Friday 25 September 2015

X-Ray Technology in Flight Pre-Screening

In Panter (2013) I wrote about backscatter imaging as a pre-flight security clearance tactic. Backscatter imaging operates much differently than x-ray technologies, the later is more frequently used and has been in operation in airports for a longer amount of time. Yet, security professionals often do not appreciate how x-ray technologies work or understand the science behind x-ray imaging. This is often due to the academic separation between practitioners and scientists (this will be discussed in another post). Therefore, this post aims to present a better scientific understanding of x-ray technologies as a security measure to those who do not have a degree in physics or a specialization in gamma radiation.

X-ray technology operates via 3 modes of photon/ electron interaction. These are the photoelectric effect, Compton scattering, and pair production.  It should be noted that many x-ray devices used in security screening are based upon the photoelectric effect, hence why we will only are discussing this. If you are curious about the Compton scattering effect, which is how backscatter imaging works, please see my previous posts.

 X-ray technologies work by using gamma radiation. Gamma radiation is a type of  electromagnetic radiation that has an extremely high frequency and consists of high-energy photons. These photons vary in their reaction when they enter an atom based on the type of atom they enter. The photoelectric effect occurs when an incoming photon of gamma radiation is absorbed by an electron. This results in the ejection of the electron into its orbit.

 
 
In the photo of a suitcase below notice how different materials show up on an x-ray as being darker in colour. In theory, the more dense an object is (like the revolver) the less likely it is to absorb the same amount of gamma radiation produced by an x-ray screening machine. This is why certain materials appear on a screening monitor as areas of light and dark shading. This is noticeable when looking at the can of tennis balls located to the right versus the revolver. The material of a tennis ball (rubber/ air) is not as dense as the material of the revolver (metal), therefore the gamma radiation from x-rays pass more easily through the tennis balls which creates an observed visual difference between material density. In simplest terms, x-ray photoelectric technology is based upon the fact that x-ray absorption in atomic matter varies with the energy of the beam and the density of the absorbing material.

 
Panter, H. 2013. Backscatter Imaging and Counterterrorism: An Analysis of Legal and Privacy Issues. NSU International Journal of Criminal Justice, VIII :8-14

Wednesday 8 January 2014

Fracture Matching in Comparative Analysis of Duct Tape

Duct tape is a common item that you can find in any toolbox or residence since its invention as a waterproof tape in the 1930’s. During World War II, duct tape was used by allied forces for various purposes and after the war it was used in homes for duct work, hence it’s commonly known name…”duct tape”. It is known for its very distinctive silver polyethylene backing but it can be now found in decorative colors. I recently have seen it in patterns ranging from camouflage to American university school logos.

It is found in vehicles, homes, and the DIY toolboxes and used for emergency repairs. Thus the easy accessibility of duct tape can be used by criminals as an evidential component to commit crimes. In homicides, a killer may use duct tape to tie the victim up or seal their body in some type of container. In rapes, the offender may also bound the victim and in hit-and-run homicides it can be used to reattach a damaged bumper. In terrorist attacks it can be used in energetic material construction (A.K.A. “bombs”). In other crimes it may be used to wrap around the handle of a sawed off shotgun to prevent wood splintering or used to wrap around a tool left at a crime scene. Arguably, the possibilities are endless to the usage and only limited by the criminal’s imagination.


(Above: Duct Tape Evidence from the Casey Anthony Case. Photo from the Orlando Sentinel online)


Before we begin it is critical that readers understand a basic forensic theory of evidence, the Locard’s Principle. Dr. Locard (13 December 1877 – 4 May 1966) was known as the French version of the fictional character “Sherlock Holmes” laying the groundwork for the concept that every criminal leaves some type of trace evidence at a crime scene. Dr. Locard’s Priniciple is the basis for the scientific concepts of forensics and trace evidence. So, in descriptive terms---two offenders in a physical struggle will exchange trace evidence from the clothing they are wearing, transfer blood, transfer skin cells, transfer sweat, etc. This can also include the soil found on the bottom of an offenders boot to the exchange of DNA through skin to skin contact (notably forensics is making advances in “touch DNA” extracting DNA from skin cells left from touch---but there is much scientific improvement to be made).

In respect to duct tape, according to Locard’s Principle, the offender may leave his/her blood, hair, clothing fibers, his/her pet’s hair, etc. on the adhesive size of the duct tape. On the polyethylene backing, the offender may leave a latent fingerprint (see my previous blog post) or his/her DNA. Excluding obvious potentials for trace evidence recovery, the debate over duct tape has spawned from the idea that all commercially made duct tape can be traced back to an original manufacturing site which may be traced to a particular store in an area which might be further traced back to a purchaser of said duct tape linking it to a potential suspect. This is called fracture matching in comparative analysis of duct tape.

This concept of fracture matching of tape in forensic science began with Agron and Schecter’s (1986) study of electrical tape were they used photographic examination of two methods of tearing: tension and shearing, and determined that each tear was “unique and nonreproducible”. Their theory rests on the notion that each fracture of tape results in individual and unique characteristics resulting in a matching counterpart, with a matching end piece that holds high evidentiary value.

In the case of duct tape, shearing between two pieces occurs when the elastometric and fibrous materials of the polyethylene backing and the scrim fails. Duct-tape construction consists of a polyisoprene-based adhesive, fabric reinforcement (scrim), and a polyethylene backing (Johnston and Serra 2005). So in other words, the scrim, the component of duct tape that is woven or gauze-like of cotton or polyester blends is used to strengthen the tape. The scrim comprises of yarn running the length of the tape in the manufacturing machine direction which is known as the warp, while the yarn running across the tape is known as the fill (McCabe, Tulleners, Braun, Currie, and Gorecho 2013). The warp and the fill can vary based on the size, type of yarn, etc. based on manufacturing production---similar to the process of the manufacturing of sheets and bedding materials. The second piece of duct tape that holds evidentiary value is the outer adhesive which is manufacture specific and comprises of a combination of various elastomers, tackifying resins, and fillers (McCabe, Tulleners, Braun, Currie, and Gorecho 2013).

In 2007, the FBI discovered through research that relaying on backing analysis (the outer adhesive of duct tape) that…”identifying the tape manufacture in order to direct investigators toward a likely origin for duct tape evidence may not be possible solely by backing analysis” (Hobbs, Gauntt, Keagy, Lowe, and Ward 2007). So…in order for there to be any probability of any evidence of high evidentiary value the area of duct tape that should be examined is the fabric reinforcement area, the scrim.

Tulleners and Braun (2011) examined 1800 pieces of torn tape specimens and 400 cut tape specimens. They discovered that it is possible to match ends of duct tape to their origin 98.25 to 100 percent for torn tape and 98.15 to 99.83 percent for cut tape. So, Tulleners and Braun (2011) were able to determine that you can match a piece of tape to its connecting tape roll. In theory, a piece of duct tape could be connected to a manufacturing point--to a distributor---to a buyer---then potentionally to a suspect.

While what I like to call “manufacturing forensics” is a fairly new area of forensic science, its forensic evidentiary probability and usage should not be discounted. Based on the limited scientific research on fracturing matching of duct tape, more research should be done on the topic. In time, I believe that "manufacturing forensics" could be the future of fruitful evidence recovery by using the same concepts in other manufactured materials that are left at crime scenes. (Examples: clothing, footwear, medical tape, etc.)

Hobbs, A., Gauntt, J., Keagy, R., Lowe, P., Ward, D. (2007). “A New Approach for the Analysis of Duct Tape Backings”. Forensic Science Communications 9(1).

Johnson, J. and Serra, J. (2005). “The examination of pressure sensitive adhesive tapes”. IAMA Newsletter 5(1): 19-31.

McCabe, K., Tulleners, F., Braun, J., Currie, G., Gorecho, E. (2013). “A Quantitative Analysis of Torn and Cut Duct Tape Physical End Matching”. Journal of Forensic Science 58(S1).

Tulleners, F. and Braun, J. (2011). “The Statistical Evalustion of Torn and Cut Duct Tape Physical End Matching”. National Institute of Justice, U.S. Department of Justice. 2009-DN-BX-K235.

Wednesday 4 September 2013

How We are Failing as Criminology Researchers...A Call for Action

Unlike my previous blog posts, which have previously had a heavy forensic basis with the analysis of criminal evidence, this blog post will focus on how researchers are failing in the science of criminology...

I often get asked by friends how my current research involving the intersection of gender, sexuality, and officer bias is criminological in nature. When the same friends ask me how do I define "criminology", I have always summed it up typically like this...if psychology and sociology had a crazy drunkard encounter their child would be criminology. Criminology is not "Clarice Starling" interviewing "Hannibal Lector" from "Silence of the Lambs", nor is it determining the probability of recovering readable latent prints on the skin of a homicide victim (see my previous post on latent prints to answer that question). Criminology is the study of determining why certain individuals commit certain crimes, how to prevent and control said crimes, and the very nature and extent of criminal behavior. Criminological research is supposed to accomplish this by examining policy, society, and even to an extent how officers target certain offenders and certain crimes. The complexities of the science itself can even be as detailed as examining what actually constitutes as a crime. While criminology is not a new science, as Italian Cesare Beccaria formulated the principles of classic criminology around 1804 in Essay on Crimes and Punishments, the concepts of contemporary criminologies are deemed as such.

Often modern researchers latch onto old theoretical concepts without giving up-and-coming criminology movements a fair shot. For example, recently I read an article by Rick Nevin in which he addressed how levels of crime could be connected to high levels of lead in drinking water. (For the curious the interesting article is here: http://pic.plover.com/Nevin/Nevin2007.pdf )

While most laughed at the concept of Nevin's (2007) lead argument and additional arguments by Howard Mielke and Sammy Zahran (article here: http://www.sciencedirect.com/science/article/pii/S0160412012000566), they did present something that no one had ever done before. Some have dismissed similar arguments in the somewhat new green criminology movement and other criminology movements, but this is where we as criminologists are failing our science.

With each criminology movement- the positivist revolution, Matza's naturalism, the Chicago School, etc.-the concepts and ideas are viewed as radical and unorthodox for the time. Sure, most criminologists laugh at Lombroso and the Italian School of Criminology in respect to cranial features determining criminal probability of individuals now, but at least they attempted to discover a different explanation for criminal behavior than previous researchers. We, as criminologists, owe it to our science to explore uncharted territories without falling back on constant regurgitated academic theoretical basic philosophies. If we have not successfully explained, discovered, treated, or cured the cause and purpose for crime with years of research with said regurgitated theories---then in essence we have failed. I urge any researcher who is reading this post to always think outside the box of what you read in textbooks---the ramblings of a dinosaur criminologist does nothing to encourage critical thinking in our field. While we must respect what has already been contributed, we must also take these concepts with a grain of salt. We should instead set sail for the uncharted waters of the criminological unknown. If you fail during your journey, at least you have attempted to do something different and solve a problem with a new criminological formula as there is no one way to solve the crime problem.

So for those young pioneers formulating new theories and concepts for our science, stay strong on your course and have the strength to face those who are critical of new theories. Look to other sciences to incorporate into criminology--like biology, psychology, and gender studies. Because in time, the theories of the criminological dinosaurs that academia holds true today will be just as laughable as Lombroso's theory of criminal atavism. Keep thinking critically and never shun those who do the same!

Thursday 18 April 2013

Media Conflict with Forensic Post-Blast Investigations


Since the Boston bombings, I have received several emails from previous students who are asking me to better explain the IEDs that were used in the Boston Marathon. Without going into to much technical detail on construction, I have found this diagram that has been widely circulated internationally throughout news outlets (hence why I am reposting it for demonstrative purposes without any ethical qualms). It should be noted that any speculation at the early stages of a forensic investigation should not lead to a confirmed conclusion until any crime scene/ case is cleared. As such, this blog post is about how the media can damage a major crime scene investigation at a blast site.

It should be noted that this type of device has already been used in the 2005 Delhl's Sarojini Nagar Market bombing, the 2006 Mumbai train bombings, the failed 2010 Stockholm bombing attempt, and the failed 2010 New York Times Square bombing attempt, so it's construction is not a new one. 

Now onto my main part of this post, how the media conflicts with forensic investigations. Since this incident this diagram has been widely circulated along with a brief incorrect history over the construction of the device. Several media outlets have eluded readers that the device construction has a long history in the Middle East indirectly implying that the suspect(s) may be from the same region. I have even seen media photos before the detonation of "possible suspects" at the scene who are of potential Islamic descent without giving any explanation of why they are "suspects". This adds fuel to the anti-Islamic biases that some Americans and Brits possess, and indirectly diverts attention away from any other possible non-Islamic suspect(s) which may or may not impact the actual investigation. As previously mentioned the construction of the device has a deeper history and connection to other parts of the world than the media is exploring. Further, the media appears to be releasing crime scene photos of victims and additional diagrams and photos of the epic center of both detonations without any regard to the on-gong investigation. Based on my detective experience, I can tell you that the releasing of too much information by the media can destroy an investigation, arrest, trial, and even people's lives. A perfect example of this was the handling of the Atlanta Olympic bombing investigation. 

Richard Jewell was a security guard working the Atlanta Olympics in 1996. During his security detail he discovered a pipe bomb and alerted Atlanta Police and helped evacuate the area--saving lives before it detonated. Because he discovered the device and had an eccentric history of wanting to be a hero and police officer the media began trying him without any actual forensic evidence, and with unreliable and inaccurate information. The media trial began with the local paper releasing his name as a possible suspect in the FBI investigation, from there the media snowball spun out of control. As a result of the media two victims even civilly sued Jewell himself before the investigation was completed. In 2005, Jewell was exonerated and the investigation was closed, disclosing that serial bomber Eric Rudolph was responsible for the incident. Jewell then successfully sued NBC, A.J.C. (local newspaper), CNN, New York Post, etc. after he and his family were cruelly and publicly tried by the media. Jewell eventually was able to full-fill his law enforcement dream after his exoneration, but he died at the age of 44 from heart disease and diabetes. One has to wonder how much his international media attention damaged his overall health.

Media speculation will naturally be at an all time high in an incident like this in America and other parts of the Western world, but for some odd reason similar incidents like this occur everyday in other parts of the Eastern world without any media attention at all. On a personal note, I have a hard time understanding how the media holds American lives more highly than others who are victims of other terrorists type events that occur in much larger scale and with worst destruction in other parts of the world (this topic is for another blog post, and due to space constrains will be properly addressed later). As such, I would like to encourage the media to respect the integrity of the crime scene without falsely reporting or referencing possible bomber M.O. (modus operandi) and allow the professionals to do a fair and accurate forensic investigation. Do we really need to know every detail leading to an arrest? With the release of abundant information, once an arrest is made how will this effect jurors in a criminal trial? Bombing investigations can take up to several weeks and it is a slow methodological process to collect and analysis forensic evidence at a crime scene. As such, we need to be patient and not prematurely point bias fingers at any suspect(s) until the guilty party is found.



Thursday 7 March 2013

Psychological Dynamics: Interviewer Characteristics and Suspect Criminal Disclosure

         When investigators conduct an interview, there are possible factors that can influence a questioned person’s responses. These responses can be influenced by the steps of the interview. These steps are part of the cognitive process and begin with a question asked by investigators, and the persons interpreting the question correctly. The person being interviewed then must retrieve the information from memory and construct an answer. During this process, respondents can form answers, edit the responses for social desirability, or shape responses to what they believe the investigator will find acceptable (Lord, Friday, & Brennan, 2005). These responses can be shaped by many factors. These factors can include the investigators’ sex, race, age, gender, and their perceived personality. A response might also be shaped by political beliefs, sexual behavior, and drug and alcohol abuse that the investigator might suggest or project during the interview (Lord, Friday, & Brennan, 2005). Two theories that criminologists and psychologists believe describe these steps of answer editing are the Social Attribution Theory and the Social Distance Model. Both describe the process of answer editing based on the investigator characteristics.

            The Social Attribution Theory suggests that a respondent may modify their responses to meet the societal norms and expectations they perceive that the investigator has based off observable characteristics (Lord, Friday, & Brennan, 2005). This theory is built on the assumption that the investigator characteristics alone are sufficient to influence the behavior and the responses of those being interviewed (Fendrich, Johnson, Shaligram, & Wislar, 1999). For example, an interviewee would be less likely to discuss illegal substance abuse to an investigator who presents observable characteristics that maybe associated with a negative attitude toward drug abuse. The interviewee would withhold or alter their responses to make them more compatible with the perceived investigator’s values (Fendrich, Johnson, Shaligram, & Wislar, 1999).

            Fendrich, Johnson, Shaligram, & Wislar (1999) conducted a study of interviews and subject effects on cocaine and marijuana use disclosure during questioning. The sample comprised of over 3,000 male juvenile arrestees. The juveniles were asked questions about their drug use, particularly marijuana and cocaine. If the juvenile disclosed that they had used either drug, interviewers then asked additional questions regarding the frequency and the last time of their use of the drug. Immediately following the interview, the juveniles were asked to submit to a urine test to confirm any statements. Fendrich, Johnson, Shaligram, & Wislar (1999) found that there was a diminished rate of disclosure that was related to the interviewers’ race; with the less disclosure to interviewers who were African-American. But in regards to marijuana reporting, there existed diminished rates of disclosure. This was attributed and related to the interviewers’ gender; with less disclosure to female interviewers (Fendrich, Johnson, Shaligram, & Wislar, 1999). The interviewers’ age also played a role in disclosure during the study. The juveniles of this study were less likely to disclose their drug use, marijuana and cocaine, to older interviewers (Fendrich, Johnson, Shaligram, & Wislar, 1999). This study also showed that the participants of this study were reluctant to disclose cocaine use but more willing to disclose marijuana use during questioning. Fendrich, Johnson, Shaligram, & Wislar (1999) showed that the less morally sensitive drug, marijuana, had a higher disclosure rate during questioning than its’ perceived more dangerous drug, cocaine, based on the interviewers characteristics. This study demonstrated that certain observable interviewer characteristics are associated with voluntary drug usage disclosure.

            For law enforcement investigators, this study involving the Social Attribution Theory clearly shows that as soon as an investigator walks into a room to interview a person, the person already makes assumptions of the investigator and their perceived values. So what happens in situations involving morally sensitive topics that are discussed during an interview? Another theory as to how certain information of morally sensitive topics is disclosed to investigators can be attributed to the Social Distance Theory.

 The Social Distance Theory is based on the idea that individuals may be hesitant to disclose personal information on sensitive topics, such as sexual behaviors and domestic violence due to the social stigma of the crime or the lack of connection between the investigator and interviewee. If an interviewee perceives that that an investigator has a negative stigma associated with a crime, the interviewee will be less likely to disclose it because they do not feel connected to the investigator. Perceived values that the investigator presents are interrelated with the level of stigma that an interviewee associates with a piece of information. Criminal behaviors are sensitive topics that are stigmatized and criminalized by mainstream society and by investigators in general (Golub, Johnson, Taylor, & Liberty, 2002). Sensitive behaviors such as drug use, sexual practices, and physical violence all have different levels of stigmas. This model states that a respondents’ willingness to disclose sensitive information depends on the social stigma they associate with it (Lord, Friday, & Brennan, 2005). This perceived stigma is based off the differences between the investigator and the interviewee. People tend to disclose more honestly and in greater detail to investigators whom they feel more emotionally comfortable (Catania, Binson, Canchola, Pollack, Hauck, & Coates, 1996). Interviewees edit their responses to the similarities and differences between themselves and the investigator asking questions. For example, if an investigator walks into a room and immediately tells someone they are questioning for child molestation, “child molesters are disgusting...how could anyone do such things to beautiful children”, the interviewee will probably never disclose any information because of the social stigma associated with the crime combined with the perceived values of the investigator. Investigators should be cognitive of stigmas during questioning. It should be noted that stigmas can also appear in an investigators non-verbal movements and gestures also. Something as simple as the nodding of your head in agreement or the look of disgust while the offender is talking could impact the probability of disclosure.

According to a study done by Goulb et al. (2002), individuals are more willing to disclose marijuana use, which is the least stigmatized of the illegal drugs, than recent use of crack cocaine. Goulb et al. (2002) attributed this finding to the social expectations and perceptions of marijuana usage versus crack cocaine usage. Goulb's (2002) theory has since been supported by other recent similar studies. 

A study by Johnson, Fenrich, Shaligram, Garcy, & Gillespie (2000) measured telephone responses regarding lifetime drug disclosure of 3,714 survey participants in Illinois. This study determined that respondents’ reporting recent drug use is relative to interview situations characterized by very high respondent-interviewer similarity (Johnson, Fenrich, Shaligram, Garcy, & Gillespie, 2000). In other words, the closer the respondents felt to the interviewer, the more likely they are to disclose information. Johnson, Fenrich, Shaligram, Garcy, and Gillespie (2000) found that a person interviewed may react, consciously or not, to interviewers based on stereotypes and misperceptions. This should be an important issue for investigators to remember, since a person being interviewed might hold a bias against the investigator's race. This would make it less likely that the interviewee would form a “bond” with the investigator and disclose any information needed during a confession.

Catania, Binson, Canchola, Pollack, Hauck, and Coates (1996) conducted a study of 2,030 18-49 year old adults and asked them questions on sexual behavior. Participants were allowed to choose if they wanted a female or a male interviewer to disclose information about their sexual behavior. Catania et al. (1996) hypothesized that both males and females given the choice to pick the gender of their interviewer will lead to more personal disclosure of the interviewees, which reinforces the Social Distance Model. This study showed that female respondents choose to disclose personal sexual behavior to women, and were less likely to disclose sexual information to male interviewers. Male respondents choose both men and women interviewers, with a slight majority selecting female interviewers (Catania, Binson, Canchola, Pollack, Hauck, & Coates, 1996). This study showed that by making the respondents feel more in control by selecting the gender of their interviewer, there is a perceived decrease in question threat. This perceived decrease in question threat lead to more voluntary disclosures of answers regarding personal sexual behavior.

For investigators this study has provided very valuable information, especially for investigators working sex crimes. Women who are potential suspects in a sex crime might be more willing to disclose more information or feel more comfortable with a female investigator. Men who are potential suspects in a sex crime might be more comfortable to disclose more information to a male or a female. Based on the results of this study I would urge a male and a female investigator to enter the room initially together and see which one the suspect responds or interacts with. The investigator that the suspect has the most observed or preferred interaction with should be the investigator that is the lead during the interview. It should be noted that investigators should not be insulted if the offender connects with a different investigator than themselves.

Investigators questioning possible suspects during an interview should be aware that everything they project and even who they are can determine the disclosure rate during an interview. Investigators should try to find the person that might best connect with the interviewee to be the lead interviewer in a criminal interview. Age, race, gender, and even perceived investigator values can influence how and how much a person might disclose in an interview. Investigators who are working major crimes like homicides, rapes, and child molestations might have a better success rate of disclosure if they attempt to connect with the interviewee and take the stigma away from the crime in question. By removing indicators of negative social stigma, the criminal act could be psychologically justified by the offender while in the process of disclosure. This process allows the criminal to justify or defend his criminal actions. While removing criminal and social stigmas from certain crimes can psychologically haunt investigators when "getting down on their level", it is a necessary interview tactic within policing that is very successful in obtaining criminal confessions. 


REFERENCES
Catania, J., Binson, D., Canchola, J., Pollack, L., Hauck, W., & Coates, T. (1996). Effects of Interviewer Gender, Interviewer Choice, and Item Wording on Responses to Questions Concerning Sexual Behavior. Public Opinion Quarterly, 60,345-375.

Fendrich, M., Johnson, T., Shaligram, C., & Wislar, J. (1999). The Impact of Interviewer Characteristics on Drug Use Reporting by Male Juvenile Arrestees. Journal of Drug Issues, 29 (1), 37-58.

Johnson, T., Fendrich, M., Shaligram, C., Garcy, A., & Gillespie, S. (2000). An Evaluation of the Effects of Interviewer Characteristics in an RDD Telephone Survey of Drug Use. Journal of Drug Issues, 30, (1), 77-102.

Lord, V., Friday, P., & Brennan, P. (2005). The Effects of Interviewer Characteristics on Arrestees’ Responses to Drug-Related Questions. Applied Psychology in Criminal Justice1(1)36-55.


Tuesday 15 May 2012

Al Qaeda in the Arabian Peninsula (AQAP)

Recent news reports have brought main-stream attention to AQAP (Al Qaeda in the Arabian Peninsula) and one of the current bomb makers, Ibrahim Hassan Tali al-Asiri. So, what is AQAP and how dangerous is Ibrahim al-Asiri?

The AQAP emerged in January 2009 consisting of Yemeni and Saudi Arabian radicals under the leadership of Amir Masir al-Wahish and Qasim al-Rimi. AQAP's goals are to support the activities of al Qaeda and establish strict Islamic law throughout the world (Bolz, Dubonis, & Schulz, 2012). Collectively, AQAP and Al Qaeda were responsible for the publication called Inspire, an English radical Muslim magazine that provided information on how to construct IEDs and other weapons. The magazine also encouraged radical violent acts and allowed similar-minded individuals to contact each other.
The CIA has described AQAP as a major threat to U.S. security (Bolz et. al., 2012) and they have been known to use explosives, assault weapons, and other small arm weapons. White House counter-terrorism advisor John Brennan has stated that the AQAP is "the most active operational franchise" of al Qaeda outside Afghanistan and Pakistan. The AQAP has gained a reputation for being innovative and very active recently from three major incidents that can be attributed to bomb maker Ibrahim al-Asiri and other radical Islamists.

Ibrahim al-Asiri was responsible for the construction of a device used by his brother, Abdullah al-Asiri, in the failed assassination attempt of Saudi Deputy Interior Minister Prince Mohammed bin Nayef on August 27th, 2009 (Stewart, 2012). Prince Mohammed bin Nayef was in charge of the kingdom's counter-terrorism efforts and was conducting a social appearance during the celebration of Ramadan, the Islamic month of fasting. Prince Mohammed bin Nayef also used the appearance to show the media a Saudi man who was a wanted militant from AQAP and was willing to publicly renounce terrorism (Stewart, 2012). The Saudi man, Abdullah al-Asiri, asked to meet the prince in order to repent and then be accepted into the kingdom's amnesty program. Prior to meeting the prince, al-Asiri was screened by security and a metal detector did not pick up any abnormalities. Unbeknownst to the security staff, al-Asiri has inserted 100 grams of pentaerythritol tetranitrate inside his rectum (Stewart, 2012). Pentaerythritol tetranitrate (PETN) is a powerful relatively stable high explosive which is part of the same chemical family as nitroglycerin. Once al-Asiri was close to the prince, the device detonated ripping al-Asiri in half and thankfully the prince survived. The prince survived due to the downward blast of the device and al-Asiri's body absorbed most of the impact of the blast (Stewart, 2012). Following this failed assassination attempt Ibrahim al-Asiri then used his creative bomb making capabilities to construct the device used on Northwest Flight 253.

On December 25th, 2009 the AQAP claimed credit for the attempted bombing of Northwest Flight 253 as it approached Detroit. The attempted bomber, Umar Farouk Abdulmutallab, tried to detonate a 6 inch package of PETN powder sewn into his underwear.   Umar Abdulmutallab attempted to mix the PETN and liquid acid with triacetone triperoxide (TATP), a high explosive that was also used by shoe bomber Richard Reid in 2001. Thankfully, other passengers noticed foul odours and the flames on Umar's pant legs and subdued him and extinguished the fire before his attack was carried out. After arrest, Umar Abdulmutallab advised that he obtained the device in Yemen and he was directed by al Qaeda to carry out the attack.
The third device that al-Asiri has been considered responsible for is the attempted attack against two U.S. cargo aircraft in October 2010. The two devices were located aboard UPS and FedEx planes addressed to synagogues in Chicago, but counter-terrorism experts believe the devices were intended to blow up the planes once over the United States. The devices consisted of PETN and were hidden inside printer cartridges. The printer itself contained an electrical switch that was connected to a mobile phone SIM card (Stewart, 2012).

Although Ibrahim al-Asiri devices have not been successfully in destroying their intended targets, his innovative and out-of-the-box thinking regarding bomb designs pose a great threat to America and other allies. In previous designs, al-Asiri demonstrated that he is able to create devices that potentially can pass undetected by security screening personnel. This possesses a great hazard particularly to airlines because they are vulnerable; and terrorist attacks generate a large causality rate and extensive press coverage. Until his apprehension, Ibrahim al-Asiri poses a great terrorist threat since his devices are becoming more and more difficult to detect. Tragically, recent media reports have speculated that AQAP may use pets and humans as containers for surgically implanted explosives in the future. With bomb makers like Ibrahim al-Asiri working for the AQAP, I am afraid in time the media reports might actually become true.

References

Bolz, F., Dudonis, K. & Schulz, D. (2012). The Counterterrorism Handbook: Tactics, Procedures, and Techniques-4th Ed. Boca Raton: CRC Press.

Stewart, S. (2012). AQAP: Paradigm Shifts and Lessons Learned. Retrieved from http://www.stratfor.com/weekly/20090902_aqap_paradigm_shifts_and_lessons_learned on 05/12/12.

Friday 13 April 2012

The Early History of Terrorism

As a counter-terrorism instructor, students often inquire about the early history of terrorism and the influence religion/politics have on certain terrorist acts. Political science historians and terrorism experts (Pape, 2005; Boltz, Dudonis, & Schulz, 2012) have stated that terrorism has been occurring since the first century with the Jewish Zealots and Sicarii. While the organizational structure of the Jewish Zealots and Sicarii are relatively unknown, their strategic logic is notorious (Pape, 2005). The Zealots and the Sicarii used violent attacks designed to incite an uprising among the Jewish targeting the Roman occupation at the time. After several decades of attacks, the Zealots and Sicarii triggered the Jewish War of 66 A.D.(Aberback & Aberback, 2000). The Jewish War, which resulted in defeat, led to the destruction of the Temple in Jerusalem; extermination of Jewish areas in Egypt and Cyprus; and the exodus of Jews from Judea (Aberback & Aberback, 2000). After four years the war ended in Masada, where 960 members committed one of the largest group suicides in history rather than submit to Roman rule after years of war, murder, rape, and slavery.

One of the most well-known historical terrorist groups to date was the Ismaili Assassins. The Ismaili Assassins attempted to overthrow the existing Sunni Muslim order during the Fatimid dynasty, 909 to 1171 A.D. in the Middle East. The Assassins were a small fundamentalist religious sect that believed that they were more true to Islam than the Shiites and the more dominant Sunni Muslims. They engaged in acts of murder for their political goals and frequently used the threat of suicide attacks to compel Sunni rulers to abandon military campaigns against them (Pape, 2005). Besides their reputation for violent attacks, the Assassins were also accredited with the invention of chain –mail armor to protect themselves from dagger attacks (Boltz et al., 2012).

Although the Ismaili Assassins have been labeled one of the most notorious groups of historical terrorists, there has been many more. In previous posts, the definition for terrorism and the acts of suicide terrorism have been explored. Often, suicide terrorist acts have been primarily motivated due to religious or political beliefs. In the 1980’s the Shia Muslims battled the Israeli (Jewish) and Western (Christian) opponents in Lebanon (Pape, 2005). In Sri Lanka, the Tamils (Hindu) battled the Sinhalese (Buddhist) in the 80’s and 90’s. The Tamil Tigers, as they are frequently called, have been attributed to mass usage of suicide bombers to commit murder for political ends. Often women have been used as a suicide bombers, since they arouse little suspicion from their intended targets prior to detonation.

While acts of terrorism did not end in the 1990’s, this brief history should show that terrorism in general has been around since the writing of the Bible. In counter-terrorism circles, often there are theories and strategies to combat terrorism but in reality terrorism will be something that will never be stopped. As history has shown, terrorism is constantly evolving in ideology but some methods and acts of terrorism will never change.

Aberback, M. & Aberback, D. (2000). The Roman-Jewish Wars and Hebrew Cultural Nationalism. New York: St. Martin Press.

Bolz, F. Dudonis, K. & Schulz, D. (2012). The Counterterrorism Handbook: Tactics, Procedures, and Techniques-4th Ed. Boca Raton: CRC Press.

Pape, R. (2005) Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.