This thread has been locked, it will not receive new replies. |
Locked on 05/04/2011 12:18:31 PM PDT by Admin Moderator, reason:
per request |
Posted on 03/30/2011 7:12:26 AM PDT by MestaMachine
Edited on 03/30/2011 12:16:23 PM PDT by Sidebar Moderator. [history]
|
In an effort to spread global jihad and win over new recruits, jihadi media activists are utilizing web-based social networks, particularly Facebook. The recent FBI arrest of Baltimore resident Antonio Martinez, AKA Muhammad Hussain, who expressed his wish to die as a martyr on his Facebook page, highlights the use of Facebook as a tool for propaganda, recruitment and indoctrination by jihad activists and jihadi media activists. In addition to declaring his desire for martyrdom on his page, Martinez is also associated with several jihad sympathizers.
Security and law enforcement authorities now have another virtual arena to deal with in their fight against online jihad, as social network jihad emerges to join the known jihad websites and forums.
The first phase of social network jihad consisted mostly of "Facebook raids," or campaigns aimed at disseminating jihadi propaganda through existing Facebook channels. The second phase, which will be the focus of this report, has seen jihadists establishing a permanent Facebook presence by creating groups and virtual communities affiliated with leading jihadist websites. Thus, numerous features offered by Facebook have been used to promote the ideology of jihad and to spread its messages.
This series of reports aims to cover only the most important and influential virtual groups of the global jihad movement. This first part will deal with Jihad Al-Ummah, an online community that uses Facebook as a platform for jihadi propaganda, and will examine how this community utilizes to its advantage the features Facebook offers its users.
Jihad Al-Ummah An Overview
Jihad Al-Ummah is likely the most important jihad community on Facebook, and arguably one of the most authoritative sources on the Internet outside the jihadi forums. The page is closely affiliated with the Shumukh Al-Islam forum, and serves as a two-way channel or hub for jihadi material: It distributes content from jihadi websites to Facebook users, and liaises between Facebook users and these same websites.
There are several indications as to the nature of this Facebook page. It uses the logo of the Al-Qaeda-affiliated jihadi media group The Media Jihad Brigade two rifles against a background with the inscription "There is no God but Allah, and Muhammad is his prophet." In the field designated by Facebook "Write something about yourself," Jihad Al-Ummah has a running count of the days since the establishment of the Islamic State of Iraq, along with the motto that heads the Shumukh website a clear indication of its affiliation with Shumukh.
The other Facebook groups to which Jihad Al-Ummah links on its Facebook page also indicate the nature of Jihad Al-Ummah; they include the fan page of Sheikh Abu Muhammad Al-Maqdisi, a page dedicated to the Islamic State of Iraq, and the Facebook page of the Salafi-jihadi website Minbar Al-Tawhid W'al Jihad [The Pulpit of Monotheism and Jihad].
Affiliation with Shumukh Al-Islam
Jihad Al-Ummah's affiliation with the Shumukh Al-Islam jihadi forum goes beyond its posting of content from the forum. The team that operates the Jihad Al-Islami Facebook page is registered as a member of the Shumukh forum, and apparently has a good reputation and the respect of the jihadi forum's membership. This is shown by an 'Eid Al-Adha greeting posted by Jihad Al-Ummah on Shumukh on November 16, 2010, which read: "'Eid greetings to the lions of jihad and to the preachers of monotheism, to the commanders of the monotheists of this era, to the lions in all the [battle]fields of jihad... It is with pleasure that on this occasion we, the administration team of the Jihad Al-Ummah Facebook page, wish our dear Islamic nation a blessed 'Eid Al-Adha. We would especially like to dedicate this blessing to its stars, masters, and beacons of glory, among them the emirs of jihad, its commanders and sheikhs on every frontier first and foremost to our Sheikh Abu Abdallah Osama bin Laden, Dr. Aiman Al-Zawahiri, the venerable Sheikh Abu Yahya Al-Libi
" The writer continues, giving holiday greetings to a comprehensive list of Al-Qaeda-affiliated leaders worldwide.
Bringing the Jihadi Message to Facebook
Fulfilling its stated purpose of disseminating jihadi material, Jihad Al-Ummah posts videos, announcements, communiqués, articles and other media produced by the jihadi media groups, usually minutes after they appear on Shumukh. The administrators then tag selected "friends" in these posts, in order to disseminate them among Facebook users.
Bridging Between Facebook and Jihadi Websites
As mentioned, Jihad Al-Ummah serves as a link between Facebook users and the jihadi forums. One example of this is an open Q&A session, announced by Shumukh, with Sheikh Abu Walid Al-Maqdisi, leader of the Gaza based Salafi-jihadi group Jama'at Al-Tawhid W'al Jihad. Jihad Al-Ummah announced the session, collected questions written by its own members, and then posted them in the relevant Shumukh thread.
Evidence of the involvement of Jihad Al-Ummah administrators in the global jihad world, and of their authoritative status, can be seen in correspondence between them and the widow of a suicide bomber, which they then posted on the Jihad Al-Ummah page. A November 14, 2010 post on Shumukh by a fairly senior member announced that one Makram Al-Majeri, aka Abu Al-Bara, a Swedish citizen of Tunisian origin married to a Swedish woman, had carried out a suicide attack in Mosul, Iraq. The local Swedish press reported that his widow, referred to only as "Anna," had received a phone call telling her that her husband had died "a martyr" in Iraq. Apparently, at this point, the widow, who also goes by the name Um Al-Bara, appealed to the administrators of Jihad Al-Ummah, asking for confirmation of his death and for any information of the circumstances in which he died. The administrators replied that they had indeed received credible information from the jihadi forums, and that they would try to find out more details and would then pass them on to her. It can be assumed that further contact was maintained via private channels. In any event, this incident proves that Jihad Al-Ummah is recognized as a credible, trustworthy source of information within global jihad circles.
Dealing with Closures from the Facebook Administration
Facebook is apparently aware of the nature of the content on the Jihad Al-Ummah page; it has removed it several times. However, each time it was shut down, it was summarily reopened by its operators and rejoined by its hundreds of members. The page is always reopened under the same name, with its administrators obviously using different email accounts each time to register on Facebook. Apparently the news of the page's reemergence, and of its new web address, is spread by "tagging" those on a select list of trusted "friends" in posts added to the revived page. It is noteworthy that Jihad Al-Ummah also maintains several mirror pages, with similar name and content. These pages are named (in English): Jihed Elummuh, Jehad ALummah, Jihed oummah, and Jiahed Al Ommah. It is possible that they were created by the team behind Jihad Al-Ummah, as backup in case the main page is closed down, or as a means to disseminate the new address after bringing the main page back online. It is also possible that these mirror pages were created by fans of Jihad Al-Ummah, using the Jihad Al-Ummah logo and name.
Thank you for the maps, LucyT. My prayers for Japan and all the people who are, and will be, affected by this.
It’s getting so hard not to be perpetually depressed
I know you have probably all heard of Iranium, and I believe there are several posts about it on this thread, but it was way back there. Since it is so urgent, and since this administration shows no signs of ever taking a stand for the PEOPLE of Iran, I thought it was worth another post. If you have not seen it, please do.
Thank you.
Azadi in Persian means freedom. Azadi Tower has been an Iranian icon for nearly 40 years, but the recent protests near the monument have brought new meaning to the name "Freedom Tower".
Azadi Tower, located in Tehran's Azadi Square, was built in 1971. Formerly known as Shahyad "Remembrance of the Shahs" Tower, the monument was originally intended to commemorate the accomplishments of modern Iran under the Pahlavi dynasty, which reigned until the Iranian Islamic Revolution of 1979.
The tower was the site of countless demonstrations in 1979, and became a symbol of Iran's renewal following the revolution, thus acquiring its new name, Freedom Tower.
This central square is used both by supporters as well as opponents of the Iranian regime. The site is frequently home to Iranian military demonstrations, and national addresses by President Mahmoud Ahmadinejad.
In June 2009, hundreds of thousands of protesters filled Azadi Square, following the disputed presidential elections. Thirty years after the Islamic Revolution, the tower once more became a rallying point for the struggle for freedom from an oppressive and unwanted government.
Help empower the Iranian people in their struggle for freedom from this violent Islamic regime!
Iran's nuclear program presents a threat to international stability. Yet successive American administrations-Republican and Democratic alike-have misread the intentions and actions of the Iranian regime.
How dangerous is a nuclear Iran, even if it never detonates a weapon? What are the guiding principles of the Iranian leadership? To what lengths would the regime go to carry out its agenda? How far have Iran's leaders already gone to fund the world's most powerful terrorist organizations? And why have American leaders failed to gain the upper hand in relations with Iran during the past 30 years?
In approximately 60 minutes, Iranium powerfully reports on the many aspects of the threat America and the world now faces using rarely-before seen footage of Iranian leaders, and interviews with 25 leading politicians, Iranian dissidents, and experts on: Middle East policy, terrorism, and nuclear proliferation.
■Iranium documents the development of Iran's nuclear threat, beginning with the Islamic Revolution of 1979 and the ideology installed by Supreme Leader Ayatollah Khomeini.
■Iranium tracks Iran's use of terror as a tool of policy, beginning with the 444 day seizure of the U.S. Embassy in Tehran, through Iran's insurgent actions in Iraq and Afghanistan.
■Iranium details the brutal nature of the Iranian regime to its own citizens, and the Iranian people's desire to rejoin the international community.
■Iranium outlines the various scenarios the greater Middle East and the Western world may face should Iran cross the nuclear threshold.
In order for Iranium's important message to have maximum impact, we need YOUR help. \
Just poked around a little at some "Jihad Publications" in a Taliban hangout. All of you have probably seen at least some of the "troofer" stuff out there, this is particularly hilarious.
Reaffirming the principles and purposes of the Charter of the United Nations,
Among the above-mentioned three affirmations, the third one Recognizing the inherent right of individual or collective self-defense in accordance with the Charter is construed by those individuals either ignorant or hypocrites as the green light to invade Afghanistan. However, they tend to forget the details in each of these affirmations. The crucial addition to each of these affirmations is the notion of compliance with the UN Charter. It may only be a phrase for the untrained eye or intentional disregard by those advocating USs global agenda; nonetheless, it is a legal and moral impediment that should not be taken lightly.Determined to combat by all means threats to international peace and security caused by terrorist acts,
Recognizing the inherent right of individual or collective self-defence in accordance with the Charter1
All Members shall settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered.The fundamentals of legality and moral superiority enshrined in the Article 2 of the UN Charter are sufficient in their own right to put to rest any claim of legitimacy of the invasion of Afghanistan. However, there are three exceptions to the Article 2 of the UN Charter: action authorized by the UN Security Council; Article 51 of the UN Charter--the States right of self-defense; and action by regional bodies with authorization from the UN Security Council.
All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.3
Usama Bin Laden is wanted in connection with the August 7, 1998, bombings of the United States Embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. These attacks killed over 200 people. In addition, Bin Laden is a suspect in other terrorist attacks throughout the world.Is it not strange that after 10 years, the FBI of the United States still has no idea who carried out the attacks on September 11, 2001, while the Bush administration and his collection of Neoconservative Zionists knew of Bin Ladens complicity within hours?
The hijackers also left no paper trail. In our investigation, we have not uncovered a single piece of paper in the U.S. or in Afghanistan that mentioned any aspect of the September 11th plot.8He attempted to explain away the lack of evidence by erroneously asserting that the terrorists must have planned meticulously to avoid detection. His assertion amounted to total contradiction and baseless speculation. The absence of evidence is evident from the quote from the FBI webpage seeking Bin Laden for the bombing attacks in Africa in 1998.
Speaking from his Cairo home, Mr Atta described hearing about the attacks after returning from a holiday on the Red Sea on the evening of September 12."My daughter called and said she was going to drop in. She stood at the door and said 'turn on the TV'," he said. Amid images of the jets crashing into the Twin Towers, he saw his son's passport photograph.Meanwhile, during the attacks of September 11, 2001, the entire air defense mechanism of the United States was on a stand down order and not a single fighter plane scrambled even though this was standard operating procedure. Andrew Air Force Base is only 10 miles away from Pentagon and had two squadrons of combat aircraft ready to be scrambled 24 hours a day. This fact was illustrated in San Diego Union--Tribune on September 12:
"As I saw the picture of my son," he said, "I knew that he hadn't done it. My son called me the day after the attacks on September 12 at around midday. We spoke for two minutes about this and that.
"He didn't tell me where he was calling from. At that time neither of us knew anything about the attacks."10
"Air defense around Washington is provided mainly by fighter planes from Andrews Air Force Base in Maryland near the District of Columbia border. The D.C. Air National Guard is also based there and equipped with F-16 fighter planes, a National Guard spokesman said."Corps Maj. Mike Snyder, a spokesman for NORAD, is quoted to have said the following in the Boston Globe September 15 story:
"[T]he command did not immediately scramble any fighters even though it was alerted to a hijacking 10 minutes before the first plane slammed into the first World Trade Center tower... The spokesman said the fighters remained on the ground until after the Pentagon was hit..."The question is why the NORAD did not scramble fighter jets.
And what about the obscure stock transactions? In the week prior to the attacks, the amount of transactions in stocks in American Airlines, United Airlines, and insurance companies, increased 1,200 percent. It was for a value of $15 billion. Some people must have known something. Who?11On October 02, 2001, the Wall Street Journal reported that investigations were underway by the Security Exchange Commission into purchases of large volume of five-year US Treasury note. These purchases were done before the attacks of September 11. In fact, the transactions of US Treasury note included a single trade amounted to $5 billion. However, despite these large transactions, there hardly was any news coverage by the corporate media.
The Investment Dealers Association of Canada told its 190 members that the SEC has identified 38 companies -- including the parent firms of United and American airlines, which lost four aircraft -- whose shares were traded at abnormally high levels in the weeks prior to the attacks, suggesting that buyers and sellers had advance knowledge of planned terrorist acts.The same article added:
The SEC equities list named several big companies that were tenants in the collapsed buildings in the heart of New York's financial district: investment firms Morgan Stanley, the towers' biggest occupant; Lehman Bros.; Bank of America; and financial firm Marsh & McLennan.Meanwhile, put options were purchased for American Airlines and United Airlines:
In the days before the terrorist assaults, unusually high numbers of put options were purchased for the stocks of AMR Corp. and UAL Corp., the parents of American and United -- each of which had two planes hijacked. A put option is a contract that gives a holder the right to sell an asset at a specified price before a certain date. (San Francisco Chronicle, October 03, 2001)On September 20th, Reuters reported unusual activities in stock markets in Germany before the attacks on New York and Washington:
In Frankfurt, bankers also noticed unusual interest in stock-lending in shares of Munich Re, raising the possibility that at least one player may have prepared a short position with advance knowledge of an attack that would send the insurer's shares plummeting.It continued:
One banker, who requested anonymity, said he had received three price inquiries from major French banks about borrowing abnormally large stakes -- millions of shares -- in Munich Re. The requests were never followed up with an actual share loan. 'These inquiries were very big in size and they only asked about one share, and for that reason it stood out,' he said.With these unusual transactions in motion, the CIA and other intelligence agencies that rely on the Prosecutor's Management Information System (Promis), the computer software that monitors and identifies unusual activities in stock market, should have identified these anomalies; however, they did not. Why not, one might ask, unless someone from within the hierarchy was profiting in billions of dollars.
Volatility in Munich Re shares increased sharply before the attack, jumping 30 percent from September 4 to September 7.Yet, the spokesperson for the Eurex claimed:
the exchange, the world's largest derivatives exchange, had probed transactions in the days before and after the attack but found nothing to raise an alarm flag.Yet, the spokesperson for the Eurex claimed:According to Miami Herald article of September 24, 2001, the Bundesbank chief Ernst Welteke said:
a preliminary review by German regulators and bank researchers showed there were highly suspicious sales of shares in airlines and insurance companies, along with major trades in gold and oil markets, before Sept. 11 that suggest they were conducted with advance knowledge of the attacks. Welteke said his researchers came across what he considers almost irrefutable proof of insider trading In the aftermath of the attacks on 9/11, Harvey Pitt, then chairman of the US Securities & Exchange Commission said the following:
"We've heard those reports about terrorists' involvement in our markets.Ten years have passed, yet we have not heard about the result of the investigations into the unusual--to say the leastmarket transactions.Our enforcement division has been looking into a variety of market actions that could be linked to these terrible acts including the subjects of the rumours." (BBC, September 18, 2001)
"The system is so smart that even if there is a news event that triggers a market event it can go back in time, and even the parameters can be changed depending on what is being looked at. It's a very clever system and it is instantaneous. Even with the system, though, we have very experienced and savvy staff in our market-regulations area who are always looking for things that might be unusual. They're trained to put the pieces of the puzzle together. Even if it's offshore, it might take a little longer, but all offshore accounts have to go through U.S. member firms - members of the CBOE - and it is easily and quickly identifiable who made the trades. The member firm who made the trades has to have identifiable information about the client under the 'Know Your Customer' regulations (and we share all information with the Securities and Exchange Commission.)" (TBRNews.org)The existence of such tracking system should make the identification of individuals or group involved relatively easy. But unfortunately, the government is silent about this.
In a returned phone call from the Central Intelligence Agency, press spokesman Tom Crispell denied that the CIA was monitoring "real-time," pre-September 11, stock option trading activity within United States borders using such software as the Prosecutor's Management Information System (PROMIS). 'That would be illegal. We only operate outside the United States,' the intelligence official said.12In fact, Promis was used by a cabal of bankers in the United States to penetrate every bank worldwide and predict its transactions as the following quote illustrates:
"In the late seventies and early eighties, Systematics handled some 60-70% of all electronic banking transactions in the U.S. The goal, according to the diagrams which laid out (subsequently verified) relationships between Stephens, Worthen Bank, the Lippo Group and the drug/intelligence bank BCCI was to penetrate every banking system in the world. This "cabal" could then use Promis both to predict and to influence the movement of financial markets worldwide. Stephens, truly bipartisan in his approach to profits, has been a lifelong supporter of George Bush and he was, at the same time, the source of the $3 million loan that rescued a faltering Clinton Campaign in early 1992." (Promis by Michael C Ruppert of FTW)Thus, any claim by the CIA and NSA about the lack of knowledge about the stock transactions prior to 911 is ludicrous because these intelligence agencies have the modified and advanced form of Promis enabling them to analyze data and predict many outcomes.
The president (Eisenhower) seemed to be eager to take forceful action against Castro, and breaking off diplomatic relations appeared to be his best card. He noted that he was prepared to move against Castro before Kennedys inauguration on the twentieth if a really good excuse was provided by Castro. Failing that, he said, perhaps we could think of manufacturing something that would be generally acceptable. This is but another example of his willingness to use covert actionspecifically to fabricate eventsto achieve his objectives in foreign policy.What Eisenhower wanted was a staged terrorist attacks by elements of the United States Government against the United States and the American people, and blaming it on Cuba, which would provide ample justification for invasion of Cuba. Eisenhower's term ended as President without his hopes of invading Cuba. However, this idea remained with General Lemnitzer.
(Note: The courses of action which follow are a preliminary submission suitable only for planning purposes. They are arranged neither chronologically nor in ascending order. Together with similar inputs from other agencies, they are intended to provide a point of departure for the development of a single, integrated, time-phased plan. Such a plan would permit the evaluation of individual projects within the context of cumulative, correlated actions designed to lead inexorably to the objective of adequate justification for US military intervention in Cuba).1. Since it would seem desirable to use legitimate provocation as the basis for US military intervention in Cuba a cover and deception plan, to include requisite preliminary actions such as has been developed in response to Task 33 c, could be executed as an initial effort to provoke Cuban reactions. Harassment plus deception actions to convince the Cubans of imminent invasion would be emphasized. Our military posture throughout execution of the plan will allow a rapid change from exercise to intervention if Cuban response justifies.
A. Incidents to establish a credible attack (not in chronological order);
3. A "Remember the Maine" incident could be arranged in several forms:1. Start rumors (many). Use clandestine radio.
2. Land friendly Cubans in uniform "over-the-fence" to stage attack on base.
3. Capture Cuban (friendly) saboteurs inside the base.
4. Start riots near the base main gate (friendly Cubans).
5. Blow up ammunition inside the base; start fires.
6. Burn aircraft on air base (sabotage).
7. Lob mortar shells from outside of base into base. Some damage to installations.
8. Capture assault teams approaching from the sea or vicinity of Guantanamo City.
9. Capture militia group which storms the base.
10. Sabotage ship in harbor; large fires -- napthalene.
11. Sink ship near harbor entrance. Conduct funerals for mock victims (may be lieu of (10)).
B. United States would respond by executing offensive operations to secure water and power supplies, destroying artillery and mortar emplacements which threaten the base.
C. Commence large scale United States military operations.
A. We could blow up a US ship in Guantanamo Bay and blame Cuba.
B. We could blow up a drone (unmanned) vessel anywhere in the Cuban waters. We could arrange to cause such incident in the vicinity of Havana or Santiago as a spectacular result of Cuban attack from the air or sea, or both. The presence of Cuban planes or ships merely investigating the intent of the vessel could be fairly compelling evidence that the ship was taken under attack. The nearness to Havana or Santiago would add credibility especially to those people that might have heard the blast or have seen the fire. The US could follow up with an air/sea rescue operation covered by US fighters to "evacuate" remaining members of the non-existent crew. Casualty lists in US newspapers would cause a helpful wave of national indignation.
4. We could develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington. The terror campaign could be pointed at Cuban refugees seeking haven in the United States. We could sink a boatload of Cubans enroute to Florida (real or simulated). We could foster attempts on lives of Cuban refugees in the United States even to the extent of wounding in instances to be widely publicized. Exploding a few plastic bombs in carefully chosen spots, the substantiating Cuban involvement also would be helpful in projecting the idea of an irresponsible government.
5. A "Cuban-based, Castro-supported" filibuster could be simulated against a neighboring Caribbean nation (in the vein of the 14th of June invasion of the Dominican Republic, Guatemala, and Nicaragua at present possible others. These efforts can be magnified and additional ones contrived for exposure. For example, advantage can be taken of the sensitivity of the Dominican Air Force to intrusions within their national air space. "Cuban" B-26 or C-46 type aircraft could make cane-burning raids at night. Soviet Bloc incendiaries could be found. This could be coupled with "Cuban" messages to the Communist underground in the Dominican Republic and "Cuban" shipments of arms which would be found, or intercepted, on the beach.
6. Use of MIG type aircraft by US pilots could provide additional provocation. Harassment of civil air, attacks on surface shipping and destruction of US military drone aircraft by MIG type planes would be useful as complementary actions. An F-86 properly painted would convince air passengers that they saw a Cuban MIG, especially if the pilot of the transport were to announce such a fact. The primary drawback to this suggestion appears to be the security risk inherent in obtaining or modifying an aircraft. However, reasonable copies of the MIG could be produced from US resources in about three months.
7. Hijacking attempts against civil air and surface craft should appear to continue as harassing measures condoned by the government of Cuba. Concurrently, genuine defections of Cuban civil and military air and surface craft should be encouraged.
8. It is possible to create an incident which will demonstrate convincingly that a Cuban aircraft has attacked and shot down a charted civil airliner enroute from the United States to Jamaica, Guatemala, Panama or Venezuela. The destination would be chosen only to cause the flight plan route to cross Cuba. The passengers could be a group of college students off on a holiday or any grouping of persons with a common interest to support chartering a non-scheduled flight.
a. An aircraft at Eglin AFB would be painted and numbered an exact duplicate for a civil registered aircraft belonging to a CIA proprietary organization in the Miami area. At a designated time the duplicate would be substituted for the actual civil aircraft and would be loaded with the selected passengers, all boarded under carefully prepared aliases. The actual registered aircraft would be converted to a drone.
b. Take off times of the drone aircraft and the actual aircraft will be scheduled to allow a rendezvous south of Florida. From the rendezvous point the passenger-carrying aircraft will descend to minimum altitude and go directly into an auxiliary field at Eglin AFB where arrangements will have been made to evacuate the passengers and return the aircraft to its original status. The drone aircraft meanwhile will continue to fly the filed flight plan. When over Cuba the drone will being transmitting on the international distress frequency a "MAY DAY" message stating he is under attack by Cuban MIG aircraft. The transmission will be interrupted by destruction of the aircraft which will be triggered by radio signal. This will allow ICAO radio stations in the Western Hemisphere to tell the US what has happened to the aircraft instead of the US trying to "sell" the incident.
9. It is possible to create an incident which will make it appear that Communist Cuban MIGs have destroyed a USAF aircraft over international waters in an unprovoked attack.
To make sense of the relevance of the above-stated unclassified document, one does not need to be a superb analyst but rather common sense would suffice. Had this plan gone through, thousands of American and Cuban lives would have been lost, simply to fulfill the ego of few war-mongering characters in the Pentagon.a. Approximately 4 of 5 F-101 aircraft will be dispatched in trail from Homestead AFB, Florida, to the vicinity of Cuba. Their mission will be to reverse course and simulate fakir aircraft for an air defense exercise in southern Florida. These aircraft would conduct variations of these flights at frequent intervals. Crews would be briefed to remain at least 12 miles off the Cuban coast; however, they would be required to carry live ammunition in the event that hostile actions were taken by the Cuban MIGs.
b. On one such flight, a pre-briefed pilot would fly tail-end Charley at considerable interval between aircraft. While near the Cuban Island this pilot would broadcast that he had been jumped by MIGs and was going down. No other calls would be made. The pilot would then fly directly west at extremely low altitude and land at a secure base, an Eglin auxiliary. The aircraft would be met by the proper people, quickly stored and given a new tail number. The pilot who had performed the mission under an alias, would resume his proper identity and return to his normal place of business. The pilot and aircraft would then have disappeared.
c. At precisely the same time that the aircraft was presumably shot down a submarine or small surface was presumably shot down a submarine or small surface craft would disburse F-101 parts, parachute, etc., at approximately 15 to 20 miles off the Cuban coast and depart. The pilots returning to Homestead would have a true story as far as they knew. Search ships and aircraft could be dispatched and parts of aircraft found.
"Durakovic and his team have searched for possible alternative causes, such as geological or industrial sources, or the likelihood of Al Qaeda having uranium reserves. But the uranium found is not consistent with the "dirty bomb" scenario proposed by the US (in which stores of radioactive materials might explain the findings), nor is it connected to DU, or an enriched uranium-type dust that has been found in Iraq and Kosovo." [color=#0000ff]http://www.umrc.netIn Iraq, it took up to five years to have any significant effects of exposure to depleted uranium, however, in Afghanistan only after one year, the UMRC research group suspects that 25% of newly born in Kabul showed symptoms of exposure to uranium weapons. The latter factor further strengthens the hypothesis of the UMRC that the US-UK militaries are using uranium ore in their weapons in order to increase its destructive capability. The usage of uranium ore also makes it difficult to trace these weapons to the US-UK militaries and creates a distortion as if the uranium had come from the local uranium deposits. The conclusion of the report was:
"However, marked differences between natural uranium and the uranium used in the metal fragments found in Afghanistan was [sic] uncovered with the use of an electron microscope, which revealed the presence of small ceramic particles produced by the high temperatures created on impact. This method of disguising uranium would benefit governments that are under pressure from the growing anti-DU lobby."The destructive effects of the uranium weapons became evident in the beginning of the bombardments in Afghanistan, when Reuters reported that people died from minor injuries. Public Health Minister Mullah Abbas said:4
"The only conclusion is that the allied forces are now possibly using milled uranium ore in their warheads to maximise [sic] the effectiveness and strength of their weapons, as well as to mask the uranium, hoping that it may be discounted as part of any local natural deposits."
"Our findings prove that this is true. These bombardments have radioactive rays and chemical materials that also cause cancer." (Reuters, October 29, 2001)The news report continued with quotes that further added credibility to the claims of many that the US and the UK had used uranium weapons in Afghanistan. Dr. Wazir a surgeon at Wazir Akbar Khan Hospital had said the following amidst the bombardments:
"We have some patients with superficial injuries with symptoms of chemical weapons." (Reuters, October 29, 2001)According to Dr. Wazir a 10 years old boy, who had superficial injuries died from respiratory problems after the bombing, while another individual, a 50 years old woman also died from minor injuries. The doctor continues by citing three of his other patients-two girls aged 12 and 15 and a boy aged 15-who had only sustained superficial injuries from the US bombings, died hours later from breathing difficulties and internal bleeding. Dr. Wazir continued:
"These are only three examples. There have been other cases where we suspect chemical weapons have been used. Most of the victims have had respiratory problems and internal bleeding for which there is no apparent cause." (Khalifa.com, October 30, 2001)The use of uranium munitions continues to this day. Every day, the fighter aircrafts use these illegal weapons in Afghan villages and towns. The rise in various cancers and different types of congenital deformities attest to the deadly effects of these weapons. The cancers and deformities among new born are virtually identical to the victims in Iraq and the Balkans.
To the shock of President Hamid Karzai's aides,Gen. David H. Petraeussuggested Sunday at the presidential palace that Afghans caught up in a coalition attack in northeastern Afghanistan might have burned their own children to exaggerate claims of civilian casualties, according to two participants at the meeting.14Similarly, NATO made an outrages claim:
Nato believes there was not a single civilian casualty from its operation in Kunar. It says that pro-Taliban villagers have created a propaganda story that was taken up by politicians in Kabul eager to prove their nationalist credentials.15It is this kind of bestiality and lack of regard for human dignity exercised by the upper hierarchy of the US armed forces whose irreverence is seen on daily basis on Afghan soil.
We had almost finished collecting wood when suddenly we saw the helicopters come. There were two of them. They hovered over us, scanned us and we saw a green flash. Then they flew back high up, and in a second round they hovered over us and started shooting. They fired a rocket that hit a tree. The branches fell over me and shrapnel hit my right hand and my side.16The apache Helicopters has the target acquisition designation sight (TADS). In fact, this system enables the pilot with unmistaken capability to differentiate between children collecting firewood and adults with guns:
TADS provides the co-pilot/gunner with search, detection and recognition capability by means of direct view optics, TV or FLIR sighting systems which may be used singly or in combinations according to tactical, weather or visibility conditions.17Another source further confirms the effectiveness of the Apache Helicopters visual and detection capability that would have clearly established that those 10 children were picking firewood, and indeed were children not armed insurgents:
The Apache features a Target Acquisition Designation Sight (TADS) and a Pilot Night Vision Sensor (PNVS) which enables the crew to navigate and conduct precision attacks in day, night and adverse weather conditions.18Taliban and other Insurgents did not come from the Moon. They are the relatives of these victims that have taken arms against the forces of the US and her NATO allies.
THREE WORDS
D R U G S
equal
D O L L A R S
Visste du at “odds” karakter beskyldte meg for å være medlem av gruppen vi var krangler om i noen form for kode som bare er kjent for seg selv i en av sine innlegg og trodde jeg var for dum til å fange den?
Jeg MÅ komme til Walmart en gang i dag. Mine dager og bights er såååå skrudd opp!
Din feil!
|
Two people have asked to be removed from this ping list. If anyone else wants to be removed, pleaae let me know. I don't want to be pinging people who don't want them or aren't interested.
Thanks in advance.
I cannot believe that Facebook cannnot monitor and rid these from their sites....before they take off. No brainer to even just use key words which would give a heads up when they re-open these.
Of course they can. They don't want to.
Don’t forget Cass Sunstein and Samantha Power.
Great job as usual Mesta. At least someone somewhere is getting the truth out.
There are only so many hours in a day. 36, right? Oh, Lord.
Sometimes it sure feels like it.
Thank you for the encouragement.
Turkey to Israel: We won't stop upcoming Gaza flotilla
'
Excerpt:
Turkish rebuttal comes after Israel officially requested that Ankara thwart a planned attempt to launch a 15-ship flotilla, one year after an IDF takeover of a similar endeavor ended with the killing of 9 Turkish activists.
Turkey said on Thursday it had received a request from Israel to help stop activists sailing to Gaza on the first anniversary of an Israeli raid on a Turkish ship, but it said the flotilla plan was not Ankara's concern.
The Free Gaza Movement, a pro-Palestinian activist umbrella group, has said that a flotilla expected in late May would comprise 15 ships with international passengers including Europeans and Americans.
Israel's ambassador to Turkey, Gaby Levy, asked the Turkish government this week to help stop the activists, saying sending humanitarian aide to Gaza outside legal channels was a "provocation," an Israeli diplomatic official told Reuters.
Asked about the request, a Turkish foreign ministry official told Reuters: "We listened to the message given by the Israeli side and told them this is an initiative by civil society."
The official did not elaborate.
***************************************
Hamas official hints Israel killed Italian activist to intimidate future Gaza flotilla members
Excerpt:
Body of Palestinian activist Vittorio Arrigoni found hanging in apartment of Gaza militants earlier in day; Hamas holds rally to honor the activist, says the perpetrators will be punished.
He added that foreign activists like Arrigoni were "our friends" and promised that the perpetrators would be punished.
Snip
Arrigoni was a well-known figure in Gaza, frequently clenching a pipe between his teeth and wearing a beret emblazoned with a likeness of Che Guevara, as well as bracelets in the red, black, green and white colors of the Palestinian flag.
***************************************
Comment: Friends do not do what was done to this man. When will the west and the leftist activists learn that muslims will use them, then abuse them when it suits their purposs. The mind boggles.
**************************************
I've had a brainstorm. Or a brainf*rt. Or something.
We have these huge multimedia resources. So what if we set up an FTP and give the password to the TM pinglist?
Anyway, more odd stuff from the Jihad. I like how they cannot fear allah the way they fear the message of an agent at the door :).
And onother thing: why do all these fat spotted owls dress up like Dame Edna with a beard?
Please remove me from the ping list... sorry but I am on too many ping lists right now.
Well, the jihadis have routines in place to deal with sites going down. There’s always a certain percentage of their sites being temporarily dead (normally around 10%), but they can be brought back in a minute. You’ll also note that they use VB for forum software, these things can be taken down and moved to a different server very quickly.
Of course face book can easily stop the jihadist stuff, but Zuckerman might pay a price in customers/traffic/boycott actions and other economic terror from these guys. They do have money.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.