quick review of the search displayed several disturbing things.  A subjective assessment of the first two pages of Google’s image returns suggested that as many as 20% of the images could contain young woman of questionable age – meaning a reasonable person might question whether the subject’s age is over majority or the images were intended to convey youthfulness.  [Notably, Google has listed several image removals in the return footer, but by clicking on the notice, all were for DCMA copyright violations…from other image owners]. 
Following one Google return image with a young woman and a man in an explicit act, Google forwarded me to a web site which purported to be a blog.  The site titles were explicit and referred to “teens” from the geographic area in question.   I chose not to investigate any further.   Rather, I chose to pursue the underlying blog platform provider.  But as I encountered this, it became clear that young woman throughout the world offer an endless supply of victims for this insidious industry and the poor are incredibly vulnerable.  [Editor Note:  After a lot of researching to find a way to report objectionable material to Google, I found that the Google linked to the National Center for Missing Children (NCMC) -  I did report my concerns about the site in question.  But, this editor wonders why it is so difficult to report offensive images.  I discuss this further below.]
Beyond the presence of the material on the blog, the blog itself struck me for what is was in relation to the problem at hand.  It is a rapid web page creating, editing and posting technology that provides a means to pump out illicit materials quickly and make them globally available in an instant.   Once out on the internet, images are copied, reposted and linked to in many ways, and automated search engine crawlers quickly find, index and make them available in search returns.  A review of the underlying sex blog platform revealed it was created several years ago, and its express aim is to allow for the rapid creation of sex oriented blog sites which cannot be created or maintained on popular blog sites (A simple footer at the bottom of the blog site contains a button to report complaints, at best a token effort to avoid complicity with those spawning pornography).  This blog platform is likely one of a great number available.  While blogging technology is no longer deemed cutting edge, a glimpse into the power of technology is offered in its ability to enable large scale illicit activities with relative ease.  With new social technologies like Twitter, Facebook and Instagram which allow photos and videos to be posted immediately to the internet and subscribers to view them, the power to proliferate pornography is virtually unlimited and uncontrollable.  In a recent conversation with a board member of a private Christian school and I was shocked to learn that there was a problem with 6th graders and “selfies”.    Apparently, there were a large number of young girls sending out unsuitable photos of themselves to friends using Instagram.    One would expect a Christian private school to be an environment that encourages self-control, moral behavior and boundaries, but the presence of internet connected camera phones makes it so easy to produce explicit photos and share them, there are no longer any barriers and in their absence even those inculcated with morals and ethics feel free and empowered to abandon them.  
It would seem axiomatic that for every woman exploited on the internet, there are equal or greater numbers still that are being abused through local prostitution, sex tourism, and human trafficking.  The presence of drugs serves to addict, undermine and enslave the poor, not only taking what little money they have but serving as vehicle to a criminal lifestyles controlled by their masters in exchange for the next fix.   For other innocents, the entry into this world is not their own doing.  They are forcibly taken or fraudulently induced into captivity through friends and associates working on behalf of local criminals often connect to larger criminal enterprises.   Often, the prospects of apparently legitimate employment opportunities in the hospitality and retail industry are used to attract low skilled workers only to find out later there is no real job and they are to be held against their will and placed into prostitution.   Using the stigma of sex slavery and also illegal immigrant status, these young victims feel trapped in hopelessness, being ashamed to contact family and friends and afraid to contact law enforcement. 
So, what can we make of this?  The notion that pornography and illegal drugs are victimless crimes seems to be fundamentally wrong.  There is a clear nexus between criminal drug activity, sex crimes and pornography.  Where one is, the other is likely to be found.  The sources of these victims are found in places of poverty around the globe.  The victimization is global in nature not only because the internet allows for global distribution, but because internet connectivity and global commerce enables affiliations of criminal and terror groups that can work in concert over large distances.  The means, methods and opportunities are all present with little to no barriers, and detection is difficult.
With respect to the United States, the demand and use of illegal drugs and the unlimited access to pornography and ability to shop for prostitutes via the internet serves to fuel these destructive organizations.    The internet has placed the poor in far-away places in the cross hairs of web sites and search engines and there are plenty of bad actors willing to exploit this at the expense of the ultimate victims - the poor, young and helpless trapped in grinding poverty.   
While efforts have been focused on making voluntary search filters available to users, it seems that the problem is bigger than selective search filters.  For example, Google’s “safe search” can be applied and it will filter out explicit and obscene material with generally good results.  However, it is as simple as changing a setting with one click to remove the protection.   More problematic still is that while we wish to avoid censorship and promote free expression, the ability to embed potentially unlawful images in web sites and return them in searches is a major concern, especially with respect to the exploitation of underage children.  There is simply no means available to validate whether an image is the product of exploitation, whether it involves minors, unlawful imprisonment, coercion or other unlawful conduct.  Thus, as a general question, we must ask ourselves whether the content has any real value or legitimate public interest when weighed against the risks and harms present to victims. 
One possible means of beginning to control this problem is by blocking key words associated with images that are intended to convey or suggest illegal content.  This would require search engines and ISPs to challenge the propriety of content with a presumption that it should not be published if there is a suggestion of illegal content.  Another means of controlling proliferation of illicit content would be for search engines to establish a database of illicit images and video content, and to provide the public with a prominent way to report illicit or suspect content.    
Overall, general awareness is an important aspect of reigning in this global exploitation problem.  While pornography has become increasingly accepted and common place in our society, it has gained acceptance in the absence of awareness of the human toll upon its victims in far-away places.  Perhaps for those search engines that really desire to make a difference, their advertising platforms could be harnessed to provide counter-messages regarding exploitation, missing woman and other compelling social messages that would make viewers think twice.   It would seem that technology has created a supply side problem and it is fueling demand and consumption.   The ability to empower users to turn away by volition (through both blocking and informative technology) will begin to put a dent in the global syndicates that derive financial reward from these activities. Doing so is on our best interest because these global criminal organizations and their increasing association with terror groups are ultimately a threat to our own security.

Tuesday, September 24, 2013

Kenya Mall Terror Attack Reinforces a Disturbing Pattern

"Mall Security" Photo Attribution: Creative Commons - Share Alike 2.5
By:  Joe Mazzarella, S.V.P. & Chief Counsel

The ongoing terrorist siege of a Kenyan Mall offers another clue in the evolving strategy of radical Islamist terrorists. As I have previously written, the Mumbai Hotel attacks represented an evolutionary step in terror thinking. With the hardening and increased security around air transportation, terrorists have changed tactics and moved to other more vulnerable civilian targets. Generally, places of routine mass public gathering are becoming more alluring targets because of the general ease of access, high concentration of potential victims and relative light security.
While different from the multi-pronged coordinated Mumbai attack, the Kenyan Mall attack bears a similar signature because it was a commando style terror operation with reportedly up to fifteen well-armed terrorists. The attackers are members of Al Shabaab, a Somali terrorist organization linked to al Qaeda. Information is being reported that the attackers are multi-nationals, which includes United States and European persons. At least 62 are confirmed dead, and another 175 injured. As of this writing, Kenyan security forces are entering the fourth day of engagement and have not yet taken full control of the mall. An unknown number of hostages are being held which is undoubtedly complicating matters for security forces.

As this gruesome terror event unfolds, several early key observations can be made. First, the attack carries another commando style signature with a large number of attackers applying overwhelming force to a public place. Any reasonable form of onsite security (whether armed security guards or local police presence) would have been outnumbered and out gunned. Second, the attackers employed a revenge based terror operation where death and mayhem is the aim in itself rather than hostage taking to achieve a worldwide political stage as was the predominant motivation in the last century. Hostage taking in this case, like Mumbai, was a secondary tactic to blunt a security response to the initial attack. Third, security forces again showed themselves unable to muster an effective early tactical response to the attack. The reasons for this remain unknown but we can suspect they are similar to past events where numerous local, regional and federal law enforcement agencies and military and special anti-terror organizations respond en masse but are unable to communicate effectively, lack information and lack command and control to organize and undertake a coordinated response. If anything, it is well understood that in the case of an active shooter scenario, time is of the essence and immediate engagement of attackers is critical to limit loss of life. In the case of active shooters in places of mass public gathering, it is necessary to quickly engage suspects with deadly force to deny freedom of movement and their ability to seek out and target more victims.

In order to maximize quick response tactics, the ability to see and hear inside of the place where the attack is unfolding is crucial.   A lack of information as to what is occurring, where is it occurring, and by whom and how many, creates indecision, delays in response and de-leverages response assets and personnel. In the Kenya Mall attack case, like in the Mumbai terror attacks, real time information from inside the mall was and is available from victims via mobile phones and other recording devices. Also, security surveillance cameras inside the mall can provide critical views of the scene inside.  Being able to share this video on-demand with first responders is a critical tool in enabling a quick assessment of the situation, identifying potential suspects, assessing their weaponry, and locating and tracking their position and movements.   Being able to seamlessly communicate among multiple responding security forces, and also to enabling communications between victims on the inside and first responders on the ground provides invaluable up to the minute intelligence. These capabilities are critical force multipliers and provide security forces with the ability to organize, gain tactical striking advantage and adapt in real time in order to bring maximum force to attackers and quickly size uncontested space and extend protection to those who may come under threat.

The ability to thwart a large scale command style attack on a public space may not always be preventable, but the ability to limit loss of life and subdue attackers more quickly and effectively is achievable. Placing adequate numbers of well-armed security personnel at every public gathering space is neither affordable nor practical. However, ensuring real time interoperable communications and multimedia sharing among security forces, emergency support agencies and critical infrastructure during a crisis can be achieved with minimal cost and can vastly improve response effectiveness. For the United States, we must remain vigilant and prepare for attacks of this nature. It would seem to be only a matter of time before an event similar to the Kenyan Mall attack or Mumbai hotel attack will occur. The ability for a dozen or more foreign terrorists to enter into the country and bring high power, high capacity weapons undetected through our borders remains a serious threat vector. Once inside the country, the ability to plan and organize an attack becomes easier especially in larger metropolitan areas with diverse multi-ethnic and multi-national populations where residents are less likely notice the presence of foreigners as anomalous or unusual. Special attention should be paid to in-door malls and large scale hotels that have limited public access points and create bottleneck environments. One of the surest ways to reduce loss of life is to provide more means of quick egress. This notion is contrary to popular concepts of retail design where physical space and pedestrian flow is designed to keep shoppers inside the shopping space as long as possible before exiting.

Because large scale malls tend to be in suburban metro areas, it is worthy to note that the quick reaction and special tactical units maintained by larger city police forces are not in immediate proximity to the mall and generally lighter armed, local area law enforcement personnel will be the first responders on scene. The ability to quickly gather intelligence from security guards inside the mall and from security cameras will be essential to maximize an effective immediate engagement and also allow for heavier armed and trained anti-terror personnel to respond as soon as they arrive on scene. Coordinating with local hospitals and trauma centers, EMS and emergency transport will also require coordination so that victims are quickly extracted, triaged and moved to the nearest hospitals. Even basic traffic control and securing unimpeded routes becomes a matter of life and death and requires coordination from the mall to medical facilities.

In recalling the Boston Marathon bombing tragedy, it is widely recognized that emergency response was exceptional with marathon route areas quickly secured and bombing victims quickly attended to, stabilized and transported to local trauma facilities. But, we should not be deceived by this extraordinary response. In that case, emergency personnel were pre-deployed for the event. Medical staff was on hand. A large police and fire force was deployed on route, and massive emergency response pre-planning occurred, including event specific communications. The same will not be the case in the event of a large scale attack on a mall or public place of routine mass gathering. There are too many and they are everywhere. In these cases, should an unexpected large scale terror event unfold there will be a massive response that will follow and there will be a need to adapt to the place and events occurring on the ground. Flexible and agile seamless inter-agency communications and information sharing will be essential in organizing an effective response. Effective communications and accurate real time information sharing remains the linchpin to improved safety and security and an enhanced emergency response. The capability exists to enable what is needed to make our communities interoperable. Once again, another tragic incident reinforces the urgency of this need.

Monday, September 23, 2013

Real Time Interoperability for School Safety - Active Shooter Response

School safety remains a nationwide focus after the tragic events at Sandy Hook school in Newtown, Connecticut. Many jurisdictions are actively investigating various ways to improve and prevent similar events. As we all know, school related shootings are becoming an all too familiar event, and can happen in any type of community.
Hartford School Active Shooter Exercise - All rights Reserved. Mutualink, Inc
Mutualink participated in the first post-Sandy Hook active shooter drill, which took place in Hartford, Ct. This exercise involved the Hartford Police, a Hartford school, the Hartford EOC, Saint Francis Hospital and other agencies. Through Mutualink multiple responding agencies' and the school's communications systems were instantly bridged and video from inside the school was shared with both command and ground responders providing real time situational awareness. The exercise demonstrated how real time communications and real time video can be used to more effectively respond to an active shooter crisis. In these types of events, more information and quicker response can save lives. This capability should be an essential part of any modern school safety response framework. An article regarding our School Safety - Active Shooter Exercise was published in Law & Order Magazine and also was submitted before Connecticut's School Safety Committee. Below are links to the article. Law & Order Magazine - School Safety Article link is here: Connecticut School Safety Commission Article link is here: Should any one who is concerned about school safety be interested in learning more, please feel free to contact me.

Tuesday, June 28, 2011

Kabul Hotel Attack Reflects Emerging Terror Strategy

Today’s attack on the Kabul InterContinental Hotel reinforces the assessment that terrorists are embracing Mumbai style commando attacks as an effective strategy. As previously discussed, it seems likely that commando style terror plots targeting hotel facilities in Europe and possibly the United States are on the horizon. See, New Commando Style Terror Plot Predicted in Mumbai Security Briefing – September 2010 , and Lessons Learned from the Mumbai Attacks – April,2010.

As recently as a week ago, Fox News reported that intelligence obtained in Somalia pointed to a potential Mumbai style plot aimed at a luxury hotel in London. Earlier in May, 2011, Anwar al-Awlaki, a senior Al-Qaeda leader threatened Mumbai style attacks on Europe, as reported by The Sun, a U.K. based newspaper. Overall, the gestalt of the Islamic inspired terror network seems to be shifting towards this style of attack.

As noted in past analysis, hotels, particularly luxury-style international hotels, are attractive targets. This is because of their symbolic representation as centers of western business and commercial interests, more affluent clientele and high value targets are present, and there is a cross section of various nationalities and religions peaceably coexisting in contravention of extremist ideals. Most significantly, hotels are soft targets.

For all intents and purposes, hotels have no effective means of resisting or thwarting an armed assault. Further, hotels can be easily surveilled and penetrated, because they are generally open to the public and there are transient visitors. Militants can pose as guests with a minimum of suspicion, especially in international hotel venues where peoples of diverse origin are present. Finally, smuggling weapons into hotels is a low risk exercise because weapons can be concealed wiithin baggage without arousing suspicion, and groups can quietly build by staggering their check-ins, concealing their association.

In terms of high impact and low personnel requirements, hotels offer themselves up as good targets as well. Hotels house large numbers of guests that are generally confined to floors with a limited numbers of exits and common egress stairwells. By controlling lower level floors, entire facilities can be effectively controlled with a limited number of militant personnel. Effective control can further be projected by detonating bombs or starting fires and maintaining fire zones at main doorways and entrances covered by shooters. Once control of the premises is achieved, members of the terrorist team are set up to sweep from the bottom to the top of the hotel facility executing guests, taking hostages and/or planting explosives.

Once physical control over the facility and hotel guests is established, the terror group has achieved a position of strength. Efforts to dislodge hostile operators by direct assault become a high risk operation due to concerns about potential collateral losses, the use of human shields, and/or triggering a preplanned mass killing event. This psychological advantage is likely to be more effective in Western countries where both real time news coverage and more open government create intense political pressures not to place hostages and victims at further risk. This situation also plays into the hands of the terrorists by providing a global stage for protracted hysteria and attention.

In both the Mumbai attack and Kabul Hotel attacks, the terrorists were wearing suicide vests and were operating to inflict maximum loss of life. Looking at other prototypical terror attacks such as the Beslan School incident and Moscow Theater attack, Islamic militants also intended to ultimately kill as many hostages as possible. Once they consolidated hostage groups, they extensively wired explosives in holding areas and detonated them.

These behaviors speak to the need for Western police and anti-terror units to quickly respond to any attack and actively engage hostile actors to deny them the ability to establish control over the facility and interrupt or delay planned operations that can further entrench their position and/or gain mass killing opportunities. With regard to hotel facilities, it is nearly impossible to adequately secure these venues. Attentiveness on the part of Hotel personnel in identifying suspicious actors is essential. Hotel personnel must be capable of identifying anomalies such as unusual numbers of younger single men originating from suspect destinations checking in with overlapping stay dates. Persons who are overly protective of their baggage and refuse to allow others near it may be a sign of unusual activity. Persons that are evasive as to the purpose of their stay, that are secretive or avoid public interaction may be a sign of suspect activity.

In addition to being alert, hotels must improve response coordination capabilities with law enforcement. In cases of an emergency, a rapid response aided by real time situational information that can assist a quick reaction force in effectively engaging and contesting militants. Allowing police to view the interior of the hotel through the sharing of security camera feeds would provide a tactical edge over the militants by enabling responders to identify militants, their positions and weaponry, command elements and monitor movements. Similarly enabling direct communication between on-scene responders and hotel staff and guests via cell phones, mobile chat, and even streaming video from smart phones, provides additional “eyes on” capability and situational awareness that can provide responders with a lifesaving edge.

The threat posed by this new mode of terror attack is not insignificant and offers many challenges to homeland security and public safety agencies. While we hope plots can continue to be successfully detected and thwarted before they become real operational threats, we must be prepared to handle and respond to a commando style terror attack. Hotels can be better prepared for these security risk scenarios and should invest in concealed video monitoring systems, interoperable communications and video sharing capabilities so they are equipped to give responders the information they need should the quite thinkable occur.

Tuesday, March 22, 2011

School Emergency Preparedness Requires More Focus

What would happen if a major catastrophe like the Tsunami in Japan struck during schools hours in your community? Do you know what would happen? Would you know where your children are, how to get them or what their condition is? Is your school really prepared to really take care of your kids?
These questions came to mind when looking at a picture from NBC news showing a mound of several hundred muddied and torn school backpacks collected in a pile in the midst of a devastated landscape. The caption for this picture read:

“Schoolbags are recovered from Okawa elementary school in Ishinomaki, Miyagi prefecture on March 22. Only 24 of 84 schoolchildren and 13 teachers have been found alive so far. After the earthquake hit, all the schoolchildren and teachers prepared for evacuation in the school yard. Some children left for their homes with family members. While the rest of the children were waiting to be collected, the tsunami hit.”

What struck me was the matter-of-factness of the numbers. Sixty children from an elementary are missing and presumably dead, but nobody can say with certainty. How many other school children suffered similar fates we do not know either.

But as we contemplate the heap of lifeless school backpacks, each one recently attached to a child, I ask again is your school ready? Are we taking this kind of emergency scenario seriously enough? Here are some basic questions:

  • Is your school capable of being an emergency shelter with ample food, water and electricity during a prolonged emergency?

  • Is your school earthquake proof? Is it hurricane proof? Is it in a flood zone?

  • Where do the children go if they must evacuate the school during an emergency and shelter at another location? Do you know where it is? Would you know if they were moved?

  • How will you be able to get information about your children’s location and health status? Is there multiple means of communication and information dissemination set-up? Do you know what they are?

  • Does your school have real interoperable communications with police, fire, ems and emergency management?

  • Who is in charge and what is the chain of command in emergencies? Are they trained to make critical assessments and handle emergencies? Are they certified in NIMS-ICS procedures?

  • Does your school have back-up satellite communications? If not, why not?

  • Is there an emergency store of critical medications that your child may need for prolonged sheltering? If not why not?

  • Is there a full time nurse on staff? If not, why not?

  • Is there family disaster assistance plan for teachers and others who must take care of kids, or will they abandon your children if things really get bad because they must take care of their families?

  • Is there a system that will enable youngsters to communicate with parents during an emergency or while sheltering away from home?

  • Is there a procedure for periodic roll call and status of students? How does the school monitor egress?

  • Is your school staff trained to handle and alleviate the psychological stress that young children will feel during an emergency?

  • If something happens to you in an emergency, does the school have alternate pick-up plans?

  • Can you pick up your children during an emergency or will you be locked out the school and be placed in danger? How does the school communicate that to you?

  • Does the school have a policy making sure siblings are reunited and sheltered together?

  • What plans are in place to deal with genders if sheltering in place is required? Will male teachers be left along to care for young girls? Should they?

While school budgets always seem to be tight and many priorities must give way to others, there are many reasons why investing in emergency preparedness and resiliency must take a priority at local and state levels. We have seen the consequences of schools involved in major emergencies, whether it was in the China earthquakes, the Japan Tsunami, or the many unspeakable acts of terrorism committed against schools throughout the world. As a society and has parents, we have a duty to protect our children, and the complacency is frightening.

There are few states that seem to be taking some important initiatives. In 2010, New Jersey passed a a law (New Jersey Statutes Section 18A:41-1) requiring that schools coordinate and work with emergency responders to implement and update school safety plans, and implement drill, management and emergency response procedures. The New Jersey law also mandates that full-time school employees receive training on school safety and emergency drills.

In Colorado, a new bill (Colorado Senate Bill No. SB11-173, “Interoperable Communications in Schools”) concerning interoperable communications for Colorado schools is pressing forward. Sponsored by Senator Steve King, this bill should serve as a model for action in other states. Without robust interoperable emergency communications and real time information sharing between schools and first responder, emergency management and emergency support function agencies, the framework for ensuring coordinated and effective live saving response is missing. Simply using a public 911 emergency call mechanism during an emergency for a school is woefully inadequate for a myriad of reasons, including the basic fact that a major community resource with hundreds of at-risk children is competing for assistance and call time with the general public and repetitive and possibly flooded call banks. Moreover, a method of constant situational awareness and coordinated effort is required at the beginning, during and after an emergency. This communication capability also serves as a means for important tabletop and field exercises and training, so that the school staff is capable of responding appropriately and effectively during a disaster or emergency.

At the end of the day, schools must be properly equipped, have practiced emergency plans in place, and the school staff must be trained and prepared to deal with large scale emergencies, because they can and do happen. Emergency preparedness and resilience requires an investment in time, focus and resources for unknown or unpredictable events. In many cases emergences are o remote that initiatives often lose their rightful priority until it is too late. Emergency preparedness is not attractive and sexy like sports and other popular school programs, but they are vital to the long term safety of our children.

There is no single greater force for change than parents, and of all the issues confronting schools emergency preparedness and resilience should be front and center, because the lives of our children may depend on it.