Author Topic: Homeland Security, Border, sabotage of energy, transportation, environment  (Read 991154 times)

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1450 on: March 03, 2014, 03:31:39 PM »
Well, I don't know everything -- twas news to me :-)

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Non Nuke EMP
« Reply #1451 on: March 03, 2014, 05:49:26 PM »
« Last Edit: March 03, 2014, 09:37:51 PM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1452 on: March 03, 2014, 06:05:31 PM »
Excellent find GM, as always your google fu amazes.

From what I can tell, it appears that this technology is only available to advanced State actors.

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1453 on: March 03, 2014, 07:02:55 PM »
Excellent find GM, as always your google fu amazes.

From what I can tell, it appears that this technology is only available to advanced State actors.



http://www.israelnationalnews.com/Articles/Article.aspx/13942

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1454 on: March 03, 2014, 09:37:07 PM »
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFK!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!



G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1456 on: March 26, 2014, 08:34:58 PM »
Gee, I wonder how the FBI missed the Boston Marathon bombers, even after being tipped off by the Russians...

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
NYC PD unit disbanded
« Reply #1457 on: April 15, 2014, 04:10:21 PM »
New York Police Unit That Spied on Muslims Is Disbanded

The New York Police Department has abandoned a secretive program that dispatched plainclothes detectives into Muslim neighborhoods to eavesdrop on conversations and built detailed files on where people ate, prayed and shopped, the department said.

The decision by the nation’s largest police force to shutter the surveillance program represents the first sign that William J. Bratton, the department’s new commissioner, is backing away from some of the post-9/11 intelligence-gathering practices of his predecessor. The move comes as the federal government reconsiders and re-evaluates some of its post-9/11 policies, including the National Security Agency’s bulk data collection.

READ MORE »
http://www.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-is-disbanded.html?emc=edit_na_20140415


G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: NYC PD unit disbanded
« Reply #1458 on: April 15, 2014, 08:10:17 PM »
New York Police Unit That Spied on Muslims Is Disbanded

The New York Police Department has abandoned a secretive program that dispatched plainclothes detectives into Muslim neighborhoods to eavesdrop on conversations and built detailed files on where people ate, prayed and shopped, the department said.

The decision by the nation’s largest police force to shutter the surveillance program represents the first sign that William J. Bratton, the department’s new commissioner, is backing away from some of the post-9/11 intelligence-gathering practices of his predecessor. The move comes as the federal government reconsiders and re-evaluates some of its post-9/11 policies, including the National Security Agency’s bulk data collection.

READ MORE »
http://www.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-is-disbanded.html?emc=edit_na_20140415



What could go wrong?

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile



G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
« Last Edit: May 12, 2014, 02:21:57 PM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Steve Emerson says our GM is right
« Reply #1463 on: May 12, 2014, 02:46:51 PM »


Scurrilous NYT Informant Story Ignores Successes
by Patrick Dunleavy
Special to IPT News
May 12, 2014
http://www.investigativeproject.org/4382/scurrilous-nyt-informant-story-ignores-successes
 
Exaggeration is often the tool of a disingenuous person, but when it comes to reporting, there seems to be no bounds. Case in point, the most recent article in the New York Times regarding the NYPD's Counterterrorism program, "New York Police Recruit Muslims to be Informers."

Leaving the facts behind, the reporter goes on a mission to expose what he claims is the improper questioning of individuals arrested and being held in jails. Specifically, he decries the singling out of a specific group of criminals, Muslims.

The article claims that law enforcement personnel changed their focus of questions to home in on a specific area, religion. The writer states, "They [NYPD] showed that religion had become a normal topic of police inquiry in the city's holding cells and lockup facilities."

A new technique of interrogation? I think not. As the former deputy inspector general of the New York State Department of Corrections, I can state emphatically that arrestees have been asked the question "what is your religion" for more than 40 years. It is a core part of the initial intake assessment of an individual about to be admitted to a jail. It goes part and parcel with height, weight, color of eyes, ethnicity, etc.

The writer wants the reader to believe that this type of questioning only began after 9/11.

Why? It goes along with the mantra that Muslims were being singled out arbitrarily by police and intelligence officials when it comes to crime. Not so. I doubt the reporter has ever really sat in on an intake interview of an arrestee. If he had, he would have seen the line of questioning of an arrestee / inmate is founded in the historical fundamental belief by cops, that whenever a crime is committed, either someone in jail did it, or knows who did it. In gathering intelligence on specific threat groups, be they, the Mafia, the Latin Kings, the Chinese Ghost Shadow Gangs, the Russian Mob, etc., you're going to ask a specific group of people about a specific group of criminals, and radical Islamic terrorism is a form of criminal activity. My good friend John Cutter, former deputy chief of NYPD's Intelligence Division, put it most succinctly when he said, "I know we're the police department and we deal with crime, but terrorism is just a higher level of crime, and we have to know about it. If it's in our midst, I need someone to investigate it."

There are numerous examples of successful cases where terrorist acts were thwarted due to intelligence gathered from speaking to an individual in jail.

In the case of the Newburgh Four, now a cause célèbre for some, religion was core to identifying group leader James Cromartie.

Cromartie was a career criminal who had often changed his religious affiliation when he was arrested. Information obtained through a jail intelligence program led to the apprehension of the group before they could bomb Jewish synagogues or shoot down Air National Guard aircraft with Stinger missiles as they had planned.

In regard to whether the question of "what mosque do you attend?" is valid or harassing, it should be noted that several convicted terrorists had ties to specific mosques in the greater New York City area. El Sayyid Nosair, one of the architects of the first World Trade Center bombing, was in contact with those mosques while in both the city jail and Attica State prison.

Rashid Baz, the Brooklyn Bridge shooter, was spurred on to commit his terrorist act after attending the Islamic Society of Bay Ridge's mosque and hearing a sermon encouraging the killing of Jewish civilians.

Edwin Lorenzo Lemmons a former New York inmate was arrested for illegal firearms possession by members of the Joint Terrorism Task Force in Florida after disembarking from a flight from Egypt. Authorities learned of his radicalization and tactical training he received in the Middle East through information directly provided by an individual who had recently been arrested.

Given examples like these, it would seem that the New York Times article overlooks the necessary importance of intelligence gathering and exaggerates to a fault the grievances of a few disgruntled arrestees.

This is another example yellow journalism. Akin to the previous AP articles that sought to diminish the effectiveness of the NYPD's counterterrorism program and tarnish the reputation of the men and women who dedicated their lives to protecting the city against another attack by Islamic terrorists. In that case, the court saw through the exaggeration. Hopefully the public will as well.

Patrick Dunleavy is the former Deputy Inspector General for New York State Department of Corrections and author of The Fertile Soil of Jihad. He currently teaches a class on terrorism for the United States Military Special Operations School.

objectivist1

  • Power User
  • ***
  • Posts: 1048
    • View Profile
NDAA - Voter Apathy Is Killing This Nation...
« Reply #1464 on: May 28, 2014, 05:24:53 AM »
It’s Not Just Obama That’s Screwing America : Congress Reaffirms NDAA

Monday, 26 May 2014 16:27    M.D. Creekmore - www.alt-market.com


This article was written by M.D. Creekmore and originally published at TheSurvivalistBlog.net

That’s right folks, it isn’t just our fearless leader B.O. that’s wiping his butt on the Constitution and the Bill of rights, it’s congress too, and before you go off blaming the democrats, no matter how evil they are, I should point out that this monstrosity against American citizens, was reaffirmed with the support of a majority of republicans – see the full congressional member roll-call and how they voted here.

The “No” votes are votes against amendment  H.Amdt. 676 sponsored Rep Adam Smith (D) to eliminate indefinite detention of American citizens, without due process of law under the NDAA H.R. 4435.

In total 214 republicans voted against amendment  H.Amdt. 676  that would have eliminated the power given to the president and the executive branch allowing for the indefinite detention of American citizens under NDAA without formal charges, or due process of law.

Looking to my state of  TN Republican “representatives” Phil Roe R, Chuck Fleischmann, Scott DesJarlais, Diane Black, Marsha Blackburn, and Stephen Fincher all voted against the amendment that would have eliminated the power of indefinite detention of Americans given to the president under NDAA.

They are an embarrassment to the state of TN and to America as a whole.

What exactly is the National Defense Authorization Act you ask? Well it essentially does away with the constitutionally guaranteed right to a due process and a fair trial by providing the executive branch of government with the power to arrest and detain indefinitely any US citizen, without charge or due process of law.

Via The New Ameriican

One of the most noxious elements of the NDAA is that it places the American military at the disposal of the president for the apprehension, arrest, and detention of those suspected of posing a danger to the homeland.

Furthermore, a key component of the NDAA mandates a frightening grant of immense and unconstitutional power to the executive branch. Under the provisions of Section 1021 the president is afforded the absolute power to arrest and detain citizens of the United States without their being informed of any criminal charges, without a trial on the merits of those charges, and without a scintilla of the due process safeguards protected by the Constitution of the United States.

Further, in order to execute the provisions of Section 1021, Section 1022 (among others) unlawfully gives the president the absolute and unquestionable authority to deploy the armed forces of the United States to apprehend and to indefinitely detain those suspected of threatening the security of the “homeland.” In the language of this legislation, these people are called “covered persons.”

The universe of potential “covered persons” includes every citizen of the United States of America. Any American could one day find himself or herself branded a “belligerent” and thus subject to the complete confiscation of his or her constitutional civil liberties and nearly never-ending  incarceration in a military prison.

What this amounts to is essentially a repeal of the sixth amendment and once again our so-called “conservatives republicans” have showed where they stand, how they stand and what they stand for. Why we keep voting either one of these political parties (republican – democrat / democrat – republican) and their attached evils into office to “lead” OUR country, is beyond me.

Folks we don’t have a two-party system as we’ve been lead to believe. Many Americans think that they have a choice when they enter the voting booth. Well guess what we don’t – republicans and democrats, democrats and republicans what’s the difference? Neither political party actually represents the American people nor do they care about defending individual American rights or the Constitution

In the U.S. we have a one party system masquerading as a two party system, to give voters the illusion of having a choice and hope for change, but both parties are controlled by the same people who really run the country. The system is rigged and we don’t have a choice…

And unfortunately, I don’t expect a third party like The Tea Party to ever take a majority of Congress, the Senate or the Presidency, the people who really run things won’t let it happen or maybe it’s because the American people care more about the next football game or American Idol than what is really happening to OUR country…  Nope Democrats and and Republicans and business as usual…

Want proof, we need to look no further than the recent senate race in KY where “Republican Mitch McConnell Crushes Tea Party Challenger Matt Bevin“… But I digress…

The republicans think that no one will know, remember or care how that they voted on this, prove them wrong. Take a look at your state and write down how each one of your “representatives” voted on this and then you vote to throw them out of office during the next election.
"You have enemies?  Good.  That means that you have stood up for something, sometime in your life." - Winston Churchill.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
POTH: NSA collecting millions of faces from web pages
« Reply #1465 on: June 01, 2014, 07:46:04 AM »
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html?emc=edit_th_20140601&nl=todaysheadlines&nlid=49641193&_r=0

N.S.A. Collecting Millions of Faces From Web Images
By JAMES RISEN and LAURA POITRASMAY 31, 2014


The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.
Photo
Umar Farouk Abdulmutallab, left, who tried to bomb an airplane, and Faisal Shahzad, who tried to set off a car bomb in Times Square. The attempts prompted more image gathering. Credit Reuters; U.S. Marshals Service, via Associated Press

“It’s not just the traditional communications we’re after: It’s taking a full-arsenal approach that digitally exploits the clues a target leaves behind in their regular activities on the net to compile biographic and biometric information” that can help “implement precision targeting,” noted a 2010 document.

One N.S.A. PowerPoint presentation from 2011, for example, displays several photographs of an unidentified man — sometimes bearded, other times clean-shaven — in different settings, along with more than two dozen data points about him. These include whether he was on the Transportation Security Administration no-fly list, his passport and visa status, known associates or suspected terrorist ties, and comments made about him by informants to American intelligence agencies.

It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Given the N.S.A.’s foreign intelligence mission, much of the imagery would involve people overseas whose data was scooped up through cable taps, Internet hubs and satellite transmissions.

Because the agency considers images a form of communications content, the N.S.A. would be required to get court approval for imagery of Americans collected through its surveillance programs, just as it must to read their emails or eavesdrop on their phone conversations, according to an N.S.A. spokeswoman. Cross-border communications in which an American might be emailing or texting an image to someone targeted by the agency overseas could be excepted.

Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University. “There are still technical limitations on it, but the computational power keeps growing, and the databases keep growing, and the algorithms keep improving.”


State and local law enforcement agencies are relying on a wide range of databases of facial imagery, including driver’s licenses and Facebook, to identify suspects. The F.B.I. is developing what it calls its “next generation identification” project to combine its automated fingerprint identification system with facial imagery and other biometric data.

The State Department has what several outside experts say could be the largest facial imagery database in the federal government, storing hundreds of millions of photographs of American passport holders and foreign visa applicants. And the Department of Homeland Security is funding pilot projects at police departments around the country to match suspects against faces in a crowd.

The N.S.A., though, is unique in its ability to match images with huge troves of private communications.

“We would not be doing our job if we didn’t seek ways to continuously improve the precision of signals intelligence activities — aiming to counteract the efforts of valid foreign intelligence targets to disguise themselves or conceal plans to harm the United States and its allies,” said Vanee M. Vines, the agency spokeswoman.

She added that the N.S.A. did not have access to photographs in state databases of driver’s licenses or to passport photos of Americans, while declining to say whether the agency had access to the State Department database of photos of foreign visa applicants. She also declined to say whether the N.S.A. collected facial imagery of Americans from Facebook and other social media through means other than communications intercepts.

“The government and the private sector are both investing billions of dollars into face recognition” research and development, said Jennifer Lynch, a lawyer and expert on facial recognition and privacy at the Electronic Frontier Foundation in San Francisco. “The government leads the way in developing huge face recognition databases, while the private sector leads in accurately identifying people under challenging conditions.”

Ms. Lynch said a handful of recent court decisions could lead to new constitutional protections for the privacy of sensitive face recognition data. But she added that the law was still unclear and that Washington was operating largely in a legal vacuum.

Laura Donohue, the director of the Center on National Security and the Law at Georgetown Law School, agreed. “There are very few limits on this,” she said.

An excerpt of a document obtained by Edward J. Snowden, a former contractor with the National Security Agency, referring to the agency’s use of images in intelligence gathering.

Congress has largely ignored the issue. “Unfortunately, our privacy laws provide no express protections for facial recognition data,” said Senator Al Franken, Democrat of Minnesota, in a letter in December to the head of the National Telecommunications and Information Administration, which is now studying possible standards for commercial, but not governmental, use.

Facial recognition technology can still be a clumsy tool. It has difficulty matching low-resolution images, and photographs of people’s faces taken from the side or angles can be impossible to match against mug shots or other head-on photographs.

Dalila B. Megherbi, an expert on facial recognition technology at the University of Massachusetts at Lowell, explained that “when pictures come in different angles, different resolutions, that all affects the facial recognition algorithms in the software.”

That can lead to errors, the documents show. A 2011 PowerPoint showed one example when Tundra Freeze, the N.S.A.’s main in-house facial recognition program, was asked to identify photos matching the image of a bearded young man with dark hair. The document says the program returned 42 results, and displays several that were obviously false hits, including one of a middle-age man.

Similarly, another 2011 N.S.A. document reported that a facial recognition system was queried with a photograph of Osama bin Laden. Among the search results were photos of four other bearded men with only slight resemblances to Bin Laden.  But the technology is powerful. One 2011 PowerPoint showed how the software matched a bald young man, shown posing with another man in front of a water park, with another photo where he has a full head of hair, wears different clothes and is at a different location.

It is not clear how many images the agency has acquired. The N.S.A. does not collect facial imagery through its bulk metadata collection programs, including that involving Americans’ domestic phone records, authorized under Section 215 of the Patriot Act, according to Ms. Vines.

The N.S.A. has accelerated its use of facial recognition technology under the Obama administration, the documents show, intensifying its efforts after two intended attacks on Americans that jarred the White House. The first was the case of the so-called underwear bomber, in which Umar Farouk Abdulmutallab, a Nigerian, tried to trigger a bomb hidden in his underwear while flying to Detroit on Christmas in 2009. Just a few months later, in May 2010, Faisal Shahzad, a Pakistani-American, attempted a car bombing in Times Square.

The agency’s use of facial recognition technology goes far beyond one program previously reported by The Guardian, which disclosed that the N.S.A. and its British counterpart, General Communications Headquarters, have jointly intercepted webcam images, including sexually explicit material, from Yahoo users.

The N.S.A. achieved a technical breakthrough in 2010 when analysts first matched images collected separately in two databases — one in a huge N.S.A. database code-named Pinwale, and another in the government’s main terrorist watch list database, known as Tide — according to N.S.A. documents. That ability to cross-reference images has led to an explosion of analytical uses inside the agency. The agency has created teams of “identity intelligence” analysts who work to combine the facial images with other records about individuals to develop comprehensive portraits of intelligence targets.

The agency has developed sophisticated ways to integrate facial recognition programs with a wide range of other databases. It intercepts video teleconferences to obtain facial imagery, gathers airline passenger data and collects photographs from national identity card databases created by foreign countries, the documents show. They also note that the N.S.A. was attempting to gain access to such databases in Pakistan, Saudi Arabia and Iran.

The documents suggest that the agency has considered getting access to iris scans through its phone and email surveillance programs. But asked whether the agency is now doing so, officials declined to comment. The documents also indicate that the N.S.A. collects iris scans of foreigners through other means.

In addition, the agency was working with the C.I.A. and the State Department on a program called Pisces, collecting biometric data on border crossings from a wide range of countries.

One of the N.S.A.’s broadest efforts to obtain facial images is a program called Wellspring, which strips out images from emails and other communications, and displays those that might contain passport images. In addition to in-house programs, the N.S.A. relies in part on commercially available facial recognition technology, including from PittPatt, a small company owned by Google, the documents show.

The N.S.A. can now compare spy satellite photographs with intercepted personal photographs taken outdoors to determine the location. One document shows what appear to be vacation photographs of several men standing near a small waterfront dock in 2011. It matches their surroundings to a spy satellite image of the same dock taken about the same time, located at what the document describes as a militant training facility in Pakistan.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile



G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Qualified
« Reply #1472 on: July 07, 2014, 08:17:52 AM »



Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

MikeT

  • Power User
  • ***
  • Posts: 89
    • View Profile
    • Unified Martial Arts
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1476 on: July 10, 2014, 05:10:46 PM »
This clip is a year old, but what I want to know is:  If CBP had their hands full BEFORE they were spending 100% of their time offering up a national welcome, how many OTM's are getting through now?  These guys are willing to strap TNT to their chests and blow themselves up...  I can think of two or three scenarios off the top of my head that I am not even going to articulate that could be very, very serious for our country.  We need a secure border, period.

http://www.mrconservative.com/2013/06/18667-muslim-terrorists-caught-crossing-us-border/



MikeT

  • Power User
  • ***
  • Posts: 89
    • View Profile
    • Unified Martial Arts
Urdu dictionary found at border
« Reply #1479 on: July 14, 2014, 04:33:16 PM »
http://www.theblaze.com/stories/2014/07/14/urdu-dictionary-found-on-texas-ranch-near-border-we-just-dont-know-whos-here-already/


(Woof Mike:  Nice find.  To help future research efforts, please put something descriptive in the subject line, e.g. as I have done for you here-- TIA, Marc)
« Last Edit: July 14, 2014, 05:39:28 PM by Crafty_Dog »


G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Fighting them at home so we do not have to fight them over there
« Reply #1481 on: July 14, 2014, 05:52:11 PM »
http://www.theblaze.com/stories/2014/07/13/the-deadly-combination-in-the-middle-east-causing-extreme-extreme-concern-in-the-white-house/

I'm assuming the explosives they are worried about are TATP or other peroxide based explosives, which have been commonly used by jihadists for decades.

MikeT

  • Power User
  • ***
  • Posts: 89
    • View Profile
    • Unified Martial Arts
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1482 on: July 14, 2014, 06:07:20 PM »
Noted, sorry!




G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile

MikeT

  • Power User
  • ***
  • Posts: 89
    • View Profile
    • Unified Martial Arts
Re: Homeland Security, Border Protection - Grrrrrrrrrrrrrrrrrrrrrrrr
« Reply #1487 on: July 30, 2014, 08:23:06 AM »
 :x

"Why do these boys have so many matches, lighters and pocket knives on them?!!!"

First hand account from the scout troop detained at the Canadian border.  This would be an incredible (yet typical) example of pedantic abuse of power in any context, in light of what is happening at our Southern border it is angering.

http://benswann.com/exclusive-leader-of-scout-troop-confronted-by-armed-border-patrol-speaks-out/


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Bio Bombers
« Reply #1489 on: August 06, 2014, 01:49:11 PM »
The REAL Pandemic Threat: BioBombers
Hope for the Best -- Prepare for the Worst
By Mark Alexander • August 6, 2014     
"A universal peace, it is to be feared, is in the catalogue of events, which will never exist but in the imaginations of visionary philosophers, or in the breasts of benevolent enthusiasts." --James Madison (1792)
 

The 24-hour news recyclers have lately devoted a lot of airtime to the Ebola epidemic in West Africa and concerns about its spread to the U.S.
In recent weeks, more than 1,300 Africans have been infected with the deadly virus, and most of them have died. There would likely not be much coverage of this regional epidemic if not for the fact that two "humanitarian workers" (read: heroic Christians), an American doctor and nurse, are infected with the virus and have been transported to Emory University Hospital in Atlanta for treatment.
The Centers for Disease Control (CDC) has assured Americans that, while Ebola is deadly in each of its variant forms -- it is much like AIDS or HIV -- transmission requires substantial direct contact with an infected person. Of course, given that in the last three months the CDC's stellar status was tarnished by reports that its personnel were very careless with some deadly pathogens -- including anthrax, avian flu and smallpox -- it's understandable many Americans question CDC's assessment of the Ebola risk.
The fact is, CDC's risk assessment regarding the threat of an Ebola epidemic in the U.S. is correct. There is, however, right now, a very real pandemic threat posed by what we can call "BioBombers."
BioBombers are Islamist "martyrs" who, instead of strapping on a bomb and detonating themselves in a crowded urban area, become human hosts for virulent strains of deadly contagions. Once infected, they fly into the U.S. legally and park themselves in major airport hubs around the nation for days, where they can infect others traveling across country whose symptoms may take days to manifest -- which is to say others unknowingly become hosts and spread the virus to a much wider circle in their communities and work places.
For historical background, the greatest mortal threat to indigenous American populations when 15th- and 16th-century European explorers arrived was not from armed conflict with other native peoples; it was from European strains of diseases for which they had no immunity. The reverse was also true -- many Europeans suffered from American diseases.
In the 19th century, of the estimated 620,000 deaths recorded in the War Between the States, more than 430,000 died from "camp diseases." When soldiers and support personnel from different regions of the country congregated in camps, those who arrived with a virulent strain of influenza or other contagion quickly passed it on to others, and the consequences were devastating.
In the 20th century, there were 5.1 million combatant deaths in the four years of World War I, but the 1918 H1N1 influenza virus, commonly referred to as the "Spanish Flu," infected an estimated 500 million people globally, including even those in remote Pacific and Arctic regions. Indeed, as many as 75-100 million people died in that pandemic -- up to five percent of the world's population, in two years.
In World War II, disease in the Pacific campaign claimed far more casualties than combat.
So how have we avoided another devastating Spanish Flu pandemic?
 

We've learned how to restrain the spread of these diseases because of our notable early detection of outbreaks and well-rehearsed preventive measures to contain and isolate the infected. (Early detection and containment is critical when dealing with bacterial and viral infections.)
We have learned a lot from managing outbreaks. In 1976, a bacterial contagion called Legionnaires' disease claimed 29 victims in Philadelphia. More recently, a viral SARS outbreak killed 775 people in 37 countries, most of them in Asia. There have also been recurring concerns about "bird flu," which has been spreading worldwide since 2003 and claimed its first victim two years ago in Canada.
There are also inoculation programs that have helped eliminate the spread of disease, and treatment is much better now than it was in the early part of the 20th century.
But pathogens such as these are decimating if health care providers are slow to recognize the symptoms and correctly diagnose the disease. They can spread quickly if not properly reported to the CDC for entry into its early warning and response protocols. Fortunately, dangerous strains of H5N1 influenza and other flu viruses have not adapted, or mutated, into dramatically more virulent and deadly strains.
But there are plenty of artificially engineered bio-warfare viral strains that, if released into urban population centers, would overwhelm medical facilities and claim millions of casualties. The prospect of bio-terrorism, particularly a simultaneous attack across the nation from a cadre of BioBombers, would quickly overload health care service providers and exhaust pharmaceutical reserves. In the event of such an attack, the CDC's epidemic early warning detection map would not merely blink with one or two markers -- the entire board would light up, and the probability of containment would be lost.
In fact, the possibility of such an attack was the impetus last week for the largest bio-terrorism drill in New York City's history.
So, how real is the threat?
The primary symmetric deterrent to weapons of mass destruction in warfare between nation states is the doctrine of mutually assured destruction. But in asymmetric warfare, where Islamic martyrs serve as surrogates for states like Iran, the MAD doctrine is of little deterrence.
 

The prospect of another catastrophic attack on our homeland by asymmetric terrorist actors is greater now than it was in 2001, and the reason is as plain as it was predictable. But the impact of BioBombers on continuity of government and commerce will be far greater than 9/11.
In his first annual address to the nation in 1790, George Washington wrote, "To be prepared for war, is one of the most effectual means of preserving peace." The eternal truth of those words is plainly evident today.
Indeed, as our nation's erstwhile "community organizer" leads our nation's retreat from its post as the world's sole superpower, the inevitable consequences have been dramatic. Of greatest concern now is the resurgence of the enemies of Liberty, most notably al-Qa'ida jihadists in the wake of the Middle East meltdown (AKA, Arab Spring) in Egypt, Libya, Syria, Yemen and Jordan, and now the disintegration of Iraq and the conflagration in Gaza.
At present, all eyes are on the unabated rise of the nuclear Islamic Republic of Iran, a major benefactor of worldwide Islamic terror. Iran could eventually put a compact fissile weapon into the hands of Jihad surrogates with the intent of detonating that weapon in a U.S. urban center.
But the scope and consequences of a coordinated attack by Islamic BioBombers is far greater than that of a nuclear attack. The impact on continuity of government and commerce will be far greater than the 9/11 attack.
So if the threat of a catastrophic bio-terrorism attack has increased, and if the CDC and our homeland security apparatus are not properly prepared to respond to such an attack (the response to Hurricane Katrina comes to mind), then what can be done?
Fact is, there is a lot you can do to protect yourself and your family in the event of a biological attack on our nation with a little knowledge, preparation and not much expense -- and that preparation will also suffice for other types of emergencies.
 

The bedrock foundation of survival is individual preparedness and being prepared is not difficult. The primary means of protection in a pandemic is sheltering in place. But the Web is flooded with all kinds of preparedness and overwhelming advice from doomsday preppers. But your Patriot Post team has prepared a one-stop reliable reference page with basic instructions and advice.
As a resource to communities across the nation, we convened a knowledgeable team of emergency preparedness and response experts in 2012, including federal, state and local emergency management professionals, and specialists from the fields of emergency medicine, urban and wilderness survival, academia, law enforcement and related private sector services. They compiled basic individual preparedness recommendations to sustain you and your family during a short-term crisis. The result is a Two Step Individual Readiness Plan that enables you to shelter in place in the event of a local, regional or national catastrophic event, including a pandemic.
The most likely scenario requiring you to shelter in place would be the short-term need to isolate yourself from chemical, biological or radiological contaminants released accidentally or intentionally into the environment. (This could require sheltering for 1-7 days.)
But in the event of a bio-terrorism attack setting into motion a pandemic or a panic, you must be prepared to isolate yourself and your family from other people in order not to contract an illness. The best location to shelter in place during such an event is in your residence, and the length of time required could be 1-6 weeks.
Be prepared.
1.   Link to our Disaster Preparedness Planning resource page.
2.   Link to our Two Step Individual Readiness Plan
Pro Deo et Constitutione — Libertas aut Mors
Semper Vigilo, Fortis, Paratus et Fidelis
 
Mark Alexander
Publisher, The Patriot Post

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
Hezbollah supporters in FL
« Reply #1490 on: August 21, 2014, 06:53:37 PM »



ccp

  • Power User
  • ***
  • Posts: 18539
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1493 on: August 22, 2014, 05:55:46 PM »
You mean you don't have to be Kobe Bryant to cut off someone's head with a fishing knife?

Remember when people were scratching their heads wondering why we didn't send the jets in when they were crossing the desert.

It was like have Osama bin Laden in your sights and fail to do anything until it is much harder later.


G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile
Re: Homeland Security, Border Protection, and American Freedom
« Reply #1494 on: August 23, 2014, 05:59:08 AM »
You mean you don't have to be Kobe Bryant to cut off someone's head with a fishing knife?

Remember when people were scratching their heads wondering why we didn't send the jets in when they were crossing the desert.

It was like have Osama bin Laden in your sights and fail to do anything until it is much harder later.



Like Bill Clinton did with bin Laden?

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile
The Terrorist Tradecraft Conundrum
« Reply #1495 on: August 23, 2014, 07:58:25 AM »
 The Terrorist Tradecraft Conundrum
Security Weekly
Thursday, August 21, 2014 - 03:20 Print Text Size
Stratfor

By Scott Stewart

In last week's Security Weekly, I discussed how the lack of terrorist tradecraft skills has long plagued the jihadist movement. The al Qaeda core has had the most success projecting terrorist power transnationally, but even its operatives have often practiced sloppy terrorist tradecraft. Tradecraft mistakes by al Qaeda operatives have led to plots being detected or botched, including the millennium bomb plots and Operation Bojinka. Sloppy tradecraft also jeopardized successful attacks such as the 1993 World Trade Center Bombing and the 9/11 attacks.

This amateurish level of tradecraft was sufficient in an era such as the early 1990s, when few people were aware of the threat posed by the jihadist movement and few resources were dedicated to countering the threat. However, in the wake of 9/11 the environment became far more hostile to jihadist plotters, and as the focus of every intelligence and law enforcement agency became firmly fixed on the jihadist threat, terrorist operatives' ability to operate transnationally was severely diminished. That is the reason the threat of a spectacular follow-up attack to 9/11 never materialized.

Terrorist threats must be assessed considering two elements: intent and capability. Al Qaeda and other jihadist groups clearly have the intent to attack the U.S. homeland, something that is evident in their rhetoric and their repeated attempts to strike. But what these jihadist groups lack is the capability to fulfill their intent. They do not possess the terrorist tradecraft necessary to bypass the security measures instituted in the wake of the 9/11 attacks or the subsequent enhancements to those measures. Tradecraft is also not quickly or easily learned, and acquiring it through practical experience is difficult for a movement that often uses suicide operatives. These constraints have resulted in terrorist operatives with limited tradecraft capabilities.

Response to Limited Capability

The frustration that jihadists have experienced because of their inability to attack the United States through traditional forms of terrorism -- most notably by sending terrorist operatives to the United States to conduct attacks -- has prompted them to explore alternate approaches. One such strategy has been to attack U.S. aircraft from overseas, circumventing the need to operate inside the United States. This was really a re-emergence of an old tactic, which had previously been employed by Palestinian terrorist groups in various attacks including Pan Am 830, by the Libyans in Pan Am 103 and al Qaeda in the aborted Operation Bojinka (though these past plots did not involve the more recent al Qaeda innovation of suicide operatives.) Since 9/11, we have seen many other plots to attack U.S. aircraft with devices originating from abroad such as the shoe bomb plot, the liquid bomb plot, two underwear bomb plots and the printer bomb plot.

In addition to attempting to directly conduct terrorist attacks themselves, militant ideologues began using their influence to radicalize grassroots jihadists already living in the United States and the West, encouraging those radicalized individuals to conduct terrorist attacks where they live. Initially, this tactic seemed to be successful, producing the Little Rock and Ft. Hood shootings in the United States. Indeed, al Qaeda in the Arabian Peninsula founded their English-language Inspire Magazine in the wake of these two attacks to radicalize grassroots jihadists and to instruct them how to conduct simple attacks. A year later, the al Qaeda core group embraced this approach, releasing a video by Adam Gadahn that encouraged grassroots jihadists to conduct simple attacks where they live.

The Conundrum

Gadahn and al Qaeda in the Arabian Peninsula ideologue Anwar al-Awlaki urged grassroots jihadists to conduct "simple attacks" using knives, firearms or simple explosive devices. "Build a bomb in the kitchen of your mom" and use them against soft targets, they said. Simple attacks are within the reach of untrained grassroots jihadists. They are also very well suited to the skillsets of jihadists who have received basic military training in places like Syria and Iraq. In other words, they are people who know how to handle firearms and who understand the basics of tactical shooting but lack training in sophisticated terrorist tradecraft.

The poor terrorist tradecraft most jihadists possess and the type of training most receive in places such as Iraq, Syria and Yemen have meant that when jihadists have attempted to plan and conduct spectacular bombings, they have almost always been botched or uncovered by the authorities. An example of a botched attack is the May 2010 Times Square attack, in which Faisal Shahzad was able to obtain the materials required to build a car bomb but was unable to properly assemble a functional improvised explosive device. An example of a plot that was uncovered and thwarted by the authorities is the September 2009 plot to bomb the New York subway system that involved Najibullah Zazi.

In 2010, considering the training and capability of most jihadist militant actors and the new emphasis on simple attacks, I concluded we were about to see a shift in jihadist terrorist tactics away from failed bombings and toward armed assaults. However, the attempt by jihadist ideologues to change the mentality of jihadist operatives has been largely unsuccessful, and it did not produce the volume of expected attacks. We have seen a few simple attacks conducted by such people, including shootings in Frankfurt, Germany, in March 2011; in Toulouse, France, in April 2012; and in Brussels, Belgium, in June 2014. The April 2013 Boston Marathon bombing is a case of unsophisticated jihadists using the bomb-making instructions in Inspire Magazine to conduct a simple attack.

Despite the intensive media coverage and hysteria caused by a simple attack like the Boston Marathon bombing, we have yet to see a large percentage of the grassroots jihadist militant world adopt the "simple attack" concept. For every successful simple attack we have seen, there have been multiple would-be militants such as Terry Lowen, Adel Daoud and Quazi Nafis who have aspired to attacks beyond their capabilities and failed.

This is partly because, apparently, most jihadists prefer to fight on the battlefield against foes like the Syrian military rather than attack civilian soft targets. But beyond the jihadist preference to travel to fight rather than to conduct attacks at home, there is another conundrum that puzzles me. Although most jihadists believe that it is permissible to give one's life during an attack, they continue to aspire to spectacular attacks that are beyond their capabilities and that have a very high chance of failure rather than to simple attacks that are certain to succeed. I am not a psychologist, but I speculate that perhaps there is something in the psychological makeup of people drawn to the ideology of jihadism that causes them to gravitate toward the spectacular rather than the obtainable. Perhaps they also believe that in order to justify their suicide, the attack must be spectacular.

I am not the only one puzzled by this tendency. It also appears to confound the al Qaeda ideologues who do not see the "harvest" of attacks they anticipated. Such people are used to seeing their directives carried out on the battlefield, and they surely must be perplexed that grassroots jihadists continue to botch attacks or walk into sting operations rather than conduct simple attacks within their capabilities.

But it does appear that al Qaeda in the Arabian Peninsula is attempting to adapt to the situation. In response to the ambition of grassroots jihadists, the group has attempted to equip them to conduct the types of spectacular attacks they aspire to. In the 12th edition of Inspire Magazine, published in March 2014, the Open Source Jihad section was titled "Car Bombs Inside America" and contained instructions for building a vehicle bomb. The group republished the section Aug. 16 along with some other previously published material (including the pressure cooker bomb plans used in the Boston Marathon bombing) in a publication entitled "Palestine Betrayal of the Guilty Conscience."

So far, we have not seen any attacks, attempted attacks or thwarted plots containing these vehicle bomb instructions. Still, the instructional material is out there, and given the number of past plots in which individuals attempted to follow the magazine's pipe bomb and pressure cooker bomb instructions, it may only be a matter of time before we see someone attempt to build and deploy a car bomb using these plans. In the meantime, the directions contained in "Car Bombs Inside America" have given intelligence and law enforcement officers new indicators of bomb making activity to look for.

Read more: The Terrorist Tradecraft Conundrum | Stratfor
Follow us: @stratfor on Twitter | Stratfor on Facebook

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

G M

  • Power User
  • ***
  • Posts: 26643
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69460
    • View Profile

prentice crawford

  • Guest
Warning By Feds
« Reply #1499 on: August 29, 2014, 05:12:32 PM »
http://www.judicialwatch.org/bulletins/imminent-terrorist-attack-warning-feds-us-border/

Imminent Terrorist Attack Warning By Feds on US Border

AUGUST 29, 2014



Islamic terrorist groups are operating in the Mexican border city of Ciudad Juarez and planning to attack the United States with car bombs or other vehicle born improvised explosive devices (VBIED). High-level federal law enforcement, intelligence and other sources have confirmed to Judicial Watch that a warning bulletin for an imminent terrorist attack on the border has been issued.  Agents across a number of Homeland Security, Justice and Defense agencies have all been placed on alert and instructed to aggressively work all possible leads and sources concerning this imminent terrorist threat.

Specifically, Judicial Watch sources reveal that the militant group Islamic State of Iraq and Greater Syria (ISIS) is confirmed to now be operating in Juarez, a famously crime-infested narcotics hotbed situated across from El Paso, Texas. Violent crimes are so rampant in Juarez that the U.S. State Department has issued a number of travel warnings for anyone planning to go there. The last one was issued just a few days ago.

Intelligence officials have picked up radio talk and chatter indicating that the terrorist groups are going to “carry out an attack on the border,” according to one JW source.  “It’s coming very soon,” according to this high-level source, who clearly identified the groups planning the plots as “ISIS and Al Qaeda.” An attack is so imminent that the commanding general at Ft. Bliss, the U.S. Army post in El Paso, is being briefed, another source confirms. The Department of Homeland Security (DHS) did not respond to multiple inquiries from Judicial Watch, both telephonic and in writing, about this information.

The disturbing inside intelligence comes on the heels of news reports revealing that U.S. intelligence has picked up increased chatter among Islamist terror networks approaching the 13th anniversary of the 9/11 attacks. While these terrorists reportedly plan their attack just outside the U.S., President Obama admits that “we don’t have a strategy yet” to combat ISIS. “I don’t want to put the cart before the horse,” the commander-in-chief said this week during a White House press briefing. “I think what I’ve seen in some of the news reports suggest that folks are getting a little further ahead of what we’re at than what we currently are.”

The administration has also covered up, or at the very least downplayed, a serious epidemic of crime along the Mexican border even as heavily armed drug cartels have taken over portions of the region. Judicial Watch has reported that the U.S. Border Patrol actually ordered officers to avoid the most crime-infested stretches because they’re “too dangerous” and patrolling them could result in an “international incident” of cross border shooting. In the meantime, who could forget the famous words of Obama’s first Homeland Security Secretary, Janet Napolitano; the southern border is “as secure as it has ever been.”

These new revelations are bound to impact the current debate about the border crisis and immigration policy.