Category Archives: Land of the Free | Perspective

Report: Obama Knows Where Benghazi Terrorists Are… But Does Nothing

 

Americans were shocked and saddened at the death of four Americans in a terrorist attack in Benghazi.  That feeling has turned to outrage as they have discovered that the State Department knew an attack was imminent, yet cut security. The CIA had men involved in the attack and ensuing rescue and escape, yet they have not conducted their own investigation into who committed such an atrocity on their own personnel.  The White House has done little to answer the questions

Related posts:

  1. Charges Finally Filed Against Benghazi Terrorists
  2. Obama Permanently Withdraws Team Tracking the Benghazi Terrorists
  3. Ted Cruz Introduces Bill to Give $5M Reward for Benghazi Terrorists

Report: Obama Knows Where Benghazi Terrorists Are… But Does Nothing
Ben Marquis
Mon, 21 Apr 2014 17:11:37 GMT

BREAKING: Florida House Demands “Convention of the States” to Stop Obama

 

Last year, around 100 lawmakers from various states got together at Mt. Vernon to discuss a Constitutional Article V Convention of States. The main purpose of the possible Convention would be a balanced budget amendment to the Constitution, although there is discussion of other potential amendments that could be proposed, all with the intent of reining in and limiting the federal government. That small group of lawmakers returned to their respective states and began spreading the word, and now the

Related posts:

  1. BREAKING: Georgia Officially Demands a “Convention of the States” to Stop Obama
  2. VICTORY: Arizona’s House Demands a “Convention of the States” to Fight Obama
  3. REBELLION: Alaska’s House Demands a “Convention of the States”

BREAKING: Florida House Demands “Convention of the States” to Stop Obama
Ben Marquis
Tue, 22 Apr 2014 16:03:58 GMT

Sarah Palin Calls for a “Convention of the States” to Stop Obama

 

Sarah Palin renewed her call for a “Convention of the States” today. She has joined conservatives like George Will and Mark Levin in supporting a constitutional, Article V “Convention of the States” in order to propose specific amendments designed to rein in and limit the federal government running wild under President Obama. More and more people, legislators and states continue to join the growing movement calling for a “Convention of the States”. Palin made a post to her Facebook page,

Related posts:

  1. Sarah Palin: Time for the States to Fight Obama
  2. BREAKING: Florida House Demands “Convention of the States” to Stop Obama
  3. Alabama Calls for “Convention of the States” to Stop Obama

Sarah Palin Calls for a “Convention of the States” to Stop Obama
Ben Marquis
Tue, 22 Apr 2014 19:30:13 GMT

The IRS is a Private Collection Agency for the US Federal Reserve

 

This taxpayer should’ve had a V8The Internal Revenue Service is considered to be a Bureau of the Department of the Tresaury; however, like the Federal Reserve, it is not part of the Federal…
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

The IRS is a Private Collection Agency for the US Federal Reserve
noreply@blogger.com (Charleston Voice)
Tue, 22 Apr 2014 21:35:29 GMT

NRA surprisingly credited with crafting new anti-gun laws

 

We never have trusted the NRA. Published time: April 22, 2014 ​The tides may be turning within the National Rifle Association: according to a new report, America’s largest gun-lobbying group has…
[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

 

NRA surprisingly credited with crafting new anti-gun laws
noreply@blogger.com (Charleston Voice)
Wed, 23 Apr 2014 00:56:17 GMT

New Clinton-Era Docs Reveal Insider Push for Wall Street Deregulation

 

Writing in the Guardian newspaper on Saturday, journalist Dan Roberts details how newly released documents from inside the Clinton adminstration reveal how the president’s economic advisors at the time downplayed the possible negative impacts of deregulating Wall Street as they pushed for measures that many critics say ultimately led to the financial crash of 2008.

[field_image_caption-raw]

read more

New Clinton-Era Docs Reveal Insider Push for Wall Street Deregulation
jon
Sat, 19 Apr 2014 14:55:00 GMT

'Corporate Colonialism': Protesters Slam TPP, US Military 'One-Two Punch'

 

Protest against Malaysia’s participation in Trans-Pacific Partnership negotiations in Kuala Lumpur on July 19, 2013. (Photo: EPA/AZHAR RAHIM)As President Barack Obama prepares to embark on his fifth visit to the Asia-Pacific region, grassroots protests against U.S. efforts to ram through the Trans-Pacific trade deal and the U.S. military pivot to Asia are mounting on both sides of the Pacific.

[field_image_caption-raw]

read more

‘Corporate Colonialism’: Protesters Slam TPP, US Military ‘One-Two Punch’
Sarah Lazare
Tue, 22 Apr 2014 17:10:46 GMT

Four Years After BP's Deepwater Horizon Dumped 200 Million Gallons of Oil Into Gulf, 50-plus Citizen Groups Call on EPA to Extend Oil Giant's Suspension From Government Contracts

 

With the approach of the fourth anniversary of the BP Deepwater Horizon disaster in the Gulf, more than 50 conservation and public interest groups — the majority representing Gulf and Lake Michigan communities — today called on the U.S. Environmental Protection Agency to reverse its premature decision to reinstate BP as a federal contractor for oil exploration, drilling and production.

read more

Four Years After BP’s Deepwater Horizon Dumped 200 Million Gallons of Oil Into Gulf, 50-plus Citizen Groups Call on EPA to Extend Oil Giant’s Suspension From Government Contracts
Sarah Lazare
Fri, 18 Apr 2014 19:28:49 GMT

Reject & Protect: Farmers, Ranchers, and Tribes Protest Keystone XL with Week-Long DC Encampment

 

This April 22-27, the Cowboy and Indian Alliance (CIA), a group of ranchers, farmers and indigenous leaders, will host an encampment on the National Mall for a week’s worth of “Reject and Protect” actions against the Keystone XL tar sands pipeline.

read more

Reject & Protect: Farmers, Ranchers, and Tribes Protest Keystone XL with Week-Long DC Encampment
jacob
Mon, 21 Apr 2014 19:18:27 GMT

THIS IS THE MOST ABSURD DEVELOPMENT EVER!!! COME ON!!!! ARE YOU KIDDING?!? – Ikea Introduces Meatless Meatball, Highlights Need for More Corporate Action to Help Cut Meat Consumption

 

Following the latest United Nations report on climate change, retail giant Ikea says it will introduce “lower carbon alternatives” to its popular Swedish meatballs, including a vegetarian version. This is one of the first times a major retailer has introduced a meatless menu item explicitly to combat climate change.

read more

Ikea Introduces Meatless Meatball, Highlights Need for More Corporate Action to Help Cut Meat Consumption
jacob
Tue, 22 Apr 2014 15:35:32 GMT

NJ Mumps Victims Were Vaccinated

 

In other news: Measles Outbreak Traced to Fully Vaccinated Patient for First Time. Via: ABC News: An outbreak of mumps among New Jersey college students has highlighted the “weak sister” in the MMR vaccine. At least eight students at the Stevens Institute of Technology in Hoboken have contracted the contagious virus despite having received two […]

NJ Mumps Victims Were Vaccinated
Kevin
Sat, 19 Apr 2014 13:40:44 GMT

The Next Shoe Just Dropped: Court Denies Attorney-Client Privilege

 

This article was written by Simon Black and originally published at Sovereign Man Blog In the Land of the Free, people grow up hearing a lot of things about their freedom. You’re told that you live in the freest country on the planet. You’re told that other nations ‘hate you’ for your freedom. And you’re told that you […]

The Next Shoe Just Dropped: Court Denies Attorney-Client Privilege
Brandon
Sun, 20 Apr 2014 10:14:03 GMT

Obama wants to train Libyan pilots, again

 

WASHINGTON – Back in 1979 when a mob attacked and burned the U.S. embassy in Tripoli, Libya, while an unstable Moammar Gadhafi was in power, American officials decided to respond by banning Libyan nationals from entering the U.S. to train as pilots or nuclear scientists.

Now, following a 2012 attack by Islamists that killed America’s ambassador and three other Americans in Benghazi, Libya, and the Arab Spring that destabilized other North African and Middle Eastern nations, and which, according to one analysis, left “particularly severe” fragmentation of Libyan society so that the “chances of the country’s dissolution are high,” American officials want to drop that ban.

The request to lift the Reagan-era passport ban that restricts Libyan nationals from entering the U.S. to train for those two positions is coming from officials with the Department of Homeland Security and the 9/11 Commission – because, “It simply isn’t needed to keep America safe from harm.”

It was earlier this month at a joint congressional hearing that House Oversight and Government Reform Committee members pressed Border Security Subcommittee officials to give sound reasoning for the current administration’s request in light of late-March reports that indicate Libya is overrun by al-Qaida, Muslim Brotherhood and other terrorist-backed Islamist militias and is on the verge of a civil war.

A commentary at Gatestone Institute even noted there is a move to bring an Islamic monarchy back to Libya.

And according to a just-released report by Clare M. Lopez of the Citizens Commission on Benghazi, “Early 2011 was swarming with al-Qaida and Muslim Brotherhood militias and affiliates fighting to overthrow Moammar Gadhafi’s regime.”

But Democrats are calling the restriction “an anachronistic relic of a bygone era.”

“Why are we willing to risk, no matter the likelihood, chancing Libyan extremists or terrorists to come here to essentially learn the skills to commit acts of terror … why now specifically? What has changed? The burden of advocating for change, in my judgment, in the status quo lies with the administration,” Rep. Trey Gowdy, R-S.C., said in testimony.

Oversight committee members cited Obama’s “failed” promise to secure diplomatic posts worldwide immediately following the 2012 Benghazi attacks.

“I have also directed my administration to increase our security at diplomatic posts around the world,” Obama said then. “Make no mistake, we will work with the Libyan government to bring to justice the killers who attacked our people.”

But nothing has happened yet.

According to Oversight testimony, DHS Assistant Secretary of International Affairs and Chief Diplomatic Officer Alan Bersin, formerly an Obama recess appointee, wrote a memo last February to then-DHS Secretary Janet Napolitano recommending the secretary take regulatory action to rescind the rule. His rationale for rescinding the rule echoed the same reasons CBP officials gave during the testimony.

Bersin stated in the memo, “DHS has determined that maintaining this regulation would no longer reflect current U.S. government policy toward Libya” while failing to mention the Benghazi attacks.

“What’s most surprising is that the memo postdates the tragic day in Benghazi when our country lost four Americans during a terrorist attack,” Oversight Committee member Jason Chaffetz, R-Utah, said in the hearing.

Chaffetz said Libya was so broken down at the time of the attacks that it was impossible to obtain ground intelligence.

“We couldn’t even send our FBI into eastern Libya for 18 days because it was so dangerous. We couldn’t get the intelligence that we needed. We couldn’t even get the FBI to go into that part of the country. And yet we want to give those same people a visa to come to the United States to learn about nuclear sciences. Wow,” Chaffetz said.

While failing to describe the state of chaos in Libya, Bersin in his memo cited the current administration’s plan to “encourage engagement and educational exchanges in coming years with the Libyan government.”

He said the Defense Department is involved in a $2 billion deal to purchase aircraft and conduct pilot training and ground crew training and that the money would go to other countries if the visa restrictions on Libyans were not lifted.

“The Departments of Defense and State have made it clear that absent its rescission the regulation will significantly hamper these efforts,” he said in the memo.

To support their argument, Democrats said recent Defense Department reports state the fleet is aging, needs repair, more flight crew members need to be trained, and the only thing standing in the way of procurement are the visa restrictions. Democrats cited partisan policy as the roadblock to Libya’s successful transition to a democratic government.

“Members on the other side of the aisle may raise the unfortunate attacks in Benghazi at this hearing today. But that event actually underscores why we should lift the visa restriction. On the night of the attack, it was one of those very same Lockheed C-130 transport planes that the Libyan government used to rescue and evacuate the surviving consular personnel at the U.S. compound in Benghazi. Rather than used against us, that plane helped Americans survive,” Rep. Zoe Lofgren, D-Calif., said in testimony.

In a column recently published at Accuracy in Media, Clare M. Lopez, a senior fellow with the Center for Security Policy and a member of the Citizens’ Commission on Benghazi, said that on the heels of the attacks, a new presidential finding cemented policy to lend material support to terrorism.

“The next chapter in the U.S. jihad wars was under way … and the American people barely noticed,” she said.

Obama wants to train Libyan pilots, again
Alana Cook
Wed, 23 Apr 2014 01:26:59 GMT

Identity Dominance: The U.S. Military’s Biometric War in Afghanistan

 

For years the U.S. military has been waging a biometric war in Afghanistan, working to unravel the insurgent networks operating throughout the country by collecting the personal identifiers of large portions of the population.  A restricted U.S. Army guide on the use of biometrics in Afghanistan obtained by Public Intelligence provides an inside look at this ongoing battle to identify the Afghan people.     

Mohammad Zahid was not the target of a joint military operation that came through his village in Khost Province in late February 2012.  However, that day the twenty-two year old man who claimed to be a student was arrested and eventually convicted in an Afghan court because his fingerprints reportedly matched those found on an improvised explosive device (IED) cache that had been discovered the previous year.

Zahid was one of more than a hundred military-age males that were scanned that day by the joint coalition forces and Afghan National Army operation.  As part of its effort to combat insurgent forces interspersed within an indigenous population, the use of biometrics has become a central component of the U.S. war effort.  Having expanded heavily since its introduction during the war in Iraq, biometric identification and tracking of individuals has become a core mission in Afghanistan with initiatives sponsored by the U.S. and Afghan governments seeking to obtain the biometric identifiers of nearly everyone in the country.

Though there is no formal doctrine or universally accepted tactics, techniques, and procedures for using biometrics throughout the U.S. military, a 2011 U.S. Army handbook and several other documents obtained by Public Intelligence provide insight into the practical use of biometrics in Afghanistan, showing both the level of collection and the functional use of the data for intelligence gathering, force protection and even obtaining criminal convictions.  By collecting vast amounts of information on the population of Afghanistan, including both friend and foe alike, the U.S. military has sought to achieve identity dominance by undermining the fluid anonymity of terrorist and criminal networks and attaching permanent identities to malicious actors.

What is biometrics?

While the use of biometrics has become an increasingly important part of the war in Afghanistan, there is a fundamental lack of agreement about the doctrine surrounding the collection and use of biometric information.  An introduction to the 2011 U.S. Army Commander’s Guide to Biometrics in Afghanistan states that there is “no formal doctrine; universally accepted tactics, techniques, and procedures; or institutionalized training programs across the Department of Defense” for biometric capabilities.  Despite this lack of formal doctrine, the U.S. military is currently using more than 7,000 devices to collect biometric data from the Afghan population.  Though biometrics can take the form of any “measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition,” the biometric identifiers being collected in Afghanistan consist primarily of fingerprints, iris scans and facial photographs.  Other biological characteristics, which are referred to as modalities, that can be used to identify a person include certain types of voice patterns, palm prints, DNA, as well as behavioral characteristics such as gait and even keystroke patterns on a keyboard.

The U.S. military currently uses three devices for collecting the bulk of the biometric data harvested in Aghanistan: the Biometrics Automated Toolset (BAT), Handheld Interagency Identity Detection Equipment (HIIDE) and Secure Electronic Enrollment Kit (SEEK).  The BAT is used primarily by the Army and Marine Corps and consists of a laptop computer and separate peripherals for collecting fingerprints, scanning irises, and taking photographs.  The HIIDE is more mobile, providing a handheld device capable of collecting fingerprints, scanning irises and taking photographs.  Like the BAT, the HIIDE can connect to a network of approximately 150 servers throughout Afghanistan to upload and download current biometric information and watchlists.  The SEEK is also a handheld device with many of the same capabilities of the HIIDE, though it also has a built-in keyboard for remotely entering biographical information on the subject.  Used primarily by special operations forces, the SEEK will eventually replace the HIIDE as the standard collection device for the Army and Marine Corps.

Airman 1st Class Michael Vue, 455th Expeditionary Security Forces Squadron entry controller, scans an Afghan woman’s iris in the waiting area of the Egyptian Hospital at Bagram Airfield, Afghanistan, on April 16. Medical teams use biometrics to identify and track the records for all incoming patients by scanning their iris and fingerprints and then inputting the information into a database. Photo via U.S. Air Force.

Data from these devices is stored in local and national databases which can be searched and compared with other intelligence information to help identify enemy combatants.  All biometric data collected in Afghanistan is ultimately sent back to the DOD’s Automated Biometric Identification System (ABIS) located in West Virginia, where it is stored and also shared with the Department of Homeland Security (DHS) and FBI.  Partnerships with other nations also allow the DOD to run data against biometrics collected by foreign governments and law enforcement.

Enroll Everyone

Though the use of biometrics is relatively new for U.S. forces, collection efforts in Afghanistan have become ubiquitous, taking in data on large swaths of the population from government officials to local villagers.  In 2009, it was reported that even foreign journalists covering the war in Afghanistan would be required to provide their biometric data before being accredited and provided access to military facilities.  The collection of biometric data is viewed as being so essential to the war effort that the Afghan Ministry of Interior was enlisted to help run a program called Afghan 1000, which provides a comprehensive framework for collecting biometric data on the citizens of Afghanistan.  The program established a goal of enrolling eighty percent of the country’s population by 2012, covering nearly 25 million people.  While the actual enrollment numbers are not public, the Afghan 1000 program has been in operation for several years, collecting data for every traveler passing through Kabul International Airport, border crossings and Afghan Population Registration Department offices throughout the country.

The stated goal of the Afghan effort is no less than the collection of biometric data for every living person in Afghanistan.  At a conference with Afghan officials in 2010, the commander of the U.S. Army’s Task Force Biometrics Col. Craig Osborne told the attendees that the collection of biometric data is not simply
about “identifying terrorists and criminals,” but that “it can be used to enable progress in society and has countless applications for the provision of services to the citizens of Afghanistan.”  According to Osborne, biometrics provide the Afghan government with “identity dominance” enabling them to know who their citizens are and link actions with actors.  “Your iris design belongs only to you and your left and right irises are different,” Osborne said at the conference.  “A name can be changed or altered illegally or even legally, but once your iris is formed at the age of six months, it cannot be altered, duplicated or forged.”

The U.S. Army Commander’s Guide to Biometrics in Afghanistan recommends that “all combat outposts and checkpoints throughout Afghanistan make it a priority to collect biometric data from as many local nationals as possible.”  During cordoning operations, the guide advises soldiers to “enroll everyone” including the dead, from which DNA is often collected using buccal swabs to capture the cells that line the mouth.  While Afghanistan offers “an extraordinarily complicated environment for the broad employment of biometrics,” the guide notes that the “payoff to U.S. and coalition forces is so great in terms of securing the population and identification of bad actors in the country, that commanders must be creative and persistent in their efforts to enroll as many Afghans as possible.”

U.S. Army Spc. Robert Irwin, serving with 2nd Platoon, D Company, 3rd Battalion, 509th Infantry Regiment, 25th Infantry Division, Task Force Gold Geronimo, uses his Handheld Interagency Identity Detection Equipment (HIIDE) to scan a local Afghan man’s fingerprints, Paktya Province, Afghanistan, Jan. 30, 2012. Photo via U.S. Army.

In a section titled “Population Management,” the U.S. Army’s guide recommends that “every person who lives within an operational area should be identified and fully biometrically enrolled with facial photos, iris scans, and all ten fingerprints (if present).”  The soldiers must also record “good contextual data” about the individual such as “where they live, what they do, and to which tribe or clan they belong.”  According to the guide, popuation management actions “can also have the effect of building good relationships and rapport” by sending the message that the “census” is intended to protect them from “the influence of outsiders and will give them a chance to more easily identify troublemakers in their midst.”  A checklist included in the section includes the following instructions:

  • Locate and identify every resident (visit and record every house and business). At a minimum, fully biometrically enroll all military-age males as follows:
    • Full sets of fingerprints.
    • Full face photo.
    • Iris scans.
    • Names and all variants of names.
    • BAT associative elements:
      • Address.
      • Occupation.
      • Tribal name.
      • Military grid reference of enrollment.
  • Create an enrollment event for future data mining.
  • Listen to and understand residents’ problems.
  • Put residents in a common database.
  • Collect and assess civil-military operations data.
  • Identify local leaders and use them to identify the populace.
  • Use badging to identify local leaders, and key personnel.
  • Cultivate human intelligence sources.
  • Push indigenous forces into the lead at every possible opportunity.
  • Track persons of interest; unusual travel patterns may indicate unusual activities.

Widespread enrollment of the population or the “census” as the guide refers to it, is seen in Afghanistan “as supportive of the local government, particularly if accompanied with a badging program that highlights the government’s presence in an area.”  Tribal leaders and clan heads can use biometrics to control their local area which can lend “authority to tribal leadership by helping them keep unwanted individuals out of their areas.”

Biometric Watch Lists

One of the most essential products of the widespread collection of biometric data in Afghanistan is the Biometric Enabled Watch List (BEWL).  Known as “the watch list,” the BEWL is a “collection of individuals whose biometrics have been collected and determined by [biometrics-enabled intelligence (BEI)] analysts to be threats, potential threats, or who simply merit tracking.”  When loaded onto a biometrics collection device like the HIIDE, the BEWL “allows for instantaneous feedback on biometrics collections without the need for real-time communications to the authoritative biometrics database,” allowing the soldier to immediately identify persons of interest.

Once BEI analysts combine all of the data from biometric enrollments, forensic evidence, and other forms of intelligence they develop the BEWL in cooperation with numerous other intelligence agencies and organizations throughout the government.  At least twenty-nine dedicated BEI analysts located throughout Afghanistan work to create the BEWL and individual units can request that specific individuals be added or removed from the list.  When a person’s biometric data is collected in Afghanistan and they are not matched to an entity on the watch list, the data and “associated contextual information required for enrollment” are transmitted back to the ABIS in West Virgina for matching against all other collected biometrics, including the 90 million fingerprint entries collected by DHS and 55 million from criminal enrollments made by the FBI.  If a match is found there, the information is sent to the National Ground Intelligence Center (NGIC) in Charlottesville, VA which generates a biometrics intelligence analysis report (BIAR) detailing the history and potential threat posed by the individual.  NGIC then contacts Task Force Biometrics in Afghanistan which notifies the proper unit in the operational environment.  Depending on the unit collecting the biometric data, this process can take anywhere from a few minutes to several days if the match is made against a latent fingerprint.  Whether a match is ultimately found or not, all information is stored for further use in the BEI process.

Biometrics exploitation and enrollment linkage

A figure from the U.S. Army Commander’s Guide to Biometrics in Afghanistan explaining the linkage between exploitation of biometric information and enrollment on the battlefield.

Even when it is obvious that the people being enrolled have no connection to the insurgency, the Commander’s Guide to Biometrics in Afghanistan emphasizes that “all collections are important.”  The guide states that identification of the “population in a particular area is essential to effective counterinsurgency operations” and essential to a unit’s capacity for “owning ground” in a combat zone.  Units must know “who lives where, who does what, who belongs, and who does not.”  Mapping the “human terrain” is described as key to security, allowing U.S. forces to know “who they are, what they do, to whom they are related” and to help “separate the locals from the insurgents.”  To aid this effort, the guide recommends demonstrating the “value of biometrics” to subordinates and having a “belief in biometrics” so that the “support staff and leaders do not treat biometrics operati
ons as a check-the-block activity.”

Obtaining Convictions

While biometrics are best known for helping U.S forces identify and locate suspected insurgents in Afghanistan, battlefield forensics has become an increasingly important part of the Afghan justice system, helping to convict individuals of aiding the Taliban by hiding weapons caches or constructing roadside bombs.  The U.S. Army’s guide notes that forensics are “being used at an increasing rate by the Afghan criminal justice system, and convictions are now occurring in the Afghan courts based solely on biometric evidence.”  The U.S. Army’s Afghanistan Theater of Operations Evidence Collection Guide advises soldiers on how to collect various forms of biometric evidence for forensic investigators to provide to Afghan prosecutors in the hopes of obtaining a conviction.  This reliance on criminal convictions is part of a “transition from law of war-based detentions to evidence-based criminal detentions” where U.S. and coalition forces must “coordinate with the relevant local, provincial, or national prosecutors and judges to determine the specific type and amount of evidence deemed credible” by providing “evidence and witness statements for use in an Afghan court of law to enable the National Security Prosecutor’s Unit (NSPU) or a provincial criminal court to prosecute and convict criminal suspects.”  The guide advises soldiers to “enroll all subjects on-site” following a criminal activity and “ensure that a full enrollment is collected, to include iris scans, ten digit fingerprints, a full facial photograph, and other biometric data.”  Complex instructions are included on collecting latent fingerprints from pieces of evidence and collecting DNA samples from potential suspects.  The International Security Assistance Force (ISAF) Guide to Evidence Collection also contains similar instructions including how to make plaster casts of footprint and tire tracks to provide to investigators.

A summary of the conviction of an Afghan man last year for building and emplacing improvised explosive devices (IEDs) that was based entirely upon biometric evidence.

A study in the January 2014 issue of National Defense University’s Joint Force Quarterly found that Afghan courts are increasingly looking for “biometrics as a component of the prosecution’s case.”  Focusing particular attention on the Afghan National Security Court located at the Justice Center in Parwan (JCIP), which is described as a “model for successful use of biometric evidence in criminal prosecutions,” the study describes the “prominent role” that biometrics now play in obtaining convictions at the facility.  In fact, the Afghan National Security Court has obtained convictions in “almost every case where a biometric match has been made between the defendant and the criminal instrument.”  The study also found that sentences are consistently longer for individuals convicted using biometric evidence like fingerprints or DNA.  “Collections and enrollments matter and increase the effectiveness of all other operations” the authors state at the conclusion of the study, instructing their readers to “treat every event as a means to collect additional biometrics.”

The number of convictions in Afghan courts based solely on biometric evidence is unknown, as is the accuracy of the systems used for determining a biometric match.  However, we do know that the number of prosecutions is going up.  One such example is the case of Mohammad Zahid, the twenty-two-year-old man arrested in Khost Province in February 2012.  Zahid was arrested with nothing on his person.  He claimed to be a student and said he had no connection with the Taliban, yet a latent fingerprint from an IED found in a cache the previous year along with cell phones, battery packs and other bomb-making supplies reportedly matched his own.  Zahid was one of over a hundred military-age males enrolled in that village in Khost on February 23, 2012.  Now, he will spend years in prison and, according to his testimony, does not know why his fingerprints were found on the bomb-making equipment discovered by coalition forces.

Identity Dominance: The U.S. Military’s Biometric War in Afghanistan
Public Intelligence
Mon, 21 Apr 2014 01:55:45 GMT

Allen West: Power plant attack a 'dry run'

 

Former U.S. Rep. Allen West, R-Fla.

Former Rep. Allen West, R-Fla., says an attack one year ago on a power plant in California was a “dry run” for something bigger, and American needs to be paying attention.

WND reported the utility company, whose operation was disabled in the attack, has offered a $250,000 reward for the arrest and conviction of the perpetrators.

According to authorities, a team of attackers apparently cut a series of underground fiber optic telephone lines then fired guns at 17 transformers and shot out their cooling systems.

Experts have called the attack an act of terrorism, and West agrees.

He wrote on his website that just a year ago Americans were riveted by the Islamic terror attack at the Boston Marathon.

“But a year ago, there was another attack that while not horrific, was disturbing, and has gone largely unnoticed,” he wrote.

“On April 16, 2013, snipers waged a 52-minute attack on a central California electrical substation. According to reports by Fox News and the Wall Street Journal, the sniper attack started when at least one person entered an underground vault to cut telephone cables, and attackers fired more than 100 shots into Pacific Gas & Electric’s Metcalf transmission substation, knocking out 17 transformers. Electric officials were able to avert a blackout, but it took 27 days to repair the damage,” he wrote.

He said while the FBI doesn’t consider the incident terrorism, the chief of the Federal Energy Regulatory Commission at the time, Jon Wellinghoff, does.

“Wellinghoff … based his conclusion that this was terrorism on the analysis of experts he brought to the crime scene. The analysis pointed to the shell casings having no fingerprints and evidence that the shooting positions had been pre-arranged. No arrests have been made in the case,” West wrote.

“You have to wonder if this is even being pursued by the Obama administration?

“My concern is that this may have been a dry run for something far bigger. We should be demanding an update on the investigation as to the perpetrators of this attack who escaped without detection,” he said.

“If this ends up being a dry hole and just the work of some bad apples, I’ll accept that conclusion. However, I cannot accept the blatant disregard of a deliberate, well planned and executed attack on an electrical substation that left not a trace of evidence — that my friends is not amateurish. Nothing in this day and age of the new 21st Century battlefield can be taken for granted – nothing.”

Read the book that’s documenting the worry about the EMP threat, “A Nation Forsaken.”

See a report on the attack:

A spokesman for the utility, Gregg Lemler, said he would like to see the attackers identified and brought in.

The attack came one day after the Boston Marathon bombing that killed three people and wounded 264 others. The Boston Marathon suspects are from the Russian North Caucasus, which prompted the Federal Bureau of Investigation to get involved in the investigation of the sniper attack on the transformers.

There is a large community of Chechen and North Caucasus immigrants in the San Jose area.

Not easily replaced

The goal of shooting out the 17 large transformers in San Jose apparently was to cause the coolant to drain and the substation’s transformers to burn up and create a major blackout in the area.

In the attack, one or two individuals also went down manholes at the suburban San Jose facility and cut fiber cables that knocked out 911 and landline service to the power station.

Depending on their size, larger transformers are imported and are specially designed, which means they are not easily replaced. Some take up to three years to swap out under normal circumstances.

Video indicates there was more than one shooter. The snipers shot out 17 transformers with AK-47, 7.62x39mm rounds, causing some $15 million in damage and taking a month to repair.

Quick action following the attack allowed officials to reroute power to avoid a blackout.

Dress rehearsal?

In a recent interview with WND, former SEAL operator Christopher Heben said the method by which the transformers were attacked is exactly how the SEALs would have done it.

As a SEAL, Heben said that he and others practiced a takedown of grid systems similar to the one in San Jose to assess vulnerability.

Heben also called the episode a terrorist attack, saying it was possibly practice for larger attacks on the electrical grid system across the country.

Wellinghoff called the attack “the most significant incident of domestic terrorism involving the grid that has ever occurred, and opined that it was a “dress rehearsal to a larger terrorist attack.”

As WND reported last year, former Central Intelligence Agency Director James Woolsey said the San Jose incident was a terrorist attack that could be replicated around the country by lone wolves or organized crime or terrorist groups to cripple the vulnerable national electrical grid system.

Woolsey said the San Jose episode showed that a few determined individuals could attack the grid and affect critical life sustaining interdependent infrastructures that affect millions of Americans.

Chad Sweet, a former Central Intelligence Agency official in the directorate of operations who served as chief of staff to former U.S. Homeland Security Secretary Michael Chertoff, told Fox News “you can’t rule it out” that the San Jose attack was a “preparation for an act of war.”

Sweet, a co-founder of the Chertoff Group who advises the electric power industry on security, believes, however, it is “premature” to call it a terrorist attack, as does the FBI.

Sweet said it is possible, given the sophistication of the attack, that it was an “insider” job. He explained it required knowledge of the location of the fiber phone lines and where to shoot into the transformers from a distance.

If that’s the case, it would coincide with Woolsey’s concerns and with warnings the FBI has given separately to be aware of the prospect of “lone wolves” undertaking terrorist.

The still unsolved San Jose sniper attack also has been followed by a recent report from the New Jersey Regional Operations Intelligence Center that electric grids across the country have faced unauthorized intrusions, making the U.S. grid “inherently vulnerable” to widespread sabotage.

The report said there had been eight intrusions at electrical grids just in New Jersey from October 2013 to January 2014.

The report said that such attacks could knock out power over widespread geographical areas of the country.

There is speculation that the incidents outlined in the NJROIC report may be a prelude to a large, coordinated physical attack on the grid, a view shared by former CIA Director Woolsey and ex-SEAL Heben.

The report also pointed out that very sensitive areas of the electrical grid were found to be lightly monitored, leaving them vulnerable to attack.

“The electrical grid – a network of power generating plants, transmission lines, substations, and distribution lines – is inherently vulnerable,” the report said.

“Transmission substations are critical links in the electrical grid, making it possible for electricity to move long distances and serving as hubs for inter
secting power lines,” according to the report. “Many of the grid’s important components sit out in the open, often in remote locations, protected by little more than cameras and chain-link fences.”

New standards

The North American Electric Reliability Corporation, or NERC, has proposed new standards to enhance the grid’s resilience by requiring physical security for the facilities most critical to the reliable operation of the bulk-power system.

Acting FERC Chairman Cheryl LaFleur said that because the grid is “so critical to all aspects of our society and economy, protecting its reliability and resilience is a core responsibility of everyone who works in the electric industry.”

Under the proposed FERC regulations, the facilities must take at least three steps to provide physical security.

Owners and operators will need to perform a risk assessment of their system to identify facilities which, if damaged or inoperable, could have a critical impact on the bulk-power system.

The overseers also must evaluate potential threats and vulnerabilities and develop and implement security plans.

NERC has 90 days to submit the proposed standards.

The proposal apparently does not include provisions for utilities to harden facilities to resist natural or man-made electromagnetic pulse, or EMP, attacks on the grid.

Allen West: Power plant attack a ‘dry run’
-NO AUTHOR-
Wed, 23 Apr 2014 01:06:16 GMT