This document summarizes a presentation given by Johan Obdola on emerging security threats in the Middle East region. It discusses the growing threats posed by terrorism and organized crime, which are becoming more integrated on a global scale through alliances between groups like Hezbollah, drug cartels, and al-Qaeda. These alliances pose challenges for homeland security in the Middle East as well as other regions. The presentation argues for increased intelligence sharing and strategic alliances between law enforcement agencies through organizations like the International Association of Airport and Seaport Police.
1. International Association of Airport and Seaport Police
www.interportpolice.org
...a Global Force
Tuesday, July 24, 2012
2. 2
201
Middle East Homeland Security Summit
A Global Emerging
Security Threat:
Terrorism
Organized Crime
Narcotics
A Strategic Alliance and its
Impact on the Middle East
Homeland Security.
Presented by;
Johan Obdola
Director. Latin America Bureau
... a Geopolitical Intelligence Analysis. Association International of Airport and Seaport Police
InterPort Police
www.interportpolice.org
Abu Dhabi, UAE
Tuesday, July 24, 2012
3. How We Are..
The InterPort Police - International Association of Airport and
Seaport Police - coordinates information sharing, intelligence,
training, best practices and operational issues with member
jurisdictions having responsibility for law enforcement and public
safety at airports, seaports and the transport system within their
nation and community. Since 1968 departments and agencies have
worked together as a Global Force to prevent transnational crime
and terrorism; ensuring public safety of passengers, the supply chain
and critical infrastructure worldwide.
Tuesday, July 24, 2012
4. u rity
Sec
eland
H om
prove
o Im
nci es t
Age
m ent
orce
Enf
Law
ort
upp
dS
t an
A ssis
lice
r t Po
te rPo
In
www.interportpolice.org
Tuesday, July 24, 2012
5. An Emerging Global Terrorist-Criminal Geopolitical
Map...Latin America Region
Al Qaeda a Global Movement with operative cells in Latin America and the Caribbean.
Hezbollah and Hamas Bases in Latin America
In July 18th, 1994, A terrorist attack conducted by Hezbollah in Argentina, killing 85 people
and wounding a couple of hundreds.
Iran Strong Alliances with Venezuela, Bolivia, Cuba, Nicaragua, Ecuador and Argentina
Quds - Iran Elite Revolutionary Guards (IRGG-DF) operate in Venezuela providing regional
trainings.
Iran developing Uranium projects in Venezuela and Bolivia, with the support of Cuba.
Ciudad del Este (Tri-Border Area: Paraguay, Brazil and Argentina. A heaven spot for
international terrorist groups. Hezbollah receives around US$10 million dollars annually from
narcotics operations.
Hezbollah has established alliances with drug cartels from: Mexico, Colombia and other
Regional Criminal Organizations in Central America and the Caribbean.
“In 2001, American troops entered Kandahar, and the international press followed close on their heels. Reporting from
a house in Kandahar used by Al-Qaeda, CNN correspondent Christiane Amanpour displayed a picture poster of the
Iguazu Falls: „While we were scouring this now-abandoned house, we came across this picture on the wall. These are
the falls of Iguazu in Brazil, and this is where US intelligence officials say they‟ve identified terrorist cells that they say
are linked to Osama bin Laden and the Al Qaeda network.‟ Not only had Al-Qaeda become a known global actor, but so
too had the Tri-border area.”
- Thomaz Guedes da Costa
www.interportpolice.org
Tuesday, July 24, 2012
6. Violence Relate to Crime, e nce
Vio l ia
claims hundreds of lives in te d Co lo m
b
ug Rela
Latin America an the aica Dr
Jam
Caribbean every month
LA
VE NEZUE
do r
E l Salva
BRA
ZIL
ce
Vio len
orism
l-Ter r
C rimina
Mexico
www.interportpolice.org
Tuesday, July 24, 2012
7. An Emerging Global Terrorist-Criminal
Geopolitical Map
i Preventing TERRORISM: Detection - Protection - Prevention - Response www.interportpolice.org
Tuesday, July 24, 2012
9. Emerging Threat to Homeland Security
in the Middle East
Nearly 60% of cocaine sold in Europe transits through weak West African states such: Niger,
Mauritania, and Guinea Bissau. Since 1990, this region has been used drug trafficking.
West African region and expading to the east, are becoming a haven for a shadowy group called Al
Qaeda in the Islamic Magherb (AQIM). There are indications that terrorist groups and Latin America
drug cartels are working together.
Executives Jets, Twin Engine Turboprops, and aging Boeing 727s (carry up to 10 tons) are
crossing the Atlantic with drugs.
The Globalization of Terrorism is now linked links Colombian FARC, Hezbollah, Russian Organized
Crime, Uranium with AK-103s, and cocaine with oil.
Hezbollah has established alliances with Central America criminal gangs, Mexican drug cartels
and organized crime, Colombian drug cartels and other regional criminal groups.
Afghan heroin has been a strategic financial resource for the Taliban, al Qaeda and its affiliate in
Pakistan, Central Asia, Africa and Latin America.
In the last few years, governments El Salvador, Honduras, Mexico and Central America are on
alert as evidence grows that al Qaeda members are travelling in that region and looking for recruits to
carry out attacks in Latin America, the potential last frontier for international terrorism. The Brazilian
government has reported that al Qaeda members have established an active presence in South
America’s largest country, as have militants associated with Hezbollah.
www.interportpolice.org
Tuesday, July 24, 2012
10. Emerging Threat to Homeland Security
in the the UAE, Kuwait, Qatar, Saudi Arabia
Extremism in Yemen, regional tension and new geopolitical developments in the region, and the new
emerging-integrated-alliance-globalized of criminal and terrorism organization (West-East) will
establish new security challenges to the UAE, Kuwait, Qatar, Saudi Arabia and other countries in the
region.
Quoting: The rise of AQAP poses the risk of radicalization among immigrants entering the UAE from Africa through Yemen,
said Marie Bos, the group's chief Gulf analyst and a former researcher on the UN Development Programme in the UAE.
"Yemen is an open door to the region so you have a lot of people coming from the horn of Africa through Yemen, hoping to
make it in the Gulf states", she said. That was part of the impetus for Saudi Arabia signing a deal last year to build a security
barrier on the Yemen border, she said.
Umar Farouk Abdulmutallab, a Nigerian who tried to blow up an airliner bound for Detroit last month, had studied in Yemen
before moving to Dubai early last year, returning to Sana'a in August where he allegedly planned the attack. Paul Burke, a
terrorism and security expert based in Abu Dhabi, agreed that the radicalization of immigrants arriving through Yemen was
a potential concern. Authorities had to watch out for two types of people, he said - those with a predisposition towards
st
extremism, and those likely to be influenced by other extremists. st-Ea e
t ics: W
Narco
Key Issues: and
es
Immigration ll ianc
ri sm A
Trade t erro
, New
Investment C rime
Impact: an ized
e Org
Transportation from th
p act
Borders
and Im
Structures t ions
Im plica
rity
Secu www.interportpolice.org
Tuesday, July 24, 2012
11. Emerging Threat to Homeland Security
in the the UAE, Kuwait, Qatar, Saudi Arabia
As the central leadership of Al-Qa’ida is weakened and challenged, the terrorist movement is
looking to partnerships in Saharan and Sub-Saharan Africa to re-group and re-energise itself.
Despite greater co-operation, there seems to be an unresolved tension between transnational aims
of Al-Qa’ida-core and the local grievances of African partners.
Following the alliance with Al-Qa’ida-core, regional affiliates such as Al-Qa’ida in the Maghreb and
Al-Shabaab have undergone similar patterns of strategic, tactical and propagandistic evolution.
Nigeria’s Boko Haram is still focused on a local campaign, but recent operational refinement and
ability to stage deadly ‘spectaculars’ suggests disturbing connections with other regional terror groups.
Links between Al-Qa’ida-core and some jihadist groups in Africa have been established over the
last decade which vary in strategic and operational significance.
The focus of anti-jihadist counter-terrorism is shifting to Africa. Western intelligence and security
services understand what is happening in Pakistan, in the Maghreb and in Yemen, even if they cannot
do very much about it. But counter-terrorism officials privately acknowledge that they are unsighted
and are working hard to try to understand how far the jihadist challenge may be migrating to Somalia,
Kenya, north Nigeria and the borderlands of some of the vast territories of West Africa.
www.interportpolice.org
Tuesday, July 24, 2012
12. Emerging Threat to Homeland Security
in the the UAE, Kuwait, Qatar, Saudi Arabia
Af rica
The jihadist challenge constantly evolves. As yet, it is unclear whether the Al-Qa’ida-core is making a
conscious effort to re-group and reconstitute itself in the Horn and across sub-Saharan Africa; or whether
events represent displacement as Islamist groups fighting for a variety of different causes espouse a loose
version of the global caliphate ideology and co-operate on an ad hoc basis. Either way, Africa represents a
potential new front for counter-terrorism in Britain and the linkages already evident across the continent
suggest the development of some disturbing new trends.the merger2 between Al-Qa’ida-core and Al-
Shabaab – officially endorsed by Al-Qa’ida leader Ayman Al-Zawahiri in February 2012 – has been viewed
as the final stage of a progressive alignment between the two groups that has been taking place over the
last four years.Al-Qa’ida may now see the opportunity to do so in some of the most unstable African
countries, by ‘playing local’ through its proxies. It is a strategy that the group is already testing in Yemen,
where ‘Al-Qai’da in the Arabian Peninsula’ has recently undergone a ‘re-brand’ operation allegedly aimed to
win over local tribes in the south of the country.4 Instead of violently coercing support from the local
population, the group is trying to do so by providing vital public services and by appealing to the religious
sense of those who would embrace a more hard-line application of Sharia law in the country. Far from
merely being a goal in itself, Al-Qa’ida in the Arabian Peninsula views the establishment of a solid
stronghold in Yemen as necessary to resume its broader terror campaign against the West.
www.interportpolice.org
Tuesday, July 24, 2012
13. An Emerging Global Terrorist-Criminal
Geopolitical Map
M ESIIC
Establishing an Integrated-Coordinated Middle East Inter-Governmental
Strategic Integrated Intelligence Centre MESIIC to deal with Airports,
Seaports and Borders will Impact on Homeland Security
MESIIC, Airports, Seaports and Border Regional Intelligence www.interportpolice.org
Tuesday, July 24, 2012
14. ted ...
reven
beP
It c an
Counterterrorism| Aviation | Maritime | Crisis Management | Explosive & X-Ray | Media.
Our training programs are designed for professional law enforcement, public safety and security personnel. Classes
are held at the Port of Los Angeles Maritime Training Center or the Conference Center in Roslyn, VA adjacent to
Washington, D.C.
Training program may also be held at your jurisdiction and customized based on specific requirements of a
i
department or organization
www.interportpolice.org
Preventing TERRORISM: Detection - Protection - Prevention - Response
Tuesday, July 24, 2012
15. InterPort Police Maritime Training Programs
Los Angeles Port Police
Maritime Law Enforcement
Training Center
Available POST Certified Courses
Basic Maritime Officer’s Course
Intermediate Maritime Officer’s Course
Public Safety Dive Course
Courses Pro
Advanced Maritime Officer’s Course
Advanced Tactical Maritime Officer’s Course
Port Security
www.interportpolice.org
Tuesday, July 24, 2012
16. InterPort Police Assistance Programs
InterPort Police offers a wide portfolio of specialized training, assistance programs and services in the following areas:
Bridge and Tunnels. Brides and Tunnels are a critical asset to the supply system within a country. Some port authorities have jurisdiction over these
infrastructures or work closely with an adjacent jurisdiction as they are vital in moving people and cargo, thus they become a high target and require security
protection
Buses. Buses are part of the mass transit system, both public and private operations. Security has played a significant part of the everyday system since 9/11. Buses
have been a source terrorism around the world. There has also is significant domestic and transnational drug trafficking within bus systems.
Border Management. Borders are the front lines when it comes to protecting any country against terrorism, narcotics smuggling and economic instability.
Proactive requirements strengthen the front lines ensuring a safe future tomorrow. The strengthening, expansion or reorganization of law enforcement specialties
such as Border Police, Customs, and Immigration to support strong borders and ports of entries are increasingly in demand throughout the international community.
Airports, seaports and many of our transport systems at the front line of the international boarders. Who has primary responsibility differs depending on the country.
Today technology is playing an increasing role is assisting law enforcement manage border requirements.
Cruise and Ferries. Passenger ferryboats and cruise ships have their own set of challenges when it comes to security. Security while in port or when underway at
sea bring different situations. Ferries are often an essential part of mass transit while curse ships are an vacation option that can place two or three thousand
passengers at risk at onetime.The InterPort Police - International Association of Airport and Seaport Police - holds consultative status with the IMO and sits on the
security committee. Currently we are working on a facilities management report on Piracy relating to crime investigation and armed security guards.
Airports. Large numbers of people pass through airports every day. This presents potential targets for terrorism and other forms of local and transnational crime.
Similarly, the high concentration of people on large airliners, the potential high death rate with attacks on aircraft, and the ability to use a hijacked airplane as a lethal
weapon may provide an alluring target for terrorism.
Public Safety. The protection of the traveling public, the safety of the supply chain and the securing of critical infrastructure is the main stay of our jurisdiction's
responsibilities. Together as a Global Force our department member have the responsibility of protecting their nation's and communities airports, seaports and
transport systems. Working together the international link of cooperation and mutual programs makes a stronger security network.
Transit. Any nation’s railroads, both passenger and freight, are important pieces of the transportation network. The London subway and Madrid rail bombings
demonstrated the critical need for protecting trains from terrorist attack. Focuses greater information sharing, increased training and public awareness is essential.
Seaports. The importance of the container shipping industry is equally matched by its vulnerabilities to terrorist attack. Port security and law enforcement is an
essential mainstay in the protection of the the global supply chain.
Rail.Freight rail are the backbone of transport for many countries. Freight trains are very efficient, with economy of scale and high energy efficiency. They too bring
their own type of security problems as an essential part of the supply chain. Go to a seaport and many airports around the world you will find tracks leading up near
the terminals.
www.interportpolice.org
Tuesday, July 24, 2012
17. InterPort Police 1PASS Program
1PASS Provide a highly secure, ground breaking passive biometric authentication & access system
1PASS is a biometric fusion technology based software system using high-resolution IP cameras to automatically
authenticate identification of an individual in a natural flow. The system offers user based permission, privilege and
attribute protocols and interoperable access control that may be used with any credential or without any credential
whatsoever. This highly secure, non-intrusive system provides immediate event alerts and comprehensive reporting.
1PASS is a state of the art personnel assurance program available to authorities, governments and departments who have
jurisdiction over airport, seaport, transport, border and other critical infrastructure. Offered by the InterPort Police, the
program incorporates biometric fusion technology to authenticate an individual from a combination of facial, speech, and
behavioural recognition using computer software and cameras. No key, card or codes are required. These multiple biometric
elements are integrated within the access control management system of the facility. 1PASS does not require any ID card,
but can incorporate a credential into the protocol. In fact, one conforming credential is sufficient for any environment. The
1PASS symbol can be incorporated on to a credential to alert authorities that an individual is enrolled in the intelligent
solution.
This intelligent level of authentication allows for global interoperability but always requires local permissions for access. We
call this - Global Access - Local Control. The 1PASS program offers a leveraged global interoperable identity and access
assurance system.
1PA
1
2
Identification while in motion, regardless of height, walking or in a wheelchair
Identity of one or more faces in the frame did not degrade performance SS
3 Recognize a face in spite of age and changes in age over an 8-year span of time
4 Recognition regardless of sex or race
5 Recognize a face in spite of changes in a person’s weight, change of hair colour, length or facial growth. The use of eye glasses during
enrolment or upon
6 entry is not a factor in the recognition process
7 Accurately recognizes a real face as opposed to a photograph
www.interportpolice.org
Tuesday, July 24, 2012
18. InterPort Police SRMX Information Sharing Program
SMRX 5.0 is an enterprises RMX offers teams,
system designed to allow departments or even
In our line of work, having a Facebook or similar account may be fine, but you
authorized users work inside a regional jurisdictions
cannot share information about your work. On SRMX you can because
secure collaborative platform. the opportunity to have
everything within SRMX is safe and secure. By keeping your own network to
This powerful tool provides for the same features use in business colleagues it too is private and secure. SRMX keeps your information
connecting other users, and our main platform for
secure and always available in the cloud. PC, PDA, Mac or iPhone, you need
share information. This can your own use and you never get stuck on the outside of a corporate firewall and unable to retrieve
also mean managing projects, can manage the that vital piece of information again.
be part of approval chains, information and users.
collaborate on documents and The SRMX Work Groups
more. SRMX is an information are private and cannot be
edge Base
hain Knowl
portal of the InterPortPolice shared outside of those
ly C
and 5.0 is the fifth platform who are vetted and SRMX Supp
using the Sosius software. approved. However you
SRMX provides for great can have your own The SRMX | KB draws its inspiration from Wikipedia, an online open
flexibility in sharing and product Files, folders, source content provider, and is a repository of information on the
notifications and you do not supply chain. SRMX | KB examines transnational crime, terrorism and
projects, blogs, workflows,
need a phD in Advanced sabotage, illicit trade and smuggling, and theft.
databases, projects, tasks
Networking to be up and and more can all be
running, in just a few minutes. SRMX | KB examines the vulnerability of supply chains and its constituent
created or uploaded and
You also can set your daily elements (infrastructure, property, people, operations) to harm. This harm
then shared amogst other
report to ensure you do not causes unwanted effects that disturbs the effective (successful) and
SRMX if you want further
miss any of the information distribution to the entire efficient (productive) operation of a supply chain. The activity that causes
appropriate to your work. grid. There's no limit to this harm can either be unintentional or deliberate, and legal or illegal.
SRMX also now offer Real- the number of users per Vulnerabilities represent opportunities for criminal and terrorist
time Alert Management. group or the number of activities. It also reviews solutions from stakeholders to law enforcement
Certain Alert Information connections you can and the technology used. Some technology solution are outline throughout
Emails can be answered back make with your free the knowledge base and some of the companies who assisting funding the
to the entire group. This allow account. program are afforded a page to offer more detailed information from their
for real-time situation alert
coordination at anytime. perspective.
www.interportpolice.org
Tuesday, July 24, 2012