Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Defeating Terrorists on the Waterfront (serious & informational)
Information Warfare Site ^ | June 3, 2004 | James Pelkofski, U.S. Navy Commander

Posted on 06/03/2004 8:45:39 PM PDT by FairOpinion

This article by Commander James Pelkofski, U.S. Navy, commanding officer of the USS Deyo (DD-980), was published in the June 2004 Proceedings, a U.S. Naval Institute magazine, and is in the public domain. No republication restrictions.)

(begin byliner)

Defeat al Qaeda on the Waterfront By Commander James Pelkofski, U.S. Navy

(Fighting terrorism involves efforts on many fronts. One of the most vital for the Navy is guaranteeing the safety of harbors, piers, and ships pierside. Anticipating how terrorists will attempt to exploit the Navy's vulnerabilities on the waterfront is key to defeating them.)

Stealing a page from Sun Tzu, al Qaeda preaches to its disciples the value of knowing your enemy. Terrorists instruct that "winning the battle is dependent on knowing the enemy's secrets, movements, and plans."(1) Sun Tzu's timeless edict of knowing the enemy applies equally well for developing successful Navy antiterrorism/force protection measures.(2)

Knowing al Qaeda

A review of the al Qaeda attacks against U.S. embassies in Africa in 1998 and against housing complexes in Saudi Arabia in 2003 reveals operations that unfold in discernible sequential and complementary phases within a compact operational timetable. The operational objective in each attack was the successful delivery of a primary explosive payload.

In the attack on the U.S. embassy in Nairobi, Kenya, a truck carrying explosives approached the main embassy gate, possibly posing as a delivery vehicle. It was redirected by guards to a back gate. There, a gun and grenade attack on security personnel by as many as three assailants preceded the explosion that destroyed the embassy.(3) The preliminary gun and grenade assault ensured the primary weapon, the truck bomb, was delivered into the compound with devastating effect.

The 12 May 2003 midnight attacks on three housing complexes in Saudi Arabia displayed greater sophistication. In these synchronized operations, al Qaeda operatives dressed as Saudi National Guardsmen and driving vehicles typically used by Guardsmen approached security personnel manning the entrances at the compounds. When asked for identification, the terrorists engaged the security personnel with automatic rifles, opened the gates and drove explosives-laden vehicles through, detonating their bombs well inside the complexes.(4)

The al Qaeda attack on a gated housing community in Riyadh, Saudi Arabia, on 9 November 2003 combined diversion and deception. The diversion was an initial assault by gunmen who advanced and fired on Saudi guards. Then, terrorists dressed as police officers, driving in what resembled a police vehicle, approached the gates and claimed to be reinforcements sent to combat the attack. Once inside the compound, the terrorists detonated their car bomb.(5)

According to terrorist documents, "special operations" such as these are divided into three "integrated and inseparable" stages: research, planning, and execution.(6) A closer review, however, reveals four phases in al Qaeda operations:

Operational Surveillance. During this phase, which can take weeks or months, al Qaeda seeks "precise information" on a target's patterns, behaviors, routines, and defenses.(7) Using this information, al Qaeda plans and prepares for the attack. For example, the October 2000 attack on the USS Cole (DDG-67) in Yemen was preceded by months of operational surveillance from an apartment overlooking Aden harbor.(8)

Target Approach. The attacks on the Saudi housing complexes demonstrated how al Qaeda could use deception to advance on a target and cause security personnel to relax their defensive posture. Alternatively, as demonstrated at the Nairobi embassy in 1998, operatives might attempt rapid entry past a target's defenses with speed and force. The November 2003 attack on Saudi housing complexes combined deception with rapid entry to approach and clear defenses quickly. Common to the deceptive techniques are the use of uniforms and vehicles that either are or look official.

Initial Assault. The initial assault occurs during or on completion of the approach and is designed to soften, if not defeat, the target's defenses and open the way for delivery of the primary attack. In addition, this assault might serve to divert security forces and reinforcements from combating the primary attack.

Primary Attack. The primary attack, usually some type of vehicle-borne explosive, might be delivered in the same vehicle carrying the initial assault team or in a separate vehicle. The attack typically occurs along the same vector as the target approach and initial assault, although attacks from alternate or even multiple vectors cannot be discounted.

Beware the Head Fake

The attack on the Cole during a fuel stop in Aden reinforced for the U.S. Navy the painful lesson of controlling the water space around its ships, even in an ostensibly friendly or benign environment. Although al Qaeda succeeded against the Cole, it is now unlikely that a hostile boat will again get so close to a large U.S. Navy ship simply by appearing innocent, friendly, or official amid traffic in a busy port. No doubt, al Qaeda will explore new methods.

Possible future attack scenarios are limited only by the nefarious imaginations of terrorists. In the basic situations outlined below, a key point is the distinction between the initial assault and the primary attack phases. Like the head fake familiar to football and basketball players -- feigning movement in one direction so the opponent is enticed to commit toward the feint and then moving quickly in the other direction -- the terrorist head fake could be a diversionary assault on a pier gate or pier guards while the primary attack is delivered from a seaside vector by small boat or a swimmer. Alternatively, no head fake would be necessary in a direct assault that forcibly opens access to the pier for a primary attack by a truck or car bomb that detonates its payload near a ship.

A seaborne approach to a ship at pierside could completely bypass the base entry gates and pier gate by conducting a more sophisticated deception during the target-approach phase, similar to what was first suspected in the Cole attack. Early reports suggested the small boat that attacked the Cole gained access by operating among and possibly posing as one of the harbor workboats assisting with mooring and refueling preparations.(9)

Though apparently not the case in the Cole attack, a well-disguised or even hijacked harbor tug or workboat could cause enough uncertainty to delay a ship's force-protection response and allow a boat to approach close enough to detonate a potent payload. Terrorist teachings cite historical examples of commercial ships used as decoys to get close to enemy warships before opening fire with hidden guns.(10)

A ship under way, though less vulnerable, is not invulnerable. In the midst of heavy or even moderate traffic in a harbor, channel, or strait, a terrorist boat sufficiently disguised or at least inconspicuous could attempt an approach through a slow, nonthreatening closing movement. By appearing innocent and engaging in amiable communications and discussions regarding intentions, terrorists could defer requests to alter course and remain clear -- essentially approaching in plain view close enough to conduct a successful attack. Alternatively, the same stratagem of a disguised or inconspicuous boat movement toward a Navy ship could be exercised in a much shorter operational timeline through a high-speed approach.

The approach to a ship under way could involve, at any time, an initial assault with an assortment of small arms and shoulder-launched weapons to facilitate closing with the ship and conducting the primary attack. Moreover, a target approach and initial assault that serve as a head fake to divert attention from a primary attack conducted from a different axis (or even multiple axes) would only further complicate defending against and defeating an attack while under way.

Do Not Assume Friendly Intent

More imaginative and dangerous scenarios are conceivable, though, fortunately, not so simple to plan or execute. There are two important points. First, regardless of whether a ship is in port or under way, the threat sector is 360° and involves surface, subsurface, and air dimensions. Second, it is imperative when detecting and defeating terrorists not to assume friendly intent. In more traditional wars, the U.S. military shapes a battle space extended out as far as possible to allow for early detection of hostile intent. Against al Qaeda, however, the U.S. Navy operates in a much more limited -- and vulnerable -- attack space.

In this confined space, establishing hostile intent requires avoiding assuming friendly or innocent intent. The Israel Navy is aware of terrorist tactics that use emergency calls to lure a navy ship close to a vessel ostensibly in need of assistance but rigged for a lethal explosion -- a stratagem often augmented by the distressed voice of a female caller. Terrorists teach the value of authentic disguises, a masquerade enhanced by terrorists trained to an intimate understanding of the role being played.(11)

Though not a "false emergency" lure, a friendly or at least open invitation to come alongside for a compliant boarding might have been the lure tactic employed in the 24 April 2004 suicide boat attack during a boarding operation by the USS Firebolt (PC-10) in the Arabian Gulf. From what is known at present about the attack that killed two Navy sailors and one Coast Guardsman, the Firebolt's rigid inflatable boat was permitted to come alongside the suicide boat -- an otherwise routine permission.

In today's threat environment, facing a foe unconstrained by rules of engagement or the laws of war and versed in the use of stratagem, Navy force protection requires heavily armed defenses imbued with a healthy skepticism regarding everything not positively and definitively identified as friendly.

"Know the Enemy and Know Yourself"

A study of al Qaeda tactics reveals a meticulous, careful, and educated foe capable of designing multidimensional attacks within a limited attack space. Disrupting, deterring, and defeating an al Qaeda attack requires Navy force-protection measures that address each phase of an al Qaeda operation.

Fleetwide countersurveillance. In today's threat environment, countersurveillance cannot be left solely to skilled but widely tasked intelligence operatives. By operating under a cautious assumption that al Qaeda surveillance is occurring at all times, watch standers can disrupt terrorist operational surveillance simply by remaining alert to what is happening not just around their posts, but beyond the obvious perimeter, lifeline, gate, or fence, and by detecting and taking action on any activity that appears unusual or even too normal. It is important to note that al Qaeda surveillance techniques involve establishing regular patterns of behavior that attempt to mask the surveillance and condition an observer to accept those behaviors as routine and unsuspicious. Therefore, countersurveillance requires healthy skepticism, if not a light dose of paranoia, to avert wrongly assuming friendly or innocent intent for activities that are, in fact, preoperational.

Show-of-force random antiterrorism measures. These measures delay, complicate, and, if completely effective, confound operational surveillance and planning by presenting a constantly changing, complex defense for which no pattern is distinguishable and no weaknesses are evident. Terrorists are taught to continue reconnaissance until shortly before conducting an operation "to confirm that nothing new has occurred."(12) Random antiterrorism measures can complicate and disrupt the detailed planning inherent in such frequent reconnaissance. Furthermore, a side effect is the ability to combat the potentially deadly complacency that can easily infect watch standers who become too familiar with routine and too unaccustomed to change. Although random antiterrorism measures can take many forms, those involving just unusual activity and movement will give observers only brief cause to pause.

Formidable, visible, layered force-protection posture. Show-of-force measures reinforce the objective for any Navy ship, base, or installation to appear too hard to approach and attack. By practicing counters countersurveillance, conducting an aggressive random antiterrorist measures program, adhering strictly to security procedures, and deploying an obvious, layered, and imposing defense, we reduce the likelihood of being targeted, or, if we are targeted, the attack space is extended in our favor.

Training on the head fake. In a violent, chaotic situation, maintaining complete situational awareness, recognizing a suspicious approach, repelling an initial assault, and reserving forces to defeat a primary attack are unlikely unless force-protection personnel are organized and trained on all four phases of an al Qaeda attack. The tendency on the athletic playing field is to go all out for the head fake; do so, and the opponent sprints by. That tendency is only magnified in deadly and confusing attacks where the military and human instinct is to concentrate attention and assets toward defeating the immediate and obvious threat.

As a commanding officer, I used the analogy of the head fake to inculcate in my crew the fact that the threat sector is all around them, even when an attack is occurring from one direction. That initial assault, though lethal, may be a misdirection and a precursor. As compelling as repelling the initial assault may be (and it must be repelled), maintaining complete situational awareness and reserving forces to repel the primary attack might prevent the destruction or crippling of a Navy ship. Only through training that aspires to capture the chaotic characteristics of a terrorist attack can forces be conditioned and prepared to extend the attack space, avoid falling for the head fake, and establish hostile intent in the face of what otherwise appears benign.

Shoot to Kill

Although posing a challenge both to normal peacetime procedures and the imperative to limit collateral damage, the greatest deterrent to an al Qaeda operation is a defense poised to shoot early -- and shoot to kill -- in the event of any attack. Fundamental to this ability is unquestioned proficiency with the weapons manned by force-protection watch standers. In the 1993 battle in Mogadishu, Somalia, several hundred U.S. servicemen were able to hold off thousands of Somalis because of the U.S. forces' knowledge of their own weapons, specifically in rapidly loading and skillfully shooting those weapons.(13) Al Qaeda needs to know we are fluent in the "dialogue of bullets."(14)

Terrorists who are willing to die for their cause are deterred only by certain failure in the execution of their operation. If force-protection measures meant to disrupt and deter a threat fail, Navy forces must recognize the deceptive and diversionary features of an attack and defeat it through adroit employment of firepower, ensuring the terrorists who attempt an attack die in vain. --------------

(1)Military Studies in the Jihad against the Tyrant, p. UK/BM-76. Available from www.thesmokinggun.com. This 180-page manual was discovered in Manchester, England, in the home of an al Qaeda associate.

(2)Sun Tzu, The Art of War, translated by Samuel Griffith (London: Oxford University Press, 1971), p. 84.

(3)Karl Vick and T. R. Reid, "An Ordinary Day, Then Horror," The Washington Post, 10 August 1998, p. Al.

(4)Glenn Kessler, "Sudden Blasts, Wide Devastation," The Washington Post, 14 May 2003, p. A1; Peter Slevin, "Saudi Bombing Blamed on Al Qaeda," The Washington Post, 10 November 2003, p. A1; Glenn Kessler, "Saudis Tie Al Qaeda to Attacks," The Washington Post, 14 May 2003, p. Al.

(5)Slevin, "Saudi Bombing Blamed on A1 Qaeda," p. Al.

(6)Military Studies, p. UK/BM-71.

(7)Military Studies, p. UK/BM-7l.

(8)Alan Sipress, "Cole Probe Focuses on Three Locations;" The Washington Post, 25 October 2000, p. A22.

(9)Roberto Suro and Alan Sipress, "Navy Revises Initial Account of Bombing," The Washington Post, 21 October 2000, p. A1.

(10)Military Studies, p. UK/BM-17.

(11)Military Studies, p. UK/BM-17-18.

(12)Military Studies, p. UK/BM-73.

(13)Mark Bowden, Black Hawk Down (New York: Atlantic Monthly, 1999).

(14)Military Studies, p. UK/BM-3.

(Commander Pelkofski was commanding officer of the Deyo (DD-989), which deployed in support of Operations Enduring and Iraqi Freedom. He currently serves at U.S. Fleet Forces Command in the operations directorate.)

(end byliner)


TOPICS: Front Page News; News/Current Events; War on Terror
KEYWORDS: alqaeda; homelandsecurity; maritime; threats; usn; wot
Navigation: use the links below to view more comments.
first 1-2021-33 next last
"Shoot to Kill

Although posing a challenge both to normal peacetime procedures and the imperative to limit collateral damage, the greatest deterrent to an al Qaeda operation is a defense poised to shoot early -- and shoot to kill -- in the event of any attack.

If force-protection measures meant to disrupt and deter a threat fail, Navy forces must recognize the deceptive and diversionary features of an attack and defeat it through adroit employment of firepower, ensuring the terrorists who attempt an attack die in vain."

It is an excellent article, analyzes AQ strategy and proposes strategy to defeat them.

1 posted on 06/03/2004 8:45:39 PM PDT by FairOpinion
[ Post Reply | Private Reply | View Replies]

To: FairOpinion; dennisw; SJackson; MeekOneGOP; B4Ranch; TrueBeliever9; Geist Krieger; JohnHuang2; ...
Any waterfronts around your neck of the woods - ping!

-

CLICK HERE

FBI Tips and Public Leads

FBI Seal Graphic

While the FBI continues to encourage the public to submit information regarding the September 11, 2001, terrorist attacks, this form may also be used to report any suspected criminal activity to the FBI.


2 posted on 06/03/2004 9:02:07 PM PDT by Happy2BMe (U.S.A. - - United We Stand - - Divided We Fall - - Support Our Troops - - Vote BUSH)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion
"the threat sector is all around them"

That is not supposed to be new information to any American older than about 8 years old.

That kids grow up without such information, and they expect to "freely" defy making a study of it, as well as comport themselves to self-disciplined training in regard to it, is almost always why, when confronted, are "surprised" and blame somebody else.

I have repeatedly heard people say, that "nobody should have to worry about these things."

Yes, indeed, in heaven.

While on earth, the earlier and more steadily you maintain a regimen of training in preparation for the unexpected attacks upon your self, upon your family, upon your community, and upon your country, the more likely that such a resolve will cause the lurking attackers to try the other, weaker target.

That is your charge as you have been trained in accordance with the responsibility of your parents to inculcate.

Lest you get the wild idea that it is safe for you to pet the lion, swim with the crocodiles, commune with the elephants, read poetry and sing songs to the grizzley bears, and be down at 10th and Vine in the wrong part of town at 2:00 A.M. in the morning.

Now, any and all members of the U.S. Military are charged with the responsibility to be prepared for an attack from anywhere, to think about it, to discuss it, to train for it, to be alert for it.

The work is not merely a "job," nor is our defense from threats foreign and domestic, a "jobs program" where a body may be excused from such responsibilities because of political largesse, left, right, up, backward or "moving forward."

The more aware that you are, the more likely you will survive the worst to come.

The more unaware that you are, the more you force other people to pay the price of your freedom.

The above article is OK to the extent that, it is by an officer who is not asleep at the wheel, but if it is instructive, it is by alerting us to how much there is too much of an ill-prepared audience for it.

3 posted on 06/03/2004 9:21:51 PM PDT by First_Salute (May God save our democratic-republican government, from a government by judiciary.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Happy2BMe; snopercod

I have called the F.B.I., and they are asleep. They are "not in." They are not looking around at the axes of attack, about which the above author has, well, he should, chastise them.


4 posted on 06/03/2004 9:23:16 PM PDT by First_Salute (May God save our democratic-republican government, from a government by judiciary.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Mr. Mojo

Ping!


5 posted on 06/03/2004 9:24:02 PM PDT by NRA2BFree (I am a nobody, and nobody is perfect; therefore, I am perfect.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: First_Salute

There are FBI field offices open 24/7.

http://www.fbi.gov/contactus.htm

The FBI can be contacted twenty-four hours a day, every day. Check out the Field Office Contact Information page for the addresses and phone numbers of the closest FBI office to your locale--as well as links to their web sites.


6 posted on 06/03/2004 9:30:39 PM PDT by FairOpinion (If you are not voting for Bush, you are voting for the terrorists.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: FairOpinion
Al Qaeda needs to know we are fluent in the "dialogue of bullets."

I spent a couple of hours at the range today maintaining my fluency.

L

7 posted on 06/03/2004 9:51:27 PM PDT by Lurker ("Freedom begins when you tell Mrs. Grundy to go fly a kite"-Robert Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion; Squantos; river rat; SLB; archy; wardaddy; Eaker; Jeff Head; risk; neverdem
Great article.


8 posted on 06/03/2004 9:59:10 PM PDT by Travis McGee (----- www.EnemiesForeignAndDomestic.com -----)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion
I did contact them; they are closed.

"Call back in the morning."

I'm in a major metropolitan area; they are closed.

9 posted on 06/03/2004 10:01:22 PM PDT by First_Salute (May God save our democratic-republican government, from a government by judiciary.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Travis McGee; PoorMuttly; Long Cut
Fundamental to this ability is unquestioned proficiency with the weapons manned by force-protection watch standers.

BUMP

10 posted on 06/03/2004 10:19:43 PM PDT by risk
[ Post Reply | Private Reply | To 8 | View Replies]

To: FairOpinion
For what it's worth...the present opposition should be a great training aid for our forces. I can foresee a better prepared military across the board as a result of the lumps we take, and lessons we learn thereby.

Americans rise to the occasion. We do not become "terrorized."
11 posted on 06/03/2004 10:39:46 PM PDT by PoorMuttly (Americans rise to the occasion. We do not become "terrorized")
[ Post Reply | Private Reply | To 1 | View Replies]

To: First_Salute
About two years ago I attended a symposium on terrorism. Most of the people were public safety officers and private security company management. All were there to try and fathom a threat that they were unfamiliar with, and might be coming their way. I was there because I was just interested. I'm retired, I can do that. I had already experienced security measures from merchant ship service in Viet Nam, Desert Storm and eco terrorist and pirate threats in between. I also had some time on our local police reserves 20 years prior.

A couple things I was able to add to the discussion.
One, normal police procedures work. Diligent watchmen, intelligence work and sharing of information. The security companies did say they had some problems in that area with police agencies.

Two, and here's a biggie, getting ALL personnel to take threats seriously. In fact that seems to be a problem most of the world has. One incident I had left me shaking my head. I had been captain of a ship that had regularly plied pirate waters (they don't bottle that stuff). I was turning the ship over to my relief and going through all the paper work and notes about the operation. I got to the section about piracy protection and was stopped when he told me he had gotten a message that the piracy threat had gone away and he wasn't interested. I knew there were at least two very naive people involved in that message. Well trained people are nice if you can get them. During Desert Storm, one of the ports we went to had pretty poor comercial guard service under normal conditions. To offset the new threat they "doubled the guards". So we got two skinny old men at the gangway instead of one. But the additinal man brought an old shotgun that he held with both hands over the muzzel to lean on. I was impressed.
12 posted on 06/03/2004 10:41:35 PM PDT by Cold Heart
[ Post Reply | Private Reply | To 3 | View Replies]

To: Travis McGee
Kewl Read !! .........I like the way this man thinks ! Lets hope it works as well off the paper it's written on .

Stay safe !

13 posted on 06/03/2004 10:49:17 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: FairOpinion
Great article. I finally found a tag line I like. :) Thanks!

LBT

-=-=-
14 posted on 06/03/2004 11:00:10 PM PDT by LiberalBassTurds (Al Qaeda needs to know we are fluent in the "dialogue of bullets.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion

Ping


15 posted on 06/04/2004 12:34:35 AM PDT by AnimalLover
[ Post Reply | Private Reply | To 1 | View Replies]

To: FairOpinion

bttt


16 posted on 06/04/2004 12:36:59 AM PDT by nopardons
[ Post Reply | Private Reply | To 1 | View Replies]

To: LiberalBassTurds

Great quote! Second on my list (with an addition):

"Shoot early" and often.


17 posted on 06/04/2004 12:47:21 AM PDT by geopyg (Peace..................through decisive and ultimate VICTORY. (Democracy, whiskey, sexy))
[ Post Reply | Private Reply | To 14 | View Replies]

To: FairOpinion; Travis McGee

Thanks for the post and the ping, respectively. I hope the Coast Guard distributes this article, in particular, with respect to seaborne approaches to major bridges and tunnels.

In New York City, they were lucky in cracking a plot to attack the Lincoln and Holland Tunnels under the Hudson River to New Jersey in the mid 1990s. Many, fairly large ships can go 150 miles up the Hudson River.

P.S. If you ever go to NYC, make sure you get to see the Palisade Cliffs of New Jersey on the west side of the Hudson, best seen from the NY side in the parks of northern Manhattan or on the Circle Line boats that make multiple trips around Manhattan every day. It's one of the few reasons to go to NY any more.


19 posted on 06/04/2004 1:20:10 AM PDT by neverdem (Xin loi min oi)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Happy2BMe
Houston would be the closest I guess. A five hour drive from here .....

20 posted on 06/04/2004 3:13:33 AM PDT by MeekOneGOP (There is ONLY ONE good Democrat: one that has just been voted OUT of POWER ! Straight ticket GOP!)
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-33 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson