Manual On Counter Terrorism

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 15

MANUAL

ON
COUNTER
TERRORISM

NDA CONSULTANCY SERVICE


SEPTEMBER, 2016

TABLE OF CONTENTS
-

INTRODUCTION
AIMS AND OBJECTIVES
COUNTER-TERRORISM PROPONENTS FOR NIGERIA
UK AND OTHER INTERNATIONALLY APPROVED
COUNTER-TERRORISM WEAPONS
COUNTER-TERRORISM EQUIPMENTS
ELEMENTS OF COUNTER-TERRORISM
EXAMPLES OF COUNTER-TERRORISM ACTIONS
TACTICAL UNITS
DESIGNING ANTI-TERRORISM SYSTEM
NOTABLE INTERNATIONAL COUNTER-TERRORISM
AGENCIES
REFERENCES

INTRODUCTION
The National Counter-Terrorism strategy (NACTEST) signed by
Dr Goodluck Ebele Jonathan GCFR (Former President)
Commander-In-Chief of the Armed Forces of the Federal Republic
of Nigeria on the 30th April, 2014 in Abuja was the first major
attempt by the government of Nigeria to Counter-Terrorism.
Another revised version was recently launched and endorsed by
President Muhammadu Buhari in August 2016 un furtherance of
the fight against terrorism in Nigeria.
The two official security documents on Counter-Terrorism were
published as a guideline or Road map of the Nigerias
government effort at combatant an apparently new phenomenon
in the history of Nigerias security challenges but with the
understanding that terorism in its present form is alien and
relatively new phenomenon in Nigeria, even though terror-related
acts had reoccured in the 1950s in Kano and again in 1982 and
other years down the line as a resul of religious and ethnic
uprisings recorded in several parts of the country.
Counter-terrorism incorporates the practices, tactics, techniques,
and strategies that governments, militaries, police departments,
and corporations adopt to attack terrorism threats or lets both real
and imputed.
The tactic of terrorism is available to insurgents and governments.
Not all insurgnts use terror as a tactic, some choose not to use it
because other tactics work better for them in a particular context.
If terrorism is part of a broader insurgency, counter-terrorism may
also form a part of a counter-insurgency doctrine, but political,
economic and other measures may focus more on the insurgency
than the specific acts of terror. Foreign Internal Defence (FID) is a
term used for programs either to suppress insurgency, or reduce
the conditions under which insurgency could develop. Couterterrorism includes both the detection of potential acts and the
response to related events.

Boko-Haram otherwise known as Jamaatu Ahlis Sumna


Liddaawati Wal-Jihad was a product of the seed of religious
intolerance sown by the Maitatsine religious sectarian uprisings in
parts of the Northern Nigeria in years past and manifesting now.
A number of factors will continue to enable terrorist groups,
militancy and insurgency to grow and survive if not addressed or
contained, they include conflict, instability, aspects of modern
technology and civilization, pervasive ideology, and radicalization
among others, these are variables that will remain an integral part
of globalisation. It is therefore safe to say that the scale of terrorist
threats has the potential to increse and not likely to diminish in the
coming years.
The solution to containing the situation is COUTER-TERRORISM
a process of countering acts related to terrorism by government
response; by forestalling, securing, identifying threats, preparing
towards mitigating, and implementing through its organs in the
NDAs from the public to the private sectors process of monitoring
perceived and seal threats to our national security and lives of the
citizens.
Terrorism is a complex subject to tackle, therefore actions taken
to counter it must include the whole of a society approach.
Considering the uncertainty that revolves around terrorism, it is
difficult and challenging to collect credible intelligence sufficient to
profer holistic preventive measures but it is possible to reduce
the expansion, growth and rate at which radicalisation takes place
thereby containing its increasing effect and making it unpopular.
A Counter-Terrorism Deartment (CTD) was established in the
office of the National Security Adviser (ONSA) in 2011 to focus
exclusively on the emerging insurgency posed by the Boko
Haram Militants and other terrorist groups including the agitators
or ethnic militants like Mend, Avengers, MASSOB, Bakassi
Insurgent groups, Ombatse and any other from various parts of

the country, the overall objective of the CTD is to ensure public


safety through forestalling, securing, identifying, preparing and
implementing Counter-Terrorism processes and measures; which
includes;
*
Identifying: This involves ensuring that all terrorists, militants
or insurgent groups and their sponsors/financiers, and
sympathisers are identified and brought to justice.
*

Preparing: This involves preparing the populace so that the


effect of any possible terrorist attacks could be mitigated.

Forestalling: This involves preventing terrorism or militant


activities in Nigerian soil including engaging the public
through sustained public awareness/sensitization campaigns
and de-radicalization.

Securing: This involves ensuring security of lives and


properties or Nigerians and key National infrastructures
including Nigerian interest within and around the world.

Implementing: This involves devising a functional framework


to effectively mobilise and sustain a coordinated crossgovernmental efforts in the pursuance of a National CounterTerrorism strategy.

COUNTER-TERRORISM PROPONENTS FOR NIGERIA


Apart from Nigerias military might, its National intelligence
network and other security services directed toward countering
terrorism in Nigeria, other factors are very crucial, which does not
involve the use of sophisticated military hardwares and softwares
of the intelligence community deployed by the government.
There is need for a general national security policy directed
towards countering-terrorism and related organised crimes and
NACTEST is apt in addressing same to achieve the said
objectives, Nigeria will invoke both domestic and international
efforts. At National level, the government should focus on

addressing issues which will diminish the ability of terrorists to


operate freely in Nigeria. Priorities in this regard should involve
creating and emphasizing security awareness amongs the
populace, reducing the possibility and ability of terrorist groups to
recruit new members or retain the support of the existing ones.
The goernment will also need to introduce measures that will
deter potential terrorists, properly planned and adequate
resourced preventive measures would reduce the frequency of
attacks.
In order to achieve the said security objectives, the government
will safeguard its citizens, utilities and critical national
infrastructures by reducing their vulnerability to attacks. This will
include strengthening border security, protections of all national
interests, capacity building for the security forces and reducing
risks to transportation systems, crowded places, worship centres
and institutions of learning be it primary, secondary or tertiary.
Another critical objectives is the prevention of terrorist attacks
against Nigeria and her interests through effective detection and
investigation of threats at the earliest possible instance. The
disruption of terrorist operations before they endanger the public
and ensuring the prosecution of theose responsible.
The nation shows be prepared ready to manage and minimized
the consequence of a terrorist attack where it cannot be stopped
and increase resilience for an immediate recovery from the
aftermath of attack where it occurs through mitigation, and
National Emergency Service deployed. This will include
identification of potential risks from terrorism and assessing their
impact especially at key points and vulnerable points and capacity
building in response to threats and regular preparedness.
In the area of the security forces and other agencies, various
elements will have to act together and cooperate in respective of
their statutory tasks to deal with complex threats. This will require

partnerships across the public sector the police, emergency


services, local, state and federal government agencies as well as
private sectors and voluntary organisations.
It is crucial and expedient that the nation beef up its technological
and human capacities in areas such as surveilance, monitoring,
tracking, de-radicalisation, media campaigns, public education
and re-orientation and improve readiness for dailogue.
UK APPROVED COUTER-TERRORISM WEAPONS
For Counter-Terrorism operations, the Special Assault Sound
(SAS) Assaulters favours the HKMP5 sub-machine gun and the
sig saver P226 Pistol. The 9mm fired by these weapons is ideal
for CQB as it will not usually pass through a target or wall.
Other weapons include a remington shotgun loaded with hattan
rounds designed to shoot off doors hinges without putting the
hostages at risk.
SAS snippers use L96a1 bolt-action riffles and scoped G3 riffles,
they will normally deploy with a riffle fitted with day and night
scope. A selector is attached to the riffle and is wired to a radio
unit which transmits to special receiver and display unit monitored
at the CCC HQ element.
The SAS snipper presses the selector to indicate his readiness to
fire on a given target.
SAS CT CLOTHING
SAS Assaulters wear specialised clothing to protect and assist
them during a Counter-Terrorism operation which consists of ;
flame retardant carbonised viscose undergarments.
One piece assault suit made of flame retardant Nornex 3.
Fire proof knee and elbow pads
Bullet proof armoured waistcoat designed to stop a round
and also absorb its kinetic energy.
ceramic armour plates covering the front, back and groin.

ac 100 armoured helmet able to stop a 9mm round at close


range.
Sf 10 respirator providing protection against CS and CN gas
and smoke.
radio harness-each assaulter is wired with radio mic and
earpiece

Breaching Gear
SAS Assaulter teams will employ sledge-hammers, battering
rams, pneumatic tools and explosives to make entry into terrorist
stronghold. The SAS also employ ropes when either fast-roping
down from helicopters or abseling down the side of buildings.
Pneumatic Door Openers
Those devices use compressed air to power cutting or levering
gear and are used to cut through locks or prise open doors.
Wall Breaching Canon (Harrey Wall Bangers)
The Harrey wall banger fires a water-filled plastic projectile at high
velocity against a wall, causing a breach. The projectile is
designed to immediately lose all kinetic energy once the breach is
made. It is as much safer method of breaching than using
explosives which can put hostages at risk.
ASSAULT PLATFORMS
The SAS Couter-Terrorism Team has several 4 x 4 vehicles
(Land Rovers and Range Rovers) or other designed suited for the
operation, these specially modified vehicles are kitted out with
secure communications and can be fitted with assault platforms.
SAS assaulters can be driven at high speed up to the terrorist
stronghold, be it a building or plane, the men either clinging onto
the side of the 4 x 4s on special hand-holds.
PLASTICUFFS
SAS CT Assaulters also carry plasticuffs plastic ties for quickly
securing prisoners and hostages.

COUNTER-TERRORISM EQUIPMENTS
*
ORION NJE4000 NON-LINEAR JUNCTION INJECTOR
Provides the capacity to detect hidden electronic devices,
whether the fence is radioacting, hardwired, it is the latest
advancement in non-linear junction defection and evaluation
for I EDD & EDD purposes.
*

LOCATOR M/S MILITARY N.L.J.D;


The military specification locator seeks out active and
passive electronic circuitry, such as may be found in
electronic tuning devices, or remotely controlled radio
receivers.

DENSITY DETECTOR
It is a portable, lightweight instrument that indicates the presence
of hidden material by signalling unespected change in the density
or thickness of a surface e.g. An empty tyre filled with air will
register a lower reading than one filled with explossives or other
chemicals.
ELEMENTS OF COUNTERING-TERRORISM
Most counter-terrorism strategies involve an increase in standard
police and domestic intelligence which falls within the preview of
the civil-police, military police of the Army, Airforce and Navy
whose central activities among others are traditional interception
of communications and freeing of persons in a process of
intelligence cycle management, intelligence analysis, Humint and
counter-intelligence to be enforced by the intelligence department
of the military and the civil-police and other agencies directly
responsible for intelligence development.
HUMAN-RIGHTS PERSPECTIVE
One of the primary difficulties of implementing effective counterterrorist measures is the warning of civil liberties and individual
privacy that measures often entail, both for citizens of, and for
these detained by states attempting to combat terror. At times,

measures designed to tighten security have been seen as abuses


of power or even violations of human rights.
Examples of these problems can include prolonged,
incommunicado detention without judicial review, risk of
subjecting to torture during the transfer, return or extradiction
ofpeople between or within countries and the adoption of security
measures that restrain the rights or freedoms of citizens and
breach principles of non-discrimination. Human rights advocates
argue for crucial role of human rights protection as an intrinsic
part to fight terrorism. This suggests, as proponents of human
security have long argued, that respecing human rights may
indeed help us to incur security.
Democratic principles and values are essential tools in the fight
against terrorism. Any successful strategy for dealing with
terrorism requires that terrorists be isolated.
PRE-EMPTIVE NEUTRALIZATION
Some countries see preemptive attacks as a legitimate strategy.
This includes capturing, arrest, killing or disabling suspected
terrorists before they can mount an attack. Israel, the United
Kingdom, the Inited states, and Russia have taken this approach,
while western European states generally do not.
Another major method of reemptive neutralization is interrogation
of known or suspected terrorists to obtain information about
specific plots, targets, the identity of other terrorists, whether or
not the interrogation subjects himself is guilty or terrorist
involvement.
Sometimes some extreme methods are used to increase
suggestibility, such as sleep deprivation etc.
NON-MILITARY APPROACH
The human security paradigm outlines a non-military approach
which aims to address the enduring underlying inequalities which

fuel terrorist activities. Causal factors need to be delineated and


measures implemented which allow equal access to resources
and sustainability for all people such activities empower citizens
providing freedom from fear and freedom from want.
This can take many forms including he provision of clean drinking
water, education, vaccination programs, provision of food and
shelter and protection from violence, military or otherwise.
Successful human security campaigns have been characterised
by the participation of a diverse group of actors including
governments, NGOs, and citizens.
Foreign Internal Defence (FID) programs provide outside expert
assistance to a threatened government. FID can involve both non
military and military aspects of counter-terrorism.
MILITARY APPROACH
Terrorism has often been used to justify military intervention in
countries like Pakistan where terrorists are said to be based. That
was the main stated justification for the US invation of
Afghanistan. It was also stated justification for the second
Russian invation of chechnya
Military intervention has not always been successful in stopping or
preventing future terrorism, like the Malayan Emergency, the Man
Man Uprising, and most of the campaigns against the IRA during
the Irish civil war, other military actions against terrorism can
distrupt a terrorist groups operations temporarily, it sometimes
does not end the threat completely.
Thus repression by the military in itself (particularly if it is not
accompanied by other measures) usually leads to short term
victories, but tend to be unsuccessful in the long run e.g (The
Frenchs doctrine described in Roger Trinquiers book modern war
used in Indochina and Algeria).

Howeer, new methods such as those taken in Iraq have yet to be


seen as beneficial or ineffectual.
PREPARATION
Police, fire, and emergency medical response organisations and
other para-military bodies have obvious roles. They are called the
first responders who have plans for mitigating the effects of
terrorist attacks, although police may as well deal with the threats
of such attacks
TARGET HARDENING
Whether the target of terrorists, there are multiple ways to prevent
the terrorists from hitting the mark, or reducing the damage or
attacks. One method is to place Jersey Barrier or other sturdy
obstacles outside tall and politically sensitive buildings to prevent
car and track bombing.
Aircraft cockpots are kept locked during flights, and have
reinforced doors, which only the pilots in the cabin are capable of
opening. In UK railway stations remove rubbish bins in response
to envisaged threats from Provisional IRA as convenient locations
for depositing bombs. The removal of dustbins are precautionary
measures, bomb-resistant barriers can also be deployed.
A more sophisticated target-hardening approach must consider
industrial and other critical national infrastructures that could be
attacked. Terrorists need not import chemical weapons, if they
can attack industries or other critical national infrastructures.
Industrial chemicals in manufacturing, shipping and storage gas
need greater protection. To put this risk in perspective, the first
major lethal chemical attack in WW1 used 160 tons of chlorine
industrial shipments of chlorine widely used in water purification
and chemical industry, travel in 90 or 55 ton tank cars or vehicles.
COMMAND AND CONTROL
In North America and other continents, and most recently in
Nigeria, for a threatened or completed terrorist attack, the incident

command system (ICS) is apt to be invoked to control the various


services that may need to be involved in the response. ICS has
varied levels of escalation, such as might be needed for multiple
incidents in a given area e.g 2005 bombings in London or the
2004 Madrid train bombings, Nyanya bombing in Abuja or the
attempted bombing of the Eagles square or all the way a National
Response Plan invocation of national level resources in issues
like Nuclear, biological, radiological or large chemical attack.
DAMAGE MITIGATION
Fire services, are perhaps supplements by public works agencies,
utility providers, heavy construction contractors are most apt to
deal with the physical consequences of an attack.
LOCAL SECURITY
Again the local security in conjunction with the Police NSCDC can
isolate the incident area, reducing confusion, are specialised
police (EOD) Unit can conduct tactical operations.
MEDICAL SERVICES
Emergency medical services will bring the more seriously affected
victims to hospitals with the help of FRSC, NSCDC and Police
which will need to have mass casualty and triage plans in place.
Public health agencies from local to national level, may be
designated to deal with identification, and sometimes, mitigation,
of possible biological, or chemical attacks or sometimes
radiological contamination etc, the following are recorded counterterrorist actions of the 20th century.
TACTICAL UNITS
Today many countries have special units designated to handle
terrorist threats. Besides various security agencies, there are elite
tactical units or special missions units, whose role is to directly
engage terrorists or prevent terrorist attacks.

Such units perform both preventive actions, hostage rescue and


responding to on-going attacks. Countries of all sizes can have
highly trained counter-terrorism teams referred in Nigerian as
(CTU). Tactics, techniques and procedures for manhunting are
under constant development.
These units are specially frained in tactics and are very well
equipped for such operations with emphasis on stealth and
performing the mission with minimal casualties. The unit include
takeover force (assault teams), snippers, EOD experts, dog
handlers, intelligence officers, and NSCDC, Nema, and other
para-services responsible for counter-terrorist operations, the
military is always the last resort in counter-terrorism operations in
most countries, this help in upgrading other agencies in
performance operations.
DESCERNING ANTI-TERRORISM SYSTEM
The scope of Anti-terrorism systems is very large in physical
terms (long borders, vast areas, traffic volumes, in busy cities etc)
as well as in other dimensions, such as type and degree of
terrorism threat; political and diplomatic ramifications, legal
issues. The system should bring together diverse state-of-the-art
technologies to enable persistent intelligence, surveilance and
reconnaisance missions, and enable potential actions. For every
anti-terrorism system designed it should incorporate flexibility to
take care of future uncertainty.
In Nigeria the office of the National Security Adviser (ONSA) and
the department of state services (DSS) are responsible for
designing Anti-terrorism system while other security forces are
coopted, at tactical and strategic levels of operations under the
overall supervision of the National Security Adviser. (NSA), Chief
of Defence staff (CDS) other Service Chiefs.
In other parts of the world we have notable Counter-Terrorism
Agencies as follows;

RE

You might also like