Internet Anthropologist Think Tank: 9/30/07 - 10/7/07

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, October 06, 2007

    Arrested terrorist communicating by hand signals MIGCL

    October 6, 2007 09:30 AM

    goose2.jpg

    yahiasign.jpg


    M-I-G-C-L

    National Terror Alert has this amazing development on the Goose Creek Terror case:

    An odd video raises new questions about the USF students involved in the Goose Creek terror case. Ahmed Mohamed and Yousef Megahed are already charged with driving explosives across state lines. Now prosecutors say Megahed’s brother Yehia, was caught sending a sinister code through a closed circuit jail-house camera.
    This is an AMAZING video!
    Check it out:


    UPDATE: The guy was looking at his own face on the monitor when he was doing this.
    He was not talking to his brother.....
    Yousef Megahed’s Brother Sent Sinister Code: TO WHOM? LOOK AT THE FACES HE MADE BEFORE THE HAND SIGNALS, HE'S GOONIN.

    (FOX News Tampa)
    Prosecuters say they have broken the code. They say it is sinister but will not say what it means. They say it is just part of the reason why Yousef Megahed should not get bail.
    M-I-G-C-L ???
    Any ideas?

    National Terror Alert has much more.
    Doug Ross has Yahia's LinkedIn file.
    Michelle Malkin has the latest- Megahed's bond was delayed.
    The Jawa Report is asking readers about the hand signals.

    posted by Gateway Pundit at 10/05/2007 09:23:00 PM

    Read full article HERE

    xxxxxxxxxxxxxxxxxxxxxxx

    Note how he drums certain fingers on his forehead, using certain fingers!!!
    And he is interrupted so the message isn't completed on our video.

    Alternate leters:
    FCLEWGF

    Feds have
    Youssef Megahed’s notebook computer, cell phone and GPS.
    FBI searched a house and took a suitcase? Same house searched during the investigation into Sami Al-Arian, is a suspected Muslim Terrorist on the FBI's Most Wanted List. If you remember back to 2006, two Middle Eastern men in Tampa boarded a school bus filled with children in what was possibly a dry run for a Beslan style attack on American soil.
    They have sucba gear and weapon prosecutors say Megahed stored at a rented storage unit, 22 rifle.

    Profile at http://www.hi5.com/friend/20035110--Yahia--Profile-html has been deleted?
    No cache?

    Yahia Megahed

    Managing Director, Symbyo Technologies, Inc.

    Yahia Megahed’s Specialties:

    IT Consulting and Outsourcing, Business Development, Venture Capitalist,


    http://www.symbyo.com/

    ODD:
    heroyalwhyness said:
    these two were transferred to Florida, the state charges in SC were dropped to facilitate the prosecution of federal charges in the federal system. the Federal Judiciary system is divided into numbered districts . . . and South Carolina is in the fourth district while the federal court these clowns are being remanded to resides in the 11th district.

    What am I missing here? Is there no Federal Court in the 11th district qualified for this case?

    xxxxxxxxxxxxx

    Outsourcing to Egypt
    Symbyo Technologies is a technology consulting and outsourcing company known for their deep industry experience and high customer satisfaction. Symbyo is a leading provider of high-end software outsourcing services for SMEs, specializing in enterprise application development, system integration and business automation tools, Headquartered in Tampa, Florida Symbyo runs state-of-the-art Outsourcing center in Cairo, Egypt.
    Posted by: neeez@... Posted on: 04/04/07
    xxxxxxxxxxxxxxxxxxx

    Looks like a large Operation in Egypt?

    Net Developer @ Symbyo Technologies, Inc.

    Job Code: .Net Developer Job Code:. Net Developer
    Minimum Years of Experience: 2 years Minimum Years of Experience: 2 years

    Qualifications: Qualifications:

    * A university degree in computer science or computer engineering * A university degree in computer science or computer engineering
    * Fluent English (spoken & written) * Fluent English (spoken & written)
    * Full understanding of the product development life cycle and have direct experience working through an entire delivery cycle. * Full understanding of the product development life cycle and have direct experience working through an entire delivery cycle.
    * Proven experience working with current processes and developing methods to improve them * Proven experience working with current processes and developing methods to improve them
    * Ability to manage development timelines, track project details, and estimate time requirements and delivery dates * Ability to manage development timelines, track project details, and estimate time requirements and delivery dates
    * Experience With Proect Managment Methodogies Including Agile Development, Scrum, CMMI * Experience With Proect Managment Methodogies Including Agile Development, Scrum, CMMI

    Experience: Experience:

    * 3 years of professional working experience in Web development using Web development languages & technologies such as ASp.Net, C#, VB.net, JavaScript, HTML, DHTML, * 3 years of professional working experience in Web development using Web development languages & technologies such as ASp.Net, C #, VB.net, JavaScript, HTML, DHTML,
    * Experience with System & database analysis & design * Experience with System & database analysis & design
    * Professional working experience using Microsoft SQL Server, XML. * Professional working experience using Microsoft SQL Server, XML.
    * Experience with Webservices, Service Oriented Architecture . * Experience with Webservices, Service Oriented Architecture.
    * Strong Understanding of OOP Concepts. * Strong Understanding of OOP Concepts.
    * Experience with AJAX is a Plus. * Experience with AJAX is a Plus.
    * Experience iwth DotNetNuke is a Big Plus * Experience iwth DotNetNuke is a Big Plus

    Job Functions & Duties: Job Functions & Duties:

    * Designing, developing, testing, & maintaining Web-based applications * Designing, developing, testing, & maintaining Web-based applications
    * Programming in Asp.net, C# for Web-based applications * Programming in Asp.net, C # for Web-based applications
    * Building DotNetNuke Modules. * Building DotNetNuke Modules.
    * Database analysis, design, & implementation using MS SQL 2005 * Database analysis, design, implementation & using MS SQL 2005
    * Creating project documentation including technical specifications * Creating project documentation including technical specifications

    Job Location: Cario, Egypt Job Location: Cario, Egypt


    Apply Now! eg-careers@symbyo.com Apply Now! Eg-careers@symbyo.com
    [Mar 12, 2007 9:35:25 PM] [Mar 12, 2007 9:35:25 PM]

    MORE
    .Net Software Engineers at Symbyo Technologies, Inc.
    [color=darkblue] At Symbyo Technologies, we develop our people into great leaders and our ...
    Jobs in Egypt Nov 5, 2006 1:51:28 PM
    by ymegahed

    Re: All Web developers Jobs
    At Symbyo Technologies, we develop our people into great leaders and our clients into great ...
    Jobs in Egypt Nov 5, 2006 7:08:04 PM
    by ymegahed

    Re: All developers Jobs
    At Symbyo Technologies, we develop our people into great leaders and our clients into great ...
    Jobs in Egypt Nov 5, 2006 7:08:54 PM
    by ymegahed
    love struck Software Engineer Positions (C#, ASP.net)
    [b] At Symbyo Technologies, we develop our people into great leaders and our clients into great ...
    Jobs in Egypt Nov 14, 2006 2:04:58 PM
    by ymegahed

    WebDesigner Needed
    Seeking a web designer with experience desgining User Interface for DotNetNuke Applications. We ...
    Jobs in Egypt Jan 16, 2007 6:41:47 PM
    by ymegahed

    Administrative Assistant
    [b]Administrative Assistant[/b] Symbyo Technologies is seeking an Administrative Assistant who ...
    Jobs in Egypt Feb 20, 2007 10:44:58 PM
    by ymegahed

    Technical Recruiters @ Symbyo Technologies, Inc.
    Symbyo Technologies, an IT consulting Company based in USA is seeking to hire in its branch in ...
    Jobs in Egypt Mar 11, 2007 12:35:07 AM
    by ymegahed

    Technical Recruiters @ Symbyo Technologies, Inc.
    Symbyo Technologies, an IT consulting Company based in USA is seeking to hire in its branch in ...
    Jobs in Egypt Mar 11, 2007 12:42:54 AM
    by ymegahed

    PHP Developer @ Symbyo Technologies, Inc.
    - Linux, PHP, MySQL - OOD/OOP - Full Life Cycle development experience - Clients side and Server ...
    Jobs in Egypt Mar 11, 2007 1:39:09 PM
    by ymegahed

    .Net Developer @ Symbyo Technologies, Inc.
    Job Code: .Net Developer Minimum Years of Experience: 2 years [b]Qualifications:[/b] * A ...
    Jobs in Egypt Mar 12, 2007 9:35:25 PM
    by ymegahed

    Software Development Paid Internship @ Symbyo Technologies, Inc.
    Are you a college student looking for an internship in the software industry? Symbyo Technologies ...
    Jobs in Egypt Mar 12, 2007 10:11:19 PM
    by ymegahed

    Jobs in a Multi-National Company
    http://www.symbyo.com/careers.aspx
    Jobs in Egypt May 28, 2007 3:31:40 PM
    by ymegahed

    Junior Search Engine Optimization Specialist
    No Experience necessary.. will train the right candidate ...
    Jobs in Egypt Jun 7, 2007 3:14:44 PM
    by ymegahed
    SOURCE:

    XXXXXXXXXXXXXXXXXXX
    unconfirmed:

    Bill provides this exclusive: 12402 Pampas Pl, Tampa Fl 33617 a search of this address reveals a total of 15 names from 1985 to 2001.

    A veritable Who's - Who's in the International Terrorist Community are found:

    Khalil Shikai - One of the founders of the PIJ in the United States

    Noor Salhab - Director of the Islamic Community of Tampa inc (owner of the house)

    Mustafa Alvi - Director of W.I.S.E. terrorist front-- Director of the Islamic Community of Tampa inc

    Ramadan Abdulla AKA Ramadan Shallah- Head of the Palestinian Islamic Jihad and a Director of W.I.S.E. a terrorist front for the PIJ.

    Tarik A Hamdi -Manager of W.I.S.E. and linked to Osma Bin Laden and the 1998 bombings of the US Embassy in East Africa, and a CDLR operative for Al-Qaeda. (8/12/2007 there is a current arrest warrant by ICE for him).

    Hussam Jubara aka Hussam Abujbara- Director of Islamic Committee for Palestine a terrorist front for the PIJ and General Trade & Technology a Florida Corp. with Sami Al Arian, where he used the 12402 Pampas Pl address.

    ATLAS EXCLUSIVE: Bill is the source of information for all the prior terrorists who have lived at 12402 Panpas Pl Tampa. Nobody else has this info. He ran a reverse search of the address in May of 2003 and all the names came up.

    SOURCE:

    XXXXXXXXXXXXXX

    From Florida DMV records there are 3 vehicles registered to Yahia Samir Megahed at the new address for Symbyo Technologies

    XXXXXXXXXXXXXXXXXXXXX

    FBI, ICE and US Secret Service Raid 12402 Pampas Place Tampa, this address has been used for years by terrorists linked to the PIJ [Palestinian Islamic Jihad] , including the current head of the PIJ, Ramadan A. Shallah and Tarik Hamdi who was an al-Qaeda operative and currently wanted by ICE. W.I.S.E. a terrorist front for the PIJ leased the 12402 Pampas Pl address in Tampa during the early 1990's, a business called Copy Time printed flyers and articles seeking contributions for the families of martyrs of the PIJ during the same time period in Tampa.
    xxxxxxxxxxxxxx

    There were two passports for Megahed with two different names.

    xxxxxxxxxxxxxxx

    They need some hard, smoking gun evidence on these guys or let them go.
    Egyptian Muslims here for what 10 yrs, could make fireworks.
    They might be getting a good deal on rent on that house from Muslim academia, friends/associates.
    Its a 22 cal.
    Brother a "DUMBASS".
    Was Magaheds passports mis spellings?
    See there is just no smoking gun yet.
    If he isn't terrorist its gong to mess his business.
    ( THATS BAD, IF HE IS TERRORIST ITS GOOD )
    Suspicious, Circumstantial but presumed innocent.

    If this turns out to be Good Muslims caught up in a anti-terrorist net, USA needs to make them whole again, this will go a long ways towards GOOD WILL

    In current circumstances there was some valid suspicion, which needed to be checked out.
    It was checked and "they" are OK.
    or if Terrorist to Gitmo with them...
    FBI has his notebook, think about your own notebook, they can tell if he is a terrorist.
    cautionary note to prosecutors.
    Get that smoking gun or fix this.


    GERALD
    ANTHROPOLOGIST

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    USA readies for war Iran

    War on Iran for Challenging US Domination
    Seumas Milne, The Guardian

    It seems almost incredible after the catastrophe of the Iraq War, but the signs are growing that the Bush administration wants to do it all over again — this time to Iran. Just as in the run-up to the invasion of Iraq, the Washington air is thick with unsubstantiated claims about weapons of mass destruction; demonization of the country’s president has reached bizarre proportions; intelligence leaks about links with Al-Qaeda and attacks on US and British targets are now routine; demands for war from the administration’s neoconservative outriders are becoming increasingly strident; the pronouncements of George Bush and his vice president, Dick Cheney, are turning ever more belligerent — and administration sources claim that the British government is privately ready to play ball.

    You might imagine after invading and occupying Afghanistan and Iraq at such huge human and strategic cost, an attack on another Muslim country would be the last thing on the US president’s mind. But the drumbeat of war has been unmistakable since the summer, when Bush declared he had “authorized our military commanders in Iraq to confront Tehran’s murderous activities,” and the administration let it be known that it was preparing to brand Iran’s Revolutionary Guards a “terrorist organization.”

    Last month Bernard Kouchner, the hawkish new French foreign minister, insisted that “we must expect the worst” and “the worst is war” — while Mohamed El-Baradei, the UN’s chief weapons inspector in charge of overseeing Iran’s nuclear program, warned against the “neo-crazies” pushing for an attack after 700,000 had died in Iraq on “suspicion that a country has nuclear weapons.” Meanwhile, Israel’s recent air raid on Iran’s ally Syria has been widely interpreted as, at least in part, a power play aimed at Tehran.

    This week John Bolton, the former US ambassador to the UN, used the Tory conference to call for an attack on Iran, as leaks to the US press about war preparations continued.

    Newsweek reported that Cheney had been discussing the possibility of encouraging Israel to launch missile strikes at an Iranian nuclear site in order to provoke Iran into “lashing out,” and open the way to a wider US assault. And in the New Yorker magazine, the investigative writer Seymour Hersh reported that in a videoconference this summer Bush told the US ambassador to Iraq, Ryan Crocker, that he was thinking of attacking targets in Iran, and the British “were on board.”

    Source:

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Hacker Attacks On U.S. Utilities Up 90%

    Hacker Attacks On Some U.S. Utilities Up 90%


    A security company is reporting that the attack tactics include the Gozi, Prg, Storm, and BBB/IRS Trojans.


    The number of hacker attacks on some U.S. utility companies is up 90% in the last nine months, according to a security company.

    SecureWorks, a managed security services company that serves 100 American utilities, reported Friday that it has tracked a 90% increase in the number of hackers trying to attack its utility clients this year. Between January and April, SecureWorks blocked an average of 49 attackers per utility client per day. However, between May and September, the company's researchers saw an average of 93 hackers attempt attacks on each of its utility clients every day.

    "In 2007, we blocked significantly more browser attacks for our clients than we did the year prior, as many of the top Trojans are using Web sites and e-mail links as infection vectors," said Wayne Haber, director of development at SecureWorks, in a written statement. "Some of the most prominent malware using these tactics include the Gozi, Prg, Storm, and BBB/IRS Trojans.

    Researchers at SecureWorks noted that these attacks can put individual users at risk. Computer users can be victimized by browser attacks if they visit Web sites, which are surreptitiously hosting malware. If the utilities end up hosting malware, the companies' users could become victims themselves.

    Haber pointed out that the utilities, like any other company, can fend off these attacks by creating strong Internet usage policies for employees so they aren't duped by social engineering tricks or phishing schemes, putting themselves and their network at risk. He also reminds IT managers to make sure their systems are up-to-date with software patches.

    In a recent interview with InformationWeek convicted hacker Robert Moore said 70% of all the companies he scanned were insecure, and 45% to 50% of VoIP providers were insecure. The biggest cause of that insecurity? Default passwords that had never been changed.

    Moore recently began serving a two-year sentence for breaking into 15 telecommunications companies and hundreds of businesses worldwide as part of a scheme to steal voice over IP services and sell them through a separate company.

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    People's Information Warfare

    Friday, October 05, 2007

    Dancho

    People's Information Warfare Concept

    Malicious Culture of Participation

    DoS battle stations operational in the name of the "Please, input your cause". Preventing a malware infection in order to limit the possibility for the host to become part of a botnet that will later one start a large scale DDoS attack is such a rational thinking that information warriors truly understanding what information warfare is all about, tend to undermine. The recently discussed "people's information warfare" concept highlighting China's growing interest in the idea, is a great example of a culture of participation orbiting around hacktivism cause, a culture we've also seen in many other hacktivism tensions in the past, and will continue to see in the future. The entire concept is relying on the fact that the collective bandwidth of people voluntarily "donating" it, is far more efficient from a "malicious economies of scale" perspective, compared to for instance the botnet masters having to create the botnet by infecting users in one way or another. Moreover, empowering an average Internet user with diversified DoS capabilities is directly increasing the nation's asymmetric warfare capabilities in an event of a hacktivism war.

    Furthermore, the majority of DoS or DDoS flooding tools have a relatively high detection rate, but when people want to use them, they'll simply turn off their anti virus software, the one they use to prevent malware infections, but in a "people's information warfare" they can go as far as consciously becoming a part of a hacktivism centered botnet. Take this DoS tool featured in the screenshot for instance, it has a high detection rate only if the anti virus software is running, but in situation where a "malicious culture of participation" is the desired outcome it doesn't really matter. Donating their bandwidth and pretending to be malware infected is far more dangerous than botnet masters acquiring DDoS capability by figuring out how to infect the massess. It's one thing to operate a botnet and direct it to attack a certain site, and entirely another to be infected with a malware that's DDoS-ing the site, a situation where you become an "awakened and fully conscious zombie host".

    Examples of the "People's Information Warfare Concept" :

    - During the China/U.S hacktivism tensions in 2001 over the death of a Chinese pilot crashing into an AWACS, Chinese hacktivists released mail bombers with pre-defined U.S government and military emails to be attacked, thus taking advantage of the people's information warfare concept

    - The release of the Muhammad cartoons had its old-school hacktivism effect, namely mass defacements of Danish sites courtesy of Muslim hacktivists to achieve a decent PSYOPS effect online and in real-life

    - The Israel vs Palestine Cyberwars is a great example of how DIY web site defacement tools were released from both sites which resulted in a web vulnerabilities audit of the entire web space they were interested in defacing to spread hacktivism propaganda

    - Cyber jihadists taking advantage of the "people's information warfare" concept by syndicating a list of sites to be attacked from a central location, and promoting the use of a Arabic themed DoS tool against "infidel" supporting sites

    - What exactly happened during Russia's and Estonia's hacktivism tensions? The voting poll that is still available indicates that people believe it was botnet masters with radical nationalism modes of thinking. But judging from the publicly obtainable stats, ICMP often comes in the form of primitive DIY DoS tools compared to the more advanced attacks for instance. Collectivist societies do not need coordination because they know everyone else will do it one way or another.

    Power to the people.
    posted by Dancho Danchev @ Friday, October 05, 2007

    xxxxxxxxxxxxxxxxx

    This New application for new group, civilian irregular defense

    Threat to entire WWW

    al-jinan..org, was a dos attack group, whom we have drove underground.
    They are using an off the shelf program now to in-effectively attack a few sites,
    their members download a program to perform group DOS attacks.
    We continue to track and get members arrested,

    Gerald

    Labels: , , , , ,

    Terrorist Names SEARCH:
    Loading

    Russian terrorist arrested in Lebanon

    http://www.retwa.org/home.cfm?articleId=4834

    Quote:
    Kavkazsky Uzel reports that the Lebanese government is accusing four Russian citizens, including a Dagestani national, of terrorism in Lebanon, attacks on Lebanese soldier, and participating in an armed revolt. The four are part of group of 20 being charged in the fighting in northern Lebanon earlier this summer; the rest are all Palestinians.

    According to information provided by the official information agency Al-Watania as well as the Lebanese NNA national agency, four Russian citizens have been accused of belonging to the Fatah el-Islam terrorist organization and carrying out acts of terrorism in the Nahr el-Barid Palestinian refugee camp and attacks on Lebanese servicemen while participating in an armed revolt.. They are identified as:

    18-year-old Sergey Viktorovich Vysotskiy

    20-year-old Timur Vladimirovich Khozkov

    20-year-old Aslan Yerikovich Ymkodzhayev

    20-year-old Dagestani national who calls himself Abu Abdull

    Only Vysotskiy, alias Abu Omran, has been taken into custody. According to NEWSru.com, Vysotsky was a student who coverted to Islam. Two Palestinians, Abu Khodr and Abu Mukhammed an-Nasrani, were detained with him.

    According to Kavkazsky Uzel, Fatah el-Islam based in the Nahr el-Barid camp for Palestinian refugees, is made up of people from many Arab states, but the four Russian citizens are the first known non-Arab foreigners to be members of “Fatah” accused of such serious crimes.

    Izvestiya.ru reports that the Lebanese Army began fighting with terrorists in the camp on 20 May in battles that have resulted in the deaths of 168 Lebanese soldiers and more than 220 fighters. Another 200 were been arrested.

    The Russian Embassy in Beirut is attempting to verify the information.

    “At the present time we don’t have any information about this matter. We are trying to get in touch with the office of the general procurator of Lebanon,” the Embassy’s Press Attaché Vladimir Cherepanov told journalists.

    NEWSru.com reports that rumors about Russians fighting in Lebanon have been around for some time, but this the first confirmation of that (NEWSru.com; IA Regnum; ITAR-TASS; RIA Novosti.)

    Labels: , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Confused anthropologist deny terror, NCA

    As DANGER ROOM previously reported, a group dubbed the he Network of Concerned Anthropologists was encouraging fellow academics to sign a pledge that would commit them not to work with the military on the human terrain system, or anything else directed related to the War on Terror.

    This provoked a lively -- and needed -- debate about the military's newfound love of anthropology.

    Not everyone was so happy. Now, somebody has parodied the group with a counter-organization called SCARED, as in "Seriously Concerned Anthropologists for a Ridiculously Enfeebled Defense":

    xxxxxxxxxxxxxxx

    An anthropologist that refuses to use their skill against al qaeda, are what cowards, ignorant, unprofessional?
    Maybe all three.
    They are no better than those that witness a mugging and refuse to do anything.

    Gerald
    Anthropologist
    Ad Magnum

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Friday, October 05, 2007

    Intel and ops

    bits and pieces :first from forums:
    xxxxxxxxxxxxxxxx
    Increasing surrenders show Al Qaeda is losing hope, morale is devastated
    Judging by the pro-terror buzz in cyberspace, al Qaeda is facing recruitment problems. One al Qaeda guru, using the nom de guerre of Sheikh Bassir al-Najdi, recently warned that the organization was unable to replace "lost martyrs" in Iraq.

    The buzz in pro-terrorist circles is that a whole generation of jihadists has been wiped out. The funeral industry in the Arab countries where most jihadists originate is booming.
    xxxxxxxxxxxxxxxxxxxxxxx

    Al Qaeda has lost half its leadership over the Summer, and American intelligence collectors have amassed a huge number of desperate messages from al Qaeda leaders and operatives. Terror attacks are down by more than half because al Qaeda keeps getting run out of their refuges, and, in desperation, keeps asking each other for help. There is not much help. Couriers are still getting through with cash, to buy people and bomb making materials. But most of this stuff is now getting captured, as safe houses are quickly abandoned. When the terrorists are unable to escape, they more frequently surrender, rather than fight to the death. This is a sign of falling morale. This is what the psychologists predicted as the number of desperate messages grew.

    xxxxxxxxxxxxxxxxxxxxxxxxxxx

    Along with the raids in Iraq, the Pentagon also is developing plans to attack computer networks and websites used by terrorists, military records show.

    Gen. David Petraeus, the top U.S. commander in Iraq, told Congress last month that the “war is not only being fought on the ground in Iraq but also in cyberspace.”

    Petraeus has “placed a greater command emphasis on the media war,” says Maj. Winfield Danielson, a military spokesman in Iraq.

    The terrorist group’s media centers are nondescript from the outside but jammed with production equipment, Bacon says. One house raided recently in Samarra, north of Baghdad, included 12 computers, 65 hard drives and a filming studio.

    xxxxxxxxxxxxxxxxxxxxxxx

    October 4, 2007 · If there's one word American soldiers are familiar with when it comes to their Iraqi counterparts, it's "ijaza" — which means vacation.

    Iraqi soldiers get one week off for every two they work, while Americans get two weeks off a year.

    A U.S. general admits that it's difficult to persuade Iraqi officers to postpone Iraqi army vacation so their troops can take part in U.S. military operations.

    xxxxxxxxxxxxxxxxxxxxxxxx

    From a Burma bloger

    The Burmese military government (junta) has held 50 million Burmese people under an iron fist for 20 years, and effectively under a dictatorship since 1962. Free communication with the outside world is strictly controlled and filtered, and all media is effectively state controlled:

    The state controls Burma’s main broadcasters and publications. For the most part, the media are propaganda tools and tend not to report opposing views except to criticise them. Editors and reporters are answerable to the military authorities.

    (BBC News)

    Bloggers and other cyber activists within Burma risk their lives by publishing any information counter to the government line, but they still do it because they believe that freedom of expression is worth that sacrifice.

    You don’t have to make such a sacrifice, but if you have computer skills, can breach firewalls, routers and web site security then you could greatly assist the people of Burma. By taking down official Burmese government propaganda and posting pictures, information about the protests, information about the lies of the Burmese junta, and news of the huge support being offered by the rest of the world - preferably in Burmese - then you could help free the people from this terrible regime.

    If the information is removed, do it again - automate the attacks, do whatever you can to ensure that the Burmese can see the truth about their government.

    You may have hacked for fun, or personal gain in the past - now you have a chance to hack for freedom.

    Target sites:

    xxxxxxxxxxxx

    For some Arab viewers who don’t regularly view Western media, the overwhelming impression from the videos could be that militants are winning. The benefit for militants is to turn a single attack into a larger strategic weapon.

    xxxxxxxxxxxxxxxxxxxxxxxxx

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Rules of Combat

    Rules of Combat

    USMC
    1. Bring a weapon. Preferably, bring at least two. Bring all of your friends who have weapons. Bring their friends who have weapons.
    2. Anything worth shooting is worth shooting twice. Ammo is cheap. Life is expensive.
    3. Only hits count. Close doesn't count. The only thing worse than a miss is a slow miss.
    4. If your shooting stance is good, you're probably not moving fast enough, nor using cover correctly.
    5. Move away from your attacker. Distance is your friend. (Lateral and diagonal movement are preferred.)
    6. If you can choose what to bring to a gunfight, bring a big weaponand a friend with a big weapon.
    7. In ten years nobody will remember the details of caliber, stance, or tactics. They will only remember who lived and who didn't.
    8. If you are not shooting, you should be communicating, reloading, and running.
    9. Accuracy is relative: most combat shooting is more dependent on "pucker factor" than the inherent accuracy of the weapon.
    10. Use a weaponthat works EVERY TIME. "All skill is in vain when an Angel pisses in the flintlock of your musket."
    11. Someday someone may kill you with your own weapon, but they should have to beat you to death with it because it is empty.
    12. In combat, there are no rules, always cheat; always win. The only unfair fight is the one you lose.
    13. Have a plan.
    14. Have a back-up plan, because the first one won't work.
    15. Use cover or concealment as much as possible. The visible target should be in FRONT of YOUR weapon.
    16. Flank your adversary when possible. Protect yours.
    17. Don't drop your guard.
    18. Always tactical load and threat scan 360 degrees.
    19. Watch their hands. Hands kill. (In God we trust. Everyone else, keep your hands where I can see them).
    20. Decide to be aggressive ENOUGH, quickly ENOUGH.
    21. The faster you finish the fight, the less shot you will get.
    22. Be courteous to everyone, friendly to no one.
    23. Be polite. Be professional. But have a plan to kill everyone you meet.
    24. Your number one Option for Personal Security is a lifelong commitment to avoidance, deterrence, and de-escalation.
    25. Do not attend a gunfight with a handgun, the caliber of which does not start with a ".4."
    Army
    1. See USMC Rules for combat
    2. Add 60 to 90 days
    3. Hope the Marines already destroyed all meaningful resistance
    Navy
    1. Spend three weeks getting somewhere
    2. Adopt an aggressive offshore posture
    3. Send in the Marines
    4. Drink Coffee
    5. Bring back the Marines
    Air Force
    1. Kiss the spouse good-bye
    2. Drive to the flight line
    3. Fly to target area, drop bombs, fly back.
    4. Pop in at the club for a couple with the guys
    5. Go home, BBQ some burgers and drink some more beer


    Labels: ,

    Terrorist Names SEARCH:
    Loading

    Generation Gap Leaves Terrorists Leaderless

    Generation Gap Leaves Terrorists Leaderless

    October 5, 2007: A major terrorist leader, Hassan Hattab, has surrendered and accepted amnesty. Hattab was one of the founders of the GSPC, and did not agree with many other GSPC leaders, who decided to form an al Qaeda franchise. Hattab also lost faith in the ability of terrorism to bring meaningful change to Algeria.

    Police have determined that the suicide bombing attempt on the Algerian president last month, was the work of a terrorist leader who had been released from prison under the amnesty deal. Some of these jailed terrorists were expected to go back to their violent ways.

    The few hundred Islamic terrorists left are being hunted down by soldiers and police, and are finding civilians reluctant to hide them. There are several incidents a week when terrorists make contact with the security forces, resulting in several dozen casualties and arrests each week. Given the high unemployment among young Algerians, there are plenty of new recruits for the terrorists, but a growing shortage of older, more experienced, leaders. These terrorists, of an earlier generation, are not only getting picked off by police activity, but are getting out of the terrorism business (through exile, surrender or just fading into obscurity.) The shortage of good leadership makes it easier to catch the terrorists, and more difficult to plan and carry out attacks.

    September 30, 2007: Since Ramadan began two weeks ago, terrorist violence has killed 37 security personnel, terrorists and civilians.

    Source:

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    I Was a Cybercrook for the FBI

    I Was a Cybercrook for the FBI


    David Thomas loves movies. He took his online nickname -- "El Mariachi" -- from a Hollywood flick, and his conversation is occasionally peppered with dialogue from Scarface and other favorite films. He says he once legally changed his name to "Darius Jedburgh," a character from a popular old BBC miniseries called Edge of Darkness. In the series, Jedburgh is a CIA operative from Texas.

    By the time David Thomas eased his Cadillac into the parking lot of an office complex in Issaquah, Washington, he already suspected the police were on to him.

    An empty Crown Victoria in one of the parking spaces confirmed it. "That's heat right there," he told his two passengers -- 29-year-old girlfriend Bridget Trevino, and his crime partner Kim Marvin Taylor, a balding, middle-aged master of fake identities he'd met on the internet.

    It was November 2002, and Thomas, then a 44-year-old Texan, was in Washington to collect more than $30,000 in merchandise that a Ukrainian known as "Big Buyer" ordered from Outpost.com with stolen credit card numbers. His job was to collect the goods from a mail drop, fence them on eBay and wire the money to Russia, pocketing 40 percent of the take before moving to another city to repeat the scam.

    But things didn't go as planned.

    Ignoring Thomas' suspicions, Taylor walked into the Meadow Creek Professional Center to collect the Outpost shipment, and found the cops waiting for him. Thomas and his girlfriend tried to escape in the Cadillac but were caught half a mile away.

    MORE:

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    LETTER: 'Ignorant' Osama betrays Islam

    LETTER: 'Ignorant' Osama betrays Islam

    Is Osama Bin Laden so foolish to take us on a ride, especially the Muslims, when he talks about Islam? At least to me as a Muslim knowing about Prophet Mohamed quite well, find this so-called Muslim, the ignorant Osama, an absolute opposite personality to the prophet he claims to follow.

    Prophet Mohamed voluntarily served the Maccans for 40 years until they named him 'Ameen,' meaning the most trust worthy person. It was only after he was assured of their trust that he most humbly shared his faith with them. Osama's invitation to Islam with his destructive image is totally opposite to the Prophet of Islam. Is he not betraying the Prophet of Islam and thus betraying Islam itself? Is he an enemy of Islam in disguise of a Muslim and taking us on a ride? It is time to give a serious thought to this possibility since the history shows power seekers are smart in wearing false masks to achieve their goals.

    Mohamed Hussain

    source

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    U.S. pulls plug on 6 al-Qaeda media outlets

    U.S. pulls plug on 6 al-Qaeda media outlets


    WASHINGTON — The U.S. military says it has captured at least six al-Qaeda media centers in Iraq and arrested 20 suspected propaganda leaders since June.

    The seizures of the centers underscore the importance al-Qaeda has placed on media, primarily the Internet, as a tool to communicate to its members and use against U.S. forces in Iraq. The group's media emphasis continues to increase, intelligence analysts say.

    Al-Qaeda is keenly aware that the battle is ultimately for the "hearts and minds of the ummah," the community of Muslim believers, says Gordon Woo, catastrophe analyst for RMS, a London-based firm that consults private companies on terrorism risks. Woo notes that Ayman al-Zawahri, Osama bin Laden's deputy, said in 2005 that most "of this battle is taking place in the battlefield of the media."

    The progress against al-Qaeda's media operations stems from new offensives aimed at al-Qaeda sanctuaries and an emphasis on blunting the terrorist group's extensive propaganda operations, U.S. officers say.

    "One of our goals is to target these propaganda networks, and we've had more success over the past three months," says Air Force Col. Donald Bacon, a staff officer at Multi-National Force-Iraq.

    Those seizures have sharply curtailed the amount of videos and other communications posted to the Internet from Iraq, Bacon says.

    Recent U.S. efforts have made it difficult for al-Qaeda's Internet operations, but such successes are hard to define and may only be temporary, says Rita Katz of the SITE Institute, which monitors terrorist websites. The SITE Institute noted al-Qaeda in Iraq's recent distribution of a 20-minute video, called "The Astray Arrow," alleging the failure of the coalition's offensive in Diyala province, Operation Arrowhead Ripper.

    Al-Qaeda's media output in Iraq dipped starting five or six weeks ago, Katz says, but it has since recovered.

    The group often uses the Internet to raise money and attract recruits, the U.S. military says. Al-Qaeda's militants are ordered to film every attack they conduct on coalition or Iraqi forces, Bacon says. Music is often added to the edited package, for effect.

    For some Arab viewers who don't regularly view Western media, the overwhelming impression from the videos could be that militants are winning. The benefit for militants is to turn a single attack into a larger strategic weapon.

    Along with the raids in Iraq, the Pentagon also is developing plans to attack computer networks and websites used by terrorists, military records show.

    Gen. David Petraeus, the top U.S. commander in Iraq, told Congress last month that the "war is not only being fought on the ground in Iraq but also in cyberspace."

    Petraeus has "placed a greater command emphasis on the media war," says Maj. Winfield Danielson, a military spokesman in Iraq.

    The terrorist group's media centers are nondescript from the outside but jammed with production equipment, Bacon says. One house raided recently in Samarra, north of Baghdad, included 12 computers, 65 hard drives and a filming studio.

    The U.S. military says it has uncovered media operations in the past, but not as many as in recent months. It is not clear how many centers exist, Bacon says.

    Contributing: Richard Willing

    Source:

    There are two wars going on, one in Iraq the other on the Internet.

    One is real the other is virtual, the virtual is manipulated.

    Videos shown over and over, different terrorist groups will use the same video.

    The videos are carefully cut and produced to present the best spin.

    They can shoot the same attack form different points and present it in

    different groups as two attacks.

    Some of the Afghan videos show attacks on empty camps, abondoned

    and claim victories against a absent enemy.

    Some of these virtual groups consist of the same people and webmasters

    of other groups to make themselves look larger, a kind a force multiplier

    on the Internet.

    Because of security considerations al qaeda doesn't pick the "best" webmaster but someone who is loyal and trusted, and they are running 3rd and 4th tier personal.

    Degrading the Internet cadre is depleting one of their most important resources,

    IT personnel.

    Internet Jahidist life expectancy.

    Secret WWW

    Binny impotent

    Gerald




    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Afghanistan: Bin Laden "alive and well",( NOT) says al-Qaeda

    Afghanistan: Bin Laden "alive and well", says al-Qaeda

    Kabul, 5 Oct. (AKI) - Osama bin Laden is alive and well and continues to lead the activities of al-Qaeda, according to one of his Afghan lieutenants, Mustafa Abu al-Zayd.

    But there is continuing uncertainty surrounding America's number one enemy and considerable debate in the Middle East, in particular, over whether the man who appeared in an Internet video in September was actually bin Laden.

    Bin Laden's son recently said that it was not his father who appeared in the video distributed on the worldwide web to coincide with the sixth anniversary of the 9/11 terrorist attacks in the US.

    Sources quoted in the Arab media have also questioned whether bin Laden is still alive.

    "The uncertainty about the issue of Osama is great but behind such ambiguity are the Taliban leaders who are giving the al-Qaeda leader their hospitality," ( STILL PLAYING TALIBAN FOR SUCKERS ) said the Kuwaiti daily, Al Rai Al-Amn.

    "It is only through a low profile that Osama could possibly escape the electronic surveillance of the Americans and become an immediate missile target."

    According to the Kuwaiti daily, a group of Arab Afghanis based in Waziristan, on the border of Afghanistan and Pakistan, was protecting bin Laden and the activities of the Taliban and al-Qaeda.

    The paper said the region was divided into two zones - the first under the Pakistani government that offered support to tribal leaders in exchange for their respect for Pakistani institutions, while the second was inhabited by Pashtu tribes that supported Sharia law and promoted hostility to the West.

    It said al-Qaeda's number two, Egyptian Ayman al-Zawahiri who generously makes declarations( AND PAY OFFS, $MILLIONS USD ) after every significant event was probably living in a populated area where technology was available.

    In an audio message distributed this week on Islamic sites and translated from Pashtu this week, Mustafa Abu al-Zayd said bin Laden was still the leader of the global terrorist organisation. ( AND RUNNING THE TALIBAN )

    "The Sheikh Osama Bin Laden is alive and well," said al-Zayd. "He is still the leader of al-Qaeda and continues to direct its activities and is in good physical condition."

    Al-Zayd launched an appeal to support guerillas in Afghanistan. " I invite all Muslims wherever they are in the world to unite in resistance," he said. ( THAT MAKES THE TALIBAN , BINNYS BITCH)

    "All you who suffer in your hearts....for this you should come and fight for the independence of Afghanistan." ( AND FOR SATAN )

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Taliban's military plans

    KARACHI - Following the success of their 2006 spring offensive, the Taliban were expected to make even further gains in Afghanistan this year. It never happened, due to strong pre-emptive action by Western coalition forces in Afghanistan and Pakistani military action against Taliban bases in the Pakistani tribal areas.

    the Pakistani military has re-engaged militants in the tribal areas, severely choking their supply arteries.

    In the past 10 days, however, militants have launched at least nine carefully planned operations against security positions in both North Waziristan and South Waziristan, and in towns in North-West Frontier Province (NWFP), including Bannu and Dera Ismail Khan, and in the Swat Valley.

    As a result, all security operations against the Taliban and their al-Qaeda colleagues in the tribal areas have stopped, and by all accounts the army is running scared. It is estimated that Pakistan has 100,000 troops and 1,000 military posts along the Pakistan-Afghanistan border....

    Taliban and their supporters now have the breathing space to replenish stocks and prepare for their new push into Afghanistan. It is envisaged that at least 20,000 fully trained fresh men from at least 16 entry points along the Durand Line that separates Pakistan and Afghanistan will be sent into Afghanistan.

    According to people who spoke to Asia Times Online and who are familiar with the planning, the main points will be Noshki (in Balochistan province), Ghulam Khan (North Waziristan), Angur Ada (South Waziristan), Shawal (North Waziristan), and Chitral and Bajuar agencies.

    The new forces will go to the front lines in Afghanistan in the southeastern provinces of Ghazni, Khost, Gardez, Paktia and Paktika,
    and many of them will be trained suicide bombers.

    The strategy to attack the Pakistani Army is being orchestrated by a cabal of former army officers who have joined up with the militants in Waziristan. (See Military brains plot Pakistan's downfall Asia Times Online, September 26). They draw inspiration from the guerrilla strategy used by Vietnamese General Vo Nguyen Giap against the French and the Americans. Given the backoff by the Pakistani military, their plans are working, at least for now.

    Syed Saleem Shahzad is Asia Times Online's Pakistan Bureau Chief. He can be reached at saleem_shahzad2002@yahoo.com SOURCE

    Labels: , , , , , , , ,

    Terrorist Names SEARCH:
    Loading

    Iraqi ONLY, VIEW

    Labels:

    Terrorist Names SEARCH:
    Loading

    Bush: his choice, it's not mine anymore

    George has already decided, only Iran can change course. WAR

    g

    xxxxxxxxxxxxxxxxxxxxxxxx

    Bush repeats willingness for talks with Iran

    October 4, 2007, 9:18 AM (GMT+02:00)

    Answering questions in Lancaster, Pennsylvania, the US president said: “In Iran, we’re dealing with a country where the leader has said that he wants to destroy Israel. My belief is that the United States will defend our ally Israel.” He went on to say: “This is a leader who has made very provocative statements. And, we have made it clear, however, that in spite of that, we are willing to sit down with him, so long as he suspends his program."

    "In other words, it's his choice, it's not mine anymore." the president added.

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Thursday, October 04, 2007

    Israel hacked Syria's air defense radar

    Earlier this month, Israeli fighters bombed a suspected nuclear materials site in Syria. Here's the million dollar question: How did they do it without tipping off Syria's Russian-bought air defense radar? Radar expert Dave Fulghum over at Aviation Week's Ares blog may have the answer: Israel hacked the network.
    Whether this is the final explanation is unclear, but as Fulghum notes, there's a bunch of Russian radar engineers studying the strike right now.
    Wired

    The big mystery of the strike is how did the non-stealthy F-15s and F-16s get through the Syrian air defense radars without being detected? Some U.S. officials say they have the answer.

    U.S. aerospace industry and retired military officials indicated today that a technology like the U.S.-developed “Suter” airborne network attack system developed by BAE Systems and integrated into U.S. unmanned aircraft by L-3 Communications was used by the Israelis. The system has been used or at least tested operationally in Iraq and Afghanistan over the last year.

    The technology allows users to invade communications networks, see what enemy sensors see and even take over as systems administrator so sensors can be manipulated into positions so that approaching aircraft can’t be seen, they say. The process involves locating enemy emitters with great precision and then directing data streams into them that can include false targets and misleading messages algorithms that allow a number of activities including control.

    A Kuwaiti newspaper wrote that "Russian experts are studying why the two state-of-the art Russian-built radar systems in Syria did not detect the Israeli jets entering Syrian territory. Iran reportedly has asked the same question, since it is buying the same systems and might have paid for the Syrian acquisitions."

    The system in question is thought to be the new Tor-M1 launchers which carries eight missiles as well as two of the Pachora-2A system. Iran bought 29 of the Tor launchers from Russia for $750 million to guard its nuclear sites, and they were delivered in Jan., according to Agency France-Press and ITAR-TASS. Syrian press reports they were tested in February. They also are expected to form a formidable system when used with the longer-range S-300/SA-10 which Iran has been trying to buy from Russia. Syria has operated SA-6s for years and more recently has been negotiating with Russians for the Tor-M1. What systems were actually guarding the Syrian site are not known.

    Credit: US Navy SOURCE



    We are keeping our Paradigm intel model to ourselves.
    Gerald

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Islamo-Fascism Awareness Week

    The following article by Robert Spencer deals with the Muslim persecution of Christians and documents how this persecution is rooted in -- and mandated by -- Islamic law.

    This article is a segment of a series being run as part of our nation-wide campus effort, “
    Islamo-Fascism Awareness Week,” which will be held on 200 university and college campuses on October 22-26.

    Themes of the week’s events will include the
    oppression of women and homosexuals in Islam -- as part of a comprehensive focus on all the victims of Islamo-Fascist Jihad.

    Islamo-Fascism Awareness Week is also a national effort to counter the lies of the academic Left, which seeks to deny the evil -- and even the very existence -- of our enemy in the terror war.

    In this way, Islamo-Fascism Awareness Week hopes to educate American students and to enable them to rally to defend their country. --The Editors.
    SOURCE

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    What is Reuters doing, "trapped or cornered"

    Lebanese army shells militants trapped in camp Reuters.co.uk 01:58

    http://today.reuters.co.uk/news/CrisesArticle.aspx?rpc=401&storyId=L19581069

    Lebanese army shells militants cornered in camp Reuters.co.uk 01:58

    http://today.reuters.co.uk/news/CrisesArticle.aspx?rpc=401&storyId=L19932186


    Both are the same story word for word, but different labels.

    In one they are "cornered" in the other they are "trapped".

    odd....

    Gerald



    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    al Qaeda releases beheading videos ???

    The video is actually old and the murders dates from November 2004 and early 2005, but it had never been released. Why would al Qaeda in Iraq release this video now nearly three years after the crime?

    The video shows four hostages who al Qaeda claims are highway bandits confessing. Two are then murdered together and two more beheaded at different times.

    The victims are: Othman Nasser Azawi, Ali Hassan Makhlaf, Joumouaa al Lwizi, & Abd Assatar al Sabaawi.

    It's bad. Very very bad. If not the worst beheading snuff video I've ever seen, right up at the top. Sickening. Disgusting. The words don't even come close to painting a true picture.

    jawa has it:here

    By why would they release these beheading videos now?

    AQ is begging for recruits and they are not getting them.

    AQ webmasters have been taken out, and they search for any replacement, the chief requirement is loyalty not experience, security has to take precedence over ability as a web master.

    So they have people running the web sites that are not experienced cadre.

    "By their unique nature, terrorist organizations face difficult challenges in almost any operational environment, particularly in terms of maintaining situational awareness, controlling the use of violence to achieve specified political ends,..."

    "We see a consistent focus on how to achieve the appropriate use of violence when the rank and file often clamor for more violence than is useful, or seek to enrich themselves in the course of their duties. Groups also struggle with the problem of maintaining situational awareness while staying covert, so that members understand which actions will support the political goal, and which will be counterproductive ( BEHEADINGS ). Finally, there is regular concern with balancing the need to control operational elements with the need to evade government attention and limit the consequences of any compromise."

    "Security concerns mean they cannot perfectly monitor what agents are doing.20 Moreover, the nature of the operational environment means that it is hard to punish agents, even when leaders do catch them taking unauthorized actions. In terrorist groups, the agents hold an implicit threat over group principals—they can go to the government. For example, Jamal Ahmed Al Fadl, who testified in the Embassy bombing trial, stole money from al-Qa’ida, got caught, went on the run, and approached the U.S. government in an attempt to save himself and his family.

    Open-source analyses of terrorist organizations generally begin from the perspective that members of these groups are uniformly motivated by the cause, are equally willing to sacrifice for the cause, agree on what the cause is, and see eye-to-eye on the best tactics to achieve their strategic end.24 However, substantial evidence has accumulated to indicate this is not the case. The Harmony documents reveal a surprising level of infighting and conflict, even within highly capable groups such as al-Qa’ida (Al Adl Letter, Harmony AFGP-2002-600080)."

    Source:

    PARADIGM INTEL INDICATES THE PUSH FOR RECRUITING CONTINUES AS THE NUMBER ONE GOAL, THEY VIEW THE CONTINUED DEGRATION OF THEIR RANK AND FILE AS THEIR MOST SERIOUS PROBLEM.

    AND THE PRESSURE FOR RECRUITS HAS DROVE THE WEB SITE NEWBEES TO PUBLISH OLD BEHEADING VIDEOS TO CAPTURE MORE MARKET SHARE ( SURFERS ) EVEN THOUGH BEHEADING VIDS ARE COUNTER PRODUCTIVE TO THEIR political goals.

    THEIR BID FOR MORE ISLAMIC RECRUITS HAS FAILED AND THEY NOW ARE SEEKING TO DEVELOP HOMEGROWN VARIETY SINCE THEIR ISLAMIC RECRUITING HAS FAILED. HENCE THE BEHEADING VIDEOS.

    gERALD




    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    White American fighting with Al Qaida in Somalia

    White American fighting with Al Qaida in Somalia
    ( not confirmed )

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Different Terrorist now, from 9.11 time.

    Marc Sageman: Home-grown terrorism now main threat

    (The Australian) FIVE years ago, the average terrorist was in his mid-20s, married with kids, university-educated, middle-class, psychologically stable and probably an engineer.

    Today, he’s more likely to be poor, of limited education and a second- or third-generation product of the culture he is attacking.

    Former CIA case officer turned psychiatrist Marc Sageman told the Safeguarding Australia Summit in Canberra yesterday the typical profile of a terrorist had changed since the attacks of September 11, 2001 and the Iraq invasion.

    The well-educated young men who were radicalised while studying in the West (engineering was the most common degree) and who conducted the 9/11 attacks, had been replaced by self-trained, self-recruited and, thanks to the welfare state, self-financed “terrorist wannabes”.

    Dr Sageman said al-Qaeda’s leaders had been all but cut off from the current crop of jihadists and comprised no more than two dozen people.

    The threat was now coming from home-grown young men in their early 20s who recruited mostly on the internet.

    Dr Sageman said there were “potentially thousands” of these “new” terrorists, although they were incapable of replacing older terror networks because of their self-organising, independent structure. Many were petty criminals or gang members who eventually drifted back to their Islamic roots.

    Their actions were inspired by a sense of “moral outrage” at perceived grievances against Muslims, usually focusing on Iraq, reinforced by personal experiences of alienation in their host countries.

    Dr Sageman said that well-intentioned attempts by governments to change attitudes within the Muslim community by promoting moderate interpretations of Islam were likely to fail as a result.

    “That’s not why they join. They join for the glory,” he said.

    Kinship bonds were the glue that held most terror cells together, rather than ethnicity, religion or ideology, he said.

    xxxxxxxxxxxxxxxxxxxxxxxxxx

    Brigitte Gabriel, founder and president of the American Congress for Truth, recently had the opportunity to testify before Congress about her concerns on the Islamic threat. She told members that various terrorist groups al-Qaida, Hezbollah, and Hamas, among others, are working with the MS-13 gang in smuggling terrorists across the Mexican border into the United States.

    “The MS-13 gang is bad news. They are thugs. They are murderers. They are as bad as the Islamic radicals. These guys do not think twice about killing. They will kill their own family members. And this is why they found a great ally in the terrorist organizations,” says Gabriel.

    Gabriel says America should only welcome into the country people who are willing to play by the rules in order to live the American dream. “I had to study a two-inch-thick book so I can take the test to become an American citizen,” she states. “And only those who want to be Americans, like me, so badly and are willing to adopt American culture — those are the ones we should have in this country. Not the terrorists, and not those who are dragging our culture down.”

    Gabriel says it is unfortunate that MS-13 exists across the United States and in almost all the major cities in the country — a condition she believes should be unacceptable to any American, regardless of political affiliation. Gabriel believes that sooner or later the U.S. is going to pay a very heavy price for failing to build a fence and failing to take other steps to secure the nation’s southern border.

    Source

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Iraqi Hamas accused Al-Qaida of inflicting "great suffering" on ordinary Iraqi Sunnis:


    from counter terrorism blog

    A breakaway Sunni insurgent faction from the 1920 Revolution Brigades known as "Hamas in Iraq" has issued a formal response to recent allegations by Abu Omar al-Baghdadi, the leader of Al-Qaida's "Islamic State of Iraq." In an official communiqué dated October 2, Iraqi Hamas accused Al-Qaida of inflicting "great suffering" on ordinary Iraqi Sunnis: "every day they witnessed heads or headless bodies lying in their streets. Each one of these victims had been accused of a so-called ‘crime’ prohibited by Al-Qaida fatwahs... then [Al-Qaida] attacked Ameriyyat [al-Fallujah] with a car bomb packed with chlorine gas canisters, and they even laid siege to the area to prevent food and fuel from getting to people. Finally, they killed several men at the local market and smashed their heads against boxes of food... We [have] witnessed dozens of beheaded bodies and none of them were Americans. Rather, they were all local people from the area—people who, at one point, had supported the Al-Qaida network until they themselves had become disposable." In fact, according to Hamas in Iraq--as a result of the various crimes Al-Qaida has committed against innocent Muslim civilians--"the Al-Qaida network has actually made people here think that the occupation forces are merciful and humane by comparison."

    Click to view English translation of Iraqi Hamas Communiqué in Response to Al-Qaida c/o Globalterroralert.com

    See also:
    - ISI/Al-Qaida official statement on the 1920 Revolution Brigades
    - [NEFA Foundation]: English transcript of Sept. 14, 2007 audio message from ISI leader Abu Omar al-Baghdadi
    - Iraqi Islamic Resistance Front (JAAMI) Response to Speech by Abu Omar al-Baghdadi
    - [NEFA Foundation]: "State of the Sunni Insurgency in Iraq: August 2007"

    October 4, 2007 02:51 AM more >>Link


    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    USA looking for AQ

    ....
    70 bullets a second.
    A10 's cannon GAU 8A Seven-Barrel 30mm Gatling Gun

    Labels: ,

    Terrorist Names SEARCH:
    Loading

    al qaeda having a very BAD day.

    Terrorist Names SEARCH:
    Loading

    this day 1985 Islamic Jihad, killed William Buckley

    on this day 1985 - The Shiite Muslim group Islamic Jihad announced that they had killed American hostage William Buckley. 39 yrs ago.
    Later another American hostage said that he believed that Buckley had died four months earlier from torture...

    G
    William Buckley Kidnapped in Beirut
    Wednesday, March 16, 1984
    (Philadelphia Daily News) - A U.S. Embassy diplomat was kidnapped by gunmen in Muslim west Beirut as heavy fighting in the capital threatened a cease-fire negotiated by the nation's faction leaders meeting in Switzerland. The kidnapped diplomat was identified as William Buckley, a political officer at the embassy.

    William Buckley Executed in Beirut
    Friday, October 04, 1985
    (UPI) -- Islamic Jihad terrorists announced the "execution" of official William Buckley. "We declare a revenge for the blood of the martyrs by announcing the execution of the death sentence for the American CIA agent in the Middle East and the head of its Lebanon station."

    American Hostage Buckley Held in Iran
    Tuesday, November 25, 1986
    (UPI) -- William Buckley, the CIA's Beirut station chief who was kidnapped in 1984 and said to have died after prolonged torture, reportedly was secretly spirited through Syria by Iranian gunmen and delivered to Iran for interrogation. Buckley was flown by from Damascus to Tehran after his abduction.

    William Buckley Body Recovered
    Friday, December 27, 1991
    (UPI) -- The decomposed body of CIA officer William Buckley was dumped in southern Beirut early Friday, Lebanon's chief coroner said, nearly eight years after the American was kidnapped by pro-Iranian extremists. The return of Buckley's remains closes the file on Americans taken hostage in Lebanon,

    Hostages Remembered as Heroes
    Monday, December 30, 1991
    (AP) -- Two men who met wretched deaths at the hands of Lebanese captors arrived home today in flag-draped coffins and were honored as "American heroes" by leaders. ''Today the nation gathers into its arms two of its bravest sons . . . patriot-warriors who died trying to bring peace to a ravaged land."

    source

    Labels: , ,