Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: All

ON THE NET...

http://www.freerepublic.com/focus/keyword?k=gwot
http://www.rewardsforjustice.net/english/index.cfm?page=Captured
http://www.rewardsforjustice.net/english/index.cfm?page=Wanted_Terrorist
http://www.rewardsforjustice.net

#

http://www.freerepublic.com/focus/keyword?k=globaljihad
http://www.freerepublic.com/focus/keyword?k=jihad

#

http://www.freerepublic.com/focus/keyword?k=internet
http://www.freerepublic.com/focus/keyword?k=internetcafes
http://www.freerepublic.com/focus/keyword?k=internetcafe

#

SEPTEMBER 11, 2001: Before, During and After
http://www.truthusa.com/911news.html
http://www.truthusa.com/911news2.html
http://www.truthusa.com/911.html

#

http://www.internet-haganah.com
http://www.internet-haganah.com/haganah/internet.html
http://internet-haganah.org/hmedia/27apr07/27apr07-salafy_forums.html
http://www.sofir.org
http://sfir-arabicsource.blogspot.com/

#

http://www.jihadwatch.org

#

http://www.memri.org/jihad.html
http://www.memritv.org/Search.asp?ACT=S5&P1=9
http://www.thememriblog.org/

#

http://truthusa.com/a/index.php

#

http://www.persecution.org
http://www.memri.org/antisemitism.html


8 posted on 06/01/2007 8:26:30 PM PDT by Cindy
[ Post Reply | Private Reply | To 7 | View Replies ]


To: All
RECAP:

WorldNetDaily.com: "AL-QAIDA RECRUITING BLACK BOMBERS Pitch to African-Americans invokes 'martyr' Malcolm X" (ARTICLE SNIPPET: "In the latest message, al-Qaida No. 2 Dr. Ayman al-Zawahiri clearly seeks to sow political and racial discontent among African-Americans. He makes frequent references to what he calls the "martyr" Malcolm X, and says "I want blacks in America to know that we are waging jihad to lift oppression from all mankind."") (May 21, 2007)

INTERNET-HAGANAH.com: "MALCOLM X IN THE WARM EMBRACE OF THE GLOBAL JIHAD" (May 18, 2007)

119 posted on 06/03/2007 6:32:35 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; JellyJam; backhoe; piasa

http://littlegreenfootballs.com/weblog/?entry=25751_Video-_60%25_of_UK_Muslims_Deny_7-7_Bombings&only

Monday, June 04, 2007
“Video: 60% of UK Muslims Deny 7/7 Bombings”

~

http://www.youtube.com/watch?v=ZV0a8Zz6EO4

“British Muslim Survey on 7.7. London Bombings.”
(Added June 4, 2007)

###

http://littlegreenfootballs.com/weblog/?entry=25762_Video-_Followup_on_UK_Muslim_7-7_Denial_Survey&only

Tuesday, June 05, 2007
“Video: Followup on UK Muslim 7/7 Denial Survey”

~

http://www.youtube.com/watch?v=bqbuWGfYyTc

“British Muslim Survey”
(Added June 5, 2007)


224 posted on 06/05/2007 2:35:29 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

http://www.freerepublic.com/focus/keyword?k=globaljihad
http://www.freerepublic.com/focus/keyword?k=jihad

http://www.freerepublic.com/focus/keyword?k=internet

###

June 6, 2007
“U.K. jury told of ‘terror hoard’ on defendant’s computer”

http://www.jihadwatch.org/archives/016784.php
(MANCHESTER EVENING NEWS)

June 6, 2007

ARTICLE SNIPPET: “The jury was told Omar Altimimi has links with convicted terrorists overseas and was discovered with false identity cards hidden in the sole of his shoe when he was arrested.

Manchester Crown Court was told there was a “considerable amount of serious terrorist related material” on two computers found at Altimimi’s Bolton home and another address in the town used by him. The computers included bomb instructions and details of how to run terror cells as well as video footage of terrorists and of executions in Iraq.

The 36-year-old faces a series of charges under the Terrorism Act, including possession of instructions on how to make a detonator and explosive device and instructions on the use of chemicals and bombing strategies. He denies the charges.”

ARTICLE SNIPPET: “Prosecuting Tim Barnes QC said: “There was a large number of files which were concerned with a variety of terrorist activities and which also included graphic and appalling video footage of the execution of those who had been taken hostage or were considered enemies by insurgent factions in Iraq.” He added: “The terrorist content of this computer-held material becomes still more significant when we consider associations which the Crown can prove this defendant had with other terrorists convicted in Holland and France.

“He is associated through an address in Rotterdam with Arab terrorists in Europe. The Crown can also prove that he sent a money order to Thailand to a man who was subsequently convicted in his absence of terrorist offences in France.”

The court heard sections from a chart found on one of the computers talked about the organisational structure of a terror cell with information on explosives, chemicals, kidnapping and assassination, the monitoring of presidents, police, diplomats, the media and other organisations.”

ARTICLE SNIPPET: “One section, it was alleged, referred to Jihad and the holy war against democracy and communism. It was said to talk of, killing soldiers and police officers, assassinating the head of the country, demolishing electricity stations and petrol stations, demolishing “infidel universities”, mixed schools and pubs and killing embassy diplomats.”

ARTICLE SNIPPET: “The court heard police found a number of job descriptions and applications including one for a cleaning supervisor for Greater Manchester Police and another for a job as a trainee teacher at Bolton College.”


278 posted on 06/06/2007 1:14:15 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

Note: The following text is a quote:

http://travel.state.gov/travel/cis_pa_tw/pa/pa_1161.html

Printer friendly version Email
PUBLIC ANNOUNCEMENT

U.S. DEPARTMENT OF STATE
Office of the Spokesman
This information is current as of today, Thu Jun 07 2007 04:01:57 GMT-0700.

Worldwide Caution

April 10, 2007

This Public Announcement updates information on the continuing threat of terrorist actions and violence against Americans and interests overseas. This supersedes the Worldwide Caution dated October 11, 2006 and expires on October 9, 2007.

The Department of State remains concerned about the continued threat of terrorist attacks, demonstrations and other violent actions against U.S. citizens and interests overseas. Current information suggests that al-Qaida and affiliated organizations continue to plan terrorist attacks against U.S. interests in multiple regions, including Europe, Asia, Africa and the Middle East. These attacks may employ a wide variety of tactics to include assassinations, kidnappings, hijackings and bombings.

Ongoing events in Iraq and elsewhere in the Middle East have resulted in demonstrations and associated violence in several countries. Americans are reminded that demonstrations and rioting can occur with little or no warning.

In August 2006, British authorities arrested a significant number of extremists engaged in a plot to destroy multiple passenger aircraft flying from the United Kingdom to the United States. The September 2006 attack on the U.S. Embassy in Syria and the March 2006 bombing near the U.S. Consulate in Karachi, Pakistan illustrate the continuing desire of extremists to strike American targets.

Extremists may elect to use conventional or non-conventional weapons, and target both official and private interests. The bomb attacks targeting buses carrying foreign workers in March 2007 and December 2006 in Algeria, a series of bombings in Thailand in May and September 2006 that targeted commercial and tourist destinations in the far south, and the bombings in the the Egyptian resort town of Dahab in April 2006 all illustrate how terrorists exploit vulnerabilities associated with soft targets. Additional examples of such targets include high-profile sporting events, residential areas, business offices, clubs, restaurants, places of worship, schools, public areas and locales where Americans gather in large numbers, including during holidays. Financial or economic targets of value may also be considered as possible venues; the vehicle-based suicide attack on an oil facility near Mukalla and Marib in Yemen in September 2006 and the failed attack on the Abqaiq oil processing facility in Saudi Arabia in late February 2006 are such examples.

In the wake of the August 2006 plot against aircraft in London, numerous terrorist attacks on trains in India in 2006, the July 2005 London Underground bombings, and the March 2004 train attacks in Madrid, Americans are reminded of the potential for terrorists to attack public transportation systems. In addition, extremists may also select aviation and maritime services as possible targets.

U.S. citizens are strongly encouraged to maintain a high level of vigilance, be aware of local events, and take the appropriate steps to bolster their personal security. For additional information, please refer to “A Safe Trip Abroad” found at http://travel.state.gov .

U.S. Government facilities worldwide remain at a heightened state of alert. These facilities may temporarily close or periodically suspend public services to assess their security posture. In those instances, U.S. embassies and consulates will make every effort to provide emergency services to U.S. citizens. Americans abroad are urged to monitor the local news and maintain contact with the nearest U.S. embassy or consulate.

As the Department continues to develop information on any potential security threats to U.S. citizens overseas, it shares credible threat information through its Consular Information Program documents, available on the Internet at http://travel.state.gov . In addition to information on the Internet, travelers may obtain up-to-date information on security conditions by calling 1-888-407-4747 toll-free in the U.S. or outside the U.S. and Canada on a regular toll line at 1-202-501-4444.


325 posted on 06/07/2007 4:03:11 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

ON THE NET...

http://www.freerepublic.com/focus/keyword?k=globaljihad
http://www.freerepublic.com/focus/keyword?k=jihad
http://www.freerepublic.com/focus/keyword?k=jihadpropaganda
http://www.freerepublic.com/focus/keyword?k=jihadvideos
http://www.freerepublic.com/focus/keyword?k=jihadmedia

http://www.freerepublic.com/focus/keyword?k=internet
http://www.freerepublic.com/focus/keyword?k=internetcafes
http://www.freerepublic.com/focus/keyword?k=internetcafe
http://www.freerepublic.com/focus/keyword?k=cybercafes
http://www.freerepublic.com/focus/keyword?k=cybercafe

#

http://www.internet-haganah.com
http://www.internet-haganah.com/haganah/internet.html
http://internet-haganah.org/hmedia/27apr07/27apr07-salafy_forums.html

#

http://www.memritv.org/
http://www.memri.org/jihad.html

#

http://memri.org/bin/articles.cgi?Page=subjects&Area=jihad&ID=SP161507

Special Dispatch Series - No. 1615
June 8, 2007 No.1615

“How Islamist Internet Forums Are Used to Inform Mujahideen of News from Western Media”


444 posted on 06/09/2007 9:39:26 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

Note: The following text is a quote:

http://www.usdoj.gov/ag/speeches/2007/ag_speech_070611.html

Prepared Remarks of Attorney General Alberto R. Gonzales at the
Global Initiative to Combat Nuclear Terrorism Law Enforcement Summit

Miami, Florida
June 11, 2007

Good afternoon.

I am pleased to be here and I want to extend my own welcome to all of our international partners represented here today.

Together, we have accomplished a great deal to protect the citizens of our respective nations over the past five-plus years since September 11th. Some of you visiting from other countries have suffered with terrorism for an even longer time. Whatever successes we have enjoyed in fighting terrorism is largely because we haven’t waited to act. In the U.S., I know that we began thinking through our response on the very day of the September 11th attacks.

Just before 7:00 that night, on the day that changed our way of life and our way of thinking, I was waiting for the return of Marine One – the helicopter carrying the President – to the South Lawn of the White House. I, along with others, stood outside the Oval Office ready to meet the President and begin the work of defending America.

The President was purposeful when he arrived. His face was serious as he approached us. As he met us and then entered the White House he didn’t say a word – he just nodded his head slightly. We followed him into the Oval Office – which was being set up for his 8:30 address to the nation – and then into his private dining room.

There, we sat down rolled up our sleeves and we started to work.

***

I have a hard time remembering what I worked on as White House Counsel before that day. What I remember vividly is afterwards—the images of the burning World Trade Towers, desperate people jumping to their deaths and frantic good-bye phone calls between loved ones.

As shocking as these attacks were, however, imagine if the smoke over New York City that day had been that of a mushroom cloud- killing not just thousands, but tens, maybe hundreds of thousands. Imagine if the U.S. Government could no longer function in our capital city because it had been destroyed by a 10 kiloton blast. It is the job of the people in this room to picture such sickening scenarios. And it is our job to stop them from happening.

That’s why this battle against terrorism is fought on a clock that never stops, and why the partnerships among law enforcement officials, and between the law enforcement and the intelligence communities, are ones that must never have gaps.

You know this all too well. So I’m glad to have this chance to talk with all of you about what we are doing, together, to prevent terrorist attacks – in this case the most unthinkable kind of attack – and to talk about what our network is doing to stop and ultimately defeat their network.

The threat of nuclear terrorism is all too real. We know, for example, that Al Qaeda has been trying to acquire or make nuclear weapons for over ten years. Indeed, Usama Bin Laden has indicated that he considers the acquisition of weapons of mass destruction to be an obligation for his followers. And the discovery of A.Q. Khan’s clandestine nuclear trafficking network demonstrates that the international black market for nuclear weaponry includes both buyers and sellers.

Acquisition of even a small nuclear weapon would provide terrorists with devastating destructive power: The Report of our 9/11 Commission points out that a trained nuclear engineer with an amount of highly enriched uranium or plutonium about the size of a grapefruit or an orange, together with commercially available material, could fashion a nuclear device that could fit in a van like the one Ramzi Yousef parked in the garage of the World Trade Center in 1993. Such a bomb would level Lower Manhattan.

The prospect of nuclear weapons in the hands of terrorists is different than any other law enforcement or national security threat we face. This is not about catching the crook after the crime is committed. Rather, it is about prevention – and keeping weapons and the building blocks for them, accounted for, secure, outside of illicit markets, and away from terrorists.

Of course, if terrorists are successful in detonating a nuclear weapon in the United States, the Department will take the law enforcement lead in investigating the event and bringing responsible individuals and organizations to justice.

But I do not ever want to prosecute this type of crime. I want to work with you to prevent it from happening anywhere in the world. This mission is the challenge of our generation as law-enforcement and intelligence professionals, and we are here because we recognize what is at stake if we fail.

This is why, in facing this threat around the globe, it is essential that we take the many lessons we have learned after 9/11 in combating terrorism and apply these lessons to this broader issue of proliferation and the specific threat of nuclear terrorism.

The same concepts that apply to how we investigate terror organizations and plots – most importantly that of coordination and cooperation among law enforcement – must also be applied in combating the proliferation of WMD and their many components.

I acknowledge that we all have different law enforcement systems. Approximately 30 countries are represented at this conference, and that means 30 different legal systems.

But, communication, sharing and coordination are truly universal concepts. And they are the essence of what will ultimately make our network stronger than the terrorist network.

Lessons Learned from 9/11 in Targeting Terrorism

Over the past six years, the United States has evolved from a model where intelligence agencies and law enforcement agencies were walled off for a variety of legal and cultural reasons to one where these camps now act in concert and in unison. We have taken that wall down and allowed for a much more robust flow of information. I want to talk about this essential change because it has been very effective. We are now able to realize the expertise and vast resources of law enforcement and intelligence agencies to an extent never before possible in this country.

These changes have enabled us to combat terrorists’ threats to the United States and the world in a far more effective way.

Just one example of this new way of doing business is the establishment of the National Security Division known as “NSD” at the Department of Justice. Its creation was recommended by the WMD commission and made a reality by the USA PATRIOT Act Improvement and Reauthorization, signed by President Bush in March of 2006.

The NSD brought the Department’s Office of Intelligence Policy and Review and the Criminal Division’s Counterterrorism and Counterespionage Sections under one authority, allowing the Department to fight threats to our national security more effectively.

Significant reforms have also taken place at the FBI. Most recently, under Director Mueller’s leadership, the FBI created the Weapons of Mass Destruction (WMD) Directorate, which consolidated WMD and counter-proliferation initiatives. This new Directorate studies the consequences of a WMD attack, increases our level of preparedness, and would coordinate the Government’s response in the event of a WMD attack in the continental United States.

Joint Terrorism Task Forces provide a clear example of how the walls that used to divide U.S. law enforcement have been lowered, how law enforcement and intelligence are woven together like one continuous piece of fabric.

In JTTFs, federal, state and local officials work side-by-side, as one seamless team, sharing access to data and working together on analysis – because it is easier to connect the dots when all of those dots are shared on common ground.

Last summer in Los Angeles, the efficacy of the JTTF structure was clear when a local officer police officer who worked in a JTTF connected the dots that led to the eventual arrest of radicals plotting to attack government buildings and synagogues in Los Angeles

That case, and others like it, are good examples of what happens when resources are pooled and partners with specific skill-sets work together. A local cop is uniquely equipped to notice when something just isn’t right in their own communities, and to aggressively follow-up — when robberies are really the means to accomplish something else ... as was done in the case of those gas station hold-ups in Los Angeles.

Here in the U.S. –– the federal government offers the best, most comprehensive databases where local law enforcement can find out if their gut instincts are correct. When a good “nose” for foul play is working side-by-side with a comprehensive source of intelligence, dots are connected and our network is performing at its best.

The recent disruption of the plot to blow up fuel tanks at JFK International Airport in New York, like the Fort Dix case several weeks before, provide further examples of the success that has come from sharing and collaboration among law enforcement. The investigations into both plots showed how our agents and prosecutors are refining their capability to detect and pre-empt such plots before they advance to an operational stage.

Applying these Lessons to Nuclear Terrorism

Part 1: International Cooperation

In dealing with the global threat of nuclear proliferation and terrorism, we have to apply this new paradigm of communication and coordination on an even broader scale. We must not only break down the walls between agencies, but we must also work to break down barriers among nations so that there can be a dynamic exchange of information between law enforcement and intelligence agencies on a worldwide scale.

Information sharing on this level is far more challenging, but it is also extraordinarily important. This fact is recognized among the G8 countries and is the subject of many discussions with my counterparts around the world. We are moving forward with these principles in mind: that information must be protected and legitimate privacy interests always respected, while, at the same time, avenues of information sharing must be followed, within our respective legal frameworks. Should a local customs official in one country encounter an export declaration that raises alarm bells, for example, that information should be able to be transmitted quickly to agencies in other nations where they can be in a position to intercept a suspicious import on a vessel or aircraft.

In other words, we all need to be in a position where there is a healthy flow of tactical information that allows us to take immediate action to neutralize a threat, intercept a shipment, or take other action with respect to Weapons of Mass Destruction.

To enhance the ability of the United States to render and receive assistance on a global basis in the struggle against nuclear terrorism, the Administration is supporting and promoting ratification packages for two key international treaties at the current time:

• One, President Bush has signed and will soon send to the Senate, the Nuclear Terrorism Convention, which requires State parties to criminalize a number of acts related to the misuse of radioactive materials or a nuclear explosive device. The treaty also provides a legal basis for international cooperation in the investigation, prosecution, and extradition of those who commit terrorist acts involving radioactive material or a nuclear device.

• And, two, the President has also signed and will soon send to the Senate, amendments to the Convention on the Physical Protection of Nuclear Material. This treaty will establish new international norms for the physical protection of nuclear material and nuclear facilities, including protection from sabotage.

These ongoing efforts complement the Proliferation Security Initiative, which was announced by the President in May 2003. This initiative builds on existing treaties, agreements, and export control regimes within the international community to prevent the proliferation of WMD, their delivery systems and related materials worldwide. The PSI has specifically led to the formation of bilateral ship-boarding agreements designed to facilitate the interdiction of WMD and related materials.

Part 2: Private / Scientific Sector Partnerships

We also need to look to the private sector as a partner in our efforts. Partnerships between the private sector and the government are critical if we hope to get advanced warnings of proliferation plots. The private sector and scientific communities are often our eyes and ears on these matters.

Among other things, we must expand our outreach efforts to research institutions, universities, as well as manufacturers and exporters of sensitive technology to educate them about export laws and to solicit their assistance in preventing illegal foreign acquisition of their products and technical data.

Such visits and outreach efforts often result in tips that lead to criminal investigations nationwide and worldwide. On a frequent basis, law enforcement in this country is contacted by companies who are targeted by foreign agents or arms brokers seeking to acquire their technology for illegal export abroad. These tips form the basis for some of our most robust investigations. We must continue on this path.

Part 3: Mobilize All Tools & Flexibility

We also have to be flexible in how we conduct law enforcement and intelligence operations. Just as we have increasingly shifted our terrorism investigations towards prevention rather than reaction, we must do the same in targeting weapons proliferators and illegal technology brokers.

In the United States over the past few years, we have dramatically enhanced our ability to target terrorist networks by using the full range of legal and intelligence tools in our arsenal. For example, we have made great use of our material support statutes. These statutes allow us to prosecute those who provide money and technical expertise to terrorists even before they can undertake an operation. At the same time, we have increasingly used basic immigration laws and financial crime statutes to target those who may also have a nexus to terrorism. These tools, which have not traditionally been used to combat terrorists, are now being applied in a manner that has allowed us to break up potential terror cells before they can mature.

We need to apply this same approach to the counter-proliferation arena in order to better combat this threat. If we don’t have sufficient evidence to arrest a known weapons technology broker on smuggling or export charges, we need to take a look at their immigration status or their financial transactions to see if they have committed other crimes. We need to be creative and flexible if we are to prevent proliferation plots from maturing to full-scale threats.

Export Enforcement as One Key Tool

One area that I want to focus on in particular is export control. Effective export controls are critical to countering the proliferation of nuclear weapons, their delivery systems and related technologies.

These enforcement mechanisms are specifically designed to curb the illegal export of military items, sensitive technology and other equipment, many of which have direct applications in the development of nuclear weapons and other Weapons of Mass Destruction.

In the post 9/11 world, keeping restricted technology from falling into the wrong hands has never been more important. The technology in question includes military and dual-use equipment, components, data, and other technical expertise. These materials are extremely sensitive and, by law, cannot be exported from the United States without government approval. In the wrong hands, this technology could be used to inflict serious harm on innocent civilians anywhere around the globe, not to mention U.S. allies, U.S. troops overseas, or, ultimately, Americans at home.

Your presence here today is not an academic exercise. We know that terrorist organizations and rogue states are actively seeking to acquire this kind of technology from the United States to advance their weapons systems, and in some cases, their WMD programs. They rarely seek complete weapons systems from the U.S., but rather focus on seemingly innocuous components that they can use as building blocks. Many have targeted our government, private industries, and universities as sources of this material or information. Our cases clearly reflect this.

In recent past, the Justice Department has prosecuted independent arms brokers and foreign agents for attempting to illegally acquire component parts for nuclear weapons systems; guidance systems for rockets and missiles, as well as base ingredients for chemical and biological weapons. In the past several months alone, the Department has charged defendants with illegally supplying missile technology, military night vision data, fighter jet components, and military helicopter data to foreign nations.

Let me give you one recent example:

Federal prosecutors in the District of Columbia recently had a case involving the illegal export of something called a triggered spark gap. This small piece of advanced technology is normally used in medical devices to help doctors break up kidney stones. However, triggered spark gaps also have military applications. Specifically, they can be used to detonate nuclear warheads. The export of these items to certain countries is restricted by the U.S. government — for good reason.

In the case in question, defendants in South Africa and elsewhere attempted to purchase hundreds of these items from a medical supplier in the United States. They represented that the items were going to be put to medical use in hospitals in South Africa. In reality, these goods were to be illegally diverted from South Africa to recipients in another nation for suspected military or nuclear end-use.

Thanks to the outstanding cooperation between South African authorities and U.S. law enforcement agencies, we were able to thwart this nuclear proliferation attempt. The only nuclear triggers that made it to their intended destination had been previously rendered inert by law enforcement, and one of the key defendants in the case was arrested in Colorado, pleaded guilty and was ultimately sentenced to prison.

Because these cases deal with advanced technology and because so many different federal agencies can have jurisdiction, investigating and prosecuting these cases can be extremely complex and time-consuming.

In order to more fully respond to this pressing national security threat, the Justice Department is preparing a national export enforcement initiative that will harness the counter-proliferation assets of the law enforcement and intelligence communities to improve the detection, investigation, and prosecution of persons and corporations violating U.S. export control laws.

One of the key elements of the initiative will be to provide our federal prosecutors with the assistance, training and expertise they need to undertake these specialized prosecutions.

The Department has already taken several steps in this regard. Last month, our National Security Division held a national export control conference, where our federal prosecutors were provided instruction and guidance on export control cases. Trainers from the Justice Department and the relevant investigative agents were on hand to provide comprehensive prosecutorial instruction.

Furthermore, the Department has also recently appointed its first National Export Control Coordinator for the Department to be responsible for, among other things, the development of comprehensive training materials for prosecutors nationwide. This person will also be responsible for coordinating with the many other U.S. law enforcement, licensing and intelligence agencies that play a role in export enforcement.

In the coming months, we will be taking additional steps to move this initiative forward. We know there is a substantial demand by terrorists and rogue regimes for restricted U.S. technology, including nuclear weapons components. And we expect no decrease in that demand in the near future.

It would be the ultimate irony if a foreign terrorist organization intent on harming the United States was able to obtain and use sensitive U.S. weapons components in carrying out such an attack.

Conclusion

In conclusion, as the Attorney General I am concerned about the safety of America and our allies, and as a father I am concerned about the world my sons will inherit.

We have seen the disturbing truth that the terrorist network does not seem to tire.

But our network, as President Bush has often said, will not tire, will not falter, and will not fail. Because our passion is actually deeper than theirs, and our defense of freedom will be eternal.

During a previous, world-wide ideological struggle, Winston Churchill’s passion and dedication in the midst of a war was evident in these words:

“Never give in—never, never, never, never, in nothing great or small, large or petty, never give in except to convictions of honor and good sense. Never yield to force; never yield to the apparently overwhelming might of the enemy.”

In our jobs, in our network, never giving in means we steadfastly pursue the goal, every day, of preventing terrorism, of protecting free and innocent souls.

Our network will prevail. And I’m proud to serve in it, side-by-side with all of you.

Thank you. May God bless you and may He guide you in these important efforts.

###


513 posted on 06/11/2007 2:44:30 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: JohnathanRGalt; backhoe; All

ON THE NET...

www.youtube.com/results?search_type=search_videos&search_query=mujahideen&search_sort=video_date_uploaded&search_category=0

video.google.com/videosearch?q=mujahideen&num=10&so=1&start=0


533 posted on 06/11/2007 11:55:00 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

http://www.freerepublic.com/focus/keyword?k=nuclear

#

DHS.GOV - DOMESTIC NUCLEAR DETECTION OFFICE
http://www.dhs.gov/xabout/structure/editorial_0766.shtm

#

FBI.GOV - WEAPONS OF MASS DESTRUCTION Homepage
http://www.fbi.gov/hq/nsb/wmd/wmd_home.htm

###
###

http://www.fbi.gov/page2/june07/nuclear061207.htm

“NUCLEAR TERRORISM
Examining the Issues”

06/12//07

#

Previously...

http://www.fbi.gov/page2/june07/nuclear061107.htm

“NUCLEAR TERRORISM
Talking Prevention in Miami”

06/11//07


577 posted on 06/12/2007 6:11:48 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

VIDEO/blog:

http://hotair.com/archives/2007/06/13/new-vent-how-to-take-a-life/

New Vent: “How to Take a Life”
posted at 10:59 pm on June 13, 2007 by Bryan


685 posted on 06/14/2007 7:37:43 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

http://www.jihadwatch.org/archives/016957.php
(AMERICANS AGAINST HATE.org)

June 16, 2007
“Keith Ellison to speak at banquet of unindicted co-conspirator in terror funding case”

###

http://www.jihadwatch.org/archives/016954.php
(AMERICAN THINKER.com)

June 16, 2007
“Study shows that support for political Islam correlates to support for terrorism”


753 posted on 06/16/2007 12:23:04 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; backhoe; piasa

ON THE NET...

http://www.internet-haganah.com
http://www.internet-haganah.com/haganah/internet.html
http://internet-haganah.org/hmedia/27apr07/27apr07-salafy_forums.html

#

http://www.jihadwatch.org/archives/016978.php
(UPI via MIDDLE EAST TIMES)

June 18, 2007
“Saudis aim to stop web jihad they once abetted”

#

stepping back in time...

http://memri.org/bin/articles.cgi?Page=archives&Area=sr&ID=SR2303

Special Report - No. 23
November 26, 2003 No.23

“The ‘Islamic Affairs Department’ of the Saudi Embassy in Washington, D.C.”
By Steven Stalinsky


842 posted on 06/18/2007 2:24:58 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; backhoe; JohnathanRGalt

http://www.internet-haganah.com
http://internet-haganah.org/hmedia/27apr07/27apr07-salafy_forums.html

#

www.alfirdaws.org
www.alfirdaws.org/vb
2-up.info/uploads/e9e2c0378f.gif
www.alfirdaws.org/vb/showthread.php?p=154233
2-up.info/uploads/5231f6e314.gif
www.alfirdaws.org/vb/showthread.php?t=35605


936 posted on 06/19/2007 2:27:07 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; backhoe; piasa; Godzilla; nwctwx

http://www.freerepublic.com/focus/keyword?k=internet

#

http://analysis.threatswatch.org/2007/06/terror-web-20/

“Terror Web 2.0
The Net-Centric Operations of Terrorist Groups Today”
By Guest Contributor Jeffrey Carr

SNIPPET: “The latest phase of the Internet revolution, which has been widely referred to as Web 2.0, has not been overlooked by web-based terror networks. A recent study by the Artificial Intelligence Lab of the University of Arizona details precisely how these net-savvy terrorists are using the Web for fund-raising, recruitment, propaganda, logistical support, communications, training, and even cyber warfare.

The following table breaks down terrorist objectives and how they are supported by web sites and web-based features:”


956 posted on 06/20/2007 1:00:51 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: nwctwx; Godzilla; JohnathanRGalt; abu afak; yonif; ganeshpuri89; SJackson; backhoe; piasa; All

ON THE NET...

MEMRITV.org - VIDEO CLIPS - TOPIC: “SUICIDE (MARTYRDOM) OPERATIONS”
http://www.memritv.org/Search.asp?ACT=S5&P1=75
http://www.memritv.org/Search.asp?ACT=S5&P1=75&P3=2
http://www.memritv.org/Search.asp?ACT=S5&P1=75&P3=3
http://www.memritv.org/Search.asp?ACT=S5&P1=75&P3=4
http://www.memritv.org/Search.asp?ACT=S5&P1=75&P3=5
http://www.memritv.org/Search.asp?ACT=S5&P1=75&P3=6

###
###

http://memri.org/bin/articles.cgi?Page=subjects&Area=jihad&ID=SP163107

Special Dispatch Series - No. 1631
June 22, 2007 No.1631

“Palestinian MP From Hamas Dr. Yunis Al-Astal on Women’s Participation in Jihad - From Islam’s Beginnings To Modern Female Suicide Bombers”

SNIPPET: “The following are excerpts from an interview with Dr. Yunis Al-Astal, a Palestinian MP representing Hamas, which aired on Al-Rafidein TV on June 17, 2007.

TO VIEW THIS CLIP VISIT: http://www.memritv.org/search.asp?ACT=S9&P1=1491


1,026 posted on 06/22/2007 12:29:54 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

http://travel.state.gov/travel/cis_pa_tw/pa/pa_1161.html

PUBLIC ANNOUNCEMENT

U.S. DEPARTMENT OF STATE
Office of the Spokesman
This information is current as of today, Sun Jun 24 2007 02:33:25 GMT-0700.

Worldwide Caution

April 10, 2007


1,128 posted on 06/24/2007 2:33:47 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

sehadetvakti.com

#

http://www.internet-haganah.com/harchives/006109.html

25 June 2007
“AGITPROP - glorious video and images of Uzbek mujahedeen”


1,171 posted on 06/25/2007 1:20:16 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; backhoe; piasa

Note: Photos included.

Note: The following text is a quote:

http://www.assistnews.net/Stories/2007/s07060145.htm

Monday, June 25, 2007

“Injured Pakistani Christians talk about Muslim attack
But Muslims downplay the June 17th violence”

By Sheraz Khurram Khan
Special Correspondent for ASSIST News Service in Pakistan
FAISALABAD, PAKISTAN


1,205 posted on 06/26/2007 1:02:29 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All; backhoe; piasa

http://www.freerepublic.com/focus/keyword?k=humanbombs
http://www.freerepublic.com/focus/keyword?k=suicidebombers
http://www.freerepublic.com/focus/keyword?k=homicidebombers

###

http://www.freerepublic.com/focus/f-news/1842530/posts?page=22#22

###

http://osint.internet-haganah.com/archives/001254.html

June 28, 2007

“One on One with Anat Berko: What makes human bombs tick?”
Ruthie Blum, THE JERUSALEM POST Jun. 28, 2007


1,339 posted on 06/28/2007 6:12:27 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All

RECAP:

http://www.freerepublic.com/focus/keyword?k=scuba
http://www.freerepublic.com/focus/keyword?k=scubadivers


1,345 posted on 06/28/2007 9:24:23 PM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

To: All
RECAP:

JIHAD WATCH.org (UPI.com, by Shaun Waterman, June 4, 2007): "FBI WARNS ON AL-QAEDA'S ENGLISH MESSAGES" (ARTICLE SNIPPET: "The FBI says al-Qaida is issuing video messages in English to get Muslim extremists in the United States to carry out terror attacks. Speaking on C-SPAN Television, FBI Director of Public Affairs John Miller said al-Qaida leaders have stepped up the tempo of their public messages in an effort to inspire others to compensate for their network's reduced ability directly to execute attacks.") (June 4, 2007) (Read More...)
INTERNET-HAGANAH.com: "INTERNET" (Read More...)

INTERNET-HAGANAH.org: "The 'Top Twelve' List of Arabic Salafyist/Jihadist Forums" (April 27, 2007) (Read More...)

MEMRI.org: "JIHAD AND TERRORISM STUDIES PROJECT" (Read More...)


JIHAD WATCH.org (by Ronald Kessler for NEWSMAX.com): "FBI's MUELLER: BIN LADEN WANTS TO STRIKE U.S. CITIES WITH NUCLEAR WEAPONS" (ARTICLE SNIPPET: "Osama bin Laden and his terrorist group desperately want to obtain nuclear devices and explode them in American cities, especially New York and Washington, D.C., FBI Director Robert S. Mueller III tells NewsMax. In an exclusive interview, Mueller also acknowledged that bin Laden is still active, though isolated. The director revealed that the Bureau believes the terrorist leader continues to communicate with al-Qaida cells, some of which remain in the U.S.") (May 18, 2007) (Read More...)

JAMESTOWN.org - Terrorism Focus: "JIHADIS ENCOURAGE LONE ACTS OF TERRORISM" by Abdul Hameed Bakier (May 15, 2007) (Read More...)

More Links (Read More...)

1,361 posted on 06/29/2007 4:36:18 AM PDT by Cindy
[ Post Reply | Private Reply | To 8 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson