Go Back   Professional Soldiers ® > UWOA > Insurgencies & Guerrilla Warfare

Reply
 
Thread Tools Display Modes
Old 01-14-2010, 01:54   #1
T-Rock
BANNED USER
 
Join Date: Aug 2009
Location: Western NC
Posts: 1,243
The Islamic Infiltration: Inside Our Government, Armed With Our Secrets...

These Are Not The Terrorists You Are Looking For - move along now...

-"Radical Islam's influence over our government and access to our national security secrets".-

http://www.pjtv.com/video/Bill_Whitt...AXO8JRfTfhxPys

http://www.pjtv.com/video/Bill_Whitt...AXO8JRfTfhxPys
T-Rock is offline   Reply With Quote
Old 01-14-2010, 11:46   #2
Arctic
Asset
 
Join Date: Jan 2010
Location: Ca, L.A. Area.
Posts: 8
IMHO, China, Russia and the Cyber battlefield are more of a concern then the few Jihadists in Government.
__________________
Sink or swim, live or die, survive or perish, I am with my country from this day on. You may depend on it.
- John Adams, 1774

There is nothing so likely to produce peace as to be well prepared to meet the enemy.
- George Washington, 1780
Arctic is offline   Reply With Quote
Old 01-14-2010, 20:19   #3
T-Rock
BANNED USER
 
Join Date: Aug 2009
Location: Western NC
Posts: 1,243
Why tow a narrative as opposed to orienting on facts?
(~2:50 -5:35 part1)

I don’t deny or doubt China and Russia are a threat yet while our country is at war, why do we allow Islamists from the Muslim Brotherhood to help drive our agenda on how we combat the terrorist threat, and to help drive our agenda on how to prosecute this war ?
(6:00-10:30 part1)

It just doesn’t make any sense to me, it’s akin to having allowed an avowed group of Nazis participate in our war planning strategy against the Nazis during WW II - discounting the Nazi ability to communicate our intentions to other Nazis…

The Holy Land Foundation documents mentioned in the above video can be found below - simply mind boggling:
http://www1.nefafoundation.org/hlfdocs2.html

I still haven’t really heard a solid answer regarding Hesham Islam
http://www.investigativeproject.org/...r-the-pentagon

Last edited by T-Rock; 01-14-2010 at 20:36.
T-Rock is offline   Reply With Quote
Old 01-14-2010, 21:16   #4
HowardCohodas
Guest
 
Posts: n/a
Quote:
Originally Posted by Arctic View Post
IMHO, China, Russia and the Cyber battlefield are more of a concern then the few Jihadists in Government.
You are pretty new here so I don't know your communication style, but I surely hope you are kidding.
  Reply With Quote
Old 01-14-2010, 21:26   #5
Team Sergeant
Quiet Professional
 
Team Sergeant's Avatar
 
Join Date: Jan 2004
Location: Phoenix, AZ
Posts: 20,929
Quote:
Originally Posted by Arctic View Post
IMHO, China, Russia and the Cyber battlefield are more of a concern then the few Jihadists in Government.
China and Russia are not threats to this country.

Tell me how "many" islamic jihadists did it take to send this country into a tailspin?

19

Read more post less.

TS
__________________
"The Spartans do not ask how many are the enemy, but where they are."
Team Sergeant is offline   Reply With Quote
Old 01-14-2010, 23:12   #6
The Reaper
Quiet Professional
 
The Reaper's Avatar
 
Join Date: Jan 2004
Location: Free Pineland
Posts: 24,780
Quote:
Originally Posted by Arctic View Post
IMHO, China, Russia and the Cyber battlefield are more of a concern then the few Jihadists in Government.
I believe that the threat within is greater than the threat from the outside.

TR
__________________
"It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat." - President Theodore Roosevelt, 1910

De Oppresso Liber 01/20/2025
The Reaper is offline   Reply With Quote
Old 01-15-2010, 08:39   #7
Warrior-Mentor
Quiet Professional
 
Warrior-Mentor's Avatar
 
Join Date: Jun 2005
Location: America, the Beautiful
Posts: 3,193
Quote:
Originally Posted by The Reaper
...the threat within is greater...
I agree.

Quote:
Originally Posted by T-Rock View Post
Why tow a narrative as opposed to orienting on facts?
(~2:50 -5:35 part1)

...why do we allow Islamists from the Muslim Brotherhood to help drive our agenda on how we combat the terrorist threat, and how to prosecute this war ?
(6:00-10:30 part1)

It just doesn’t make any sense to me, it’s akin to having allowed an avowed group of Nazis participate in our war planning strategy against the Nazis during WW II - discounting the Nazi ability to communicate our intentions to other Nazis…
Insane, isn't it?

Despite the slightly cheesy format, the two experts in the videos you posted are absolutely credible - I know both of them and will vouch for their backgrounds.


Quote:
Originally Posted by T-Rock View Post
The Holy Land Foundation documents mentioned in the above video can be found below - simply mind boggling:
http://www1.nefafoundation.org/hlfdocs2.html
NEFA is a great resource. For those not familiar, NEFA stands for Nine Eleven Finding Answers.

NEFA Home Page: http://www.nefafoundation.org

It's easy to sign up for their alerts...


Quote:
Originally Posted by T-Rock View Post
I still haven’t really heard a solid answer regarding Hesham Islam
http://www.investigativeproject.org/...r-the-pentagon
You are raising great questions.
__________________
Like a free America? Join www.actforamerica.org

"The views expressed in this post are those of the author and do not reflect the official policy
or position of the Department of the Army, Department of Defense, or the U.S. Government."
- From Army Regulation 360-1, Paragraph 6-8 (2)
Warrior-Mentor is offline   Reply With Quote
Old 01-17-2010, 00:09   #8
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,476
Chinese hackers pose a growing threat to U.S. firms

Quote:
Originally Posted by Arctic View Post
IMHO, China, Russia and the Cyber battlefield are more of a concern then the few Jihadists in Government.
Quote:
Originally Posted by HowardCohodas View Post
You are pretty new here so I don't know your communication style, but I surely hope you are kidding.
Does it have to be a question of either/or? Bush the Younger's formulation for GWOT focused on rouge states giving terrorists access to WMDs. But what about other forms of collaboration?

FWIW, the following article is from the on line edition of the Los Angeles Times. Source is here.
Quote:
Chinese hackers pose a growing threat to U.S. firms
Escalating cyber attacks on Google and other companies alarm government officials who say the U.S. may be powerless to stop the online industrial espionage.

By Jessica Guynn

January 15, 2010

The scale and sophistication of the cyber attacks on Google Inc. and other large U.S. corporations by hackers in China is raising national security concerns that the Asian superpower is escalating its industrial espionage efforts on the Internet.

While the U.S. focus has been primarily on protecting military and state secrets from cyber spying, a new battle is being waged in which corporate computers and the valuable intellectual property they hold have become as much a target of foreign governments as those run by the Pentagon and the CIA.

"This is a watershed moment in the cyber war," James Mulvenon, director of the Center for Intelligence Research and Analysis at Defense Group Inc., a national-security firm, said Thursday. "Before, the Chinese were going after defense targets to modernize the country's military machine. But these intrusions strike at the heart of the American innovation community."

The attacks on Google and several dozen other companies have alarmed government officials and lawmakers who warned that the U.S. may already be losing the battle to protect the nation's besieged cyber infrastructure.

"The recent cyber intrusion that Google attributes to China is troubling and the U.S. government is looking into it," White House spokesman Nick Shapiro said Thursday.

Rep. Anna Eshoo (D-Menlo Park), a senior member of the House Select Committee on Intelligence, called China a pervasive hacker. "This behavior is unacceptable. We used to use the term 'highway robbery.' This is high-tech robbery."

The cost has been huge, according to a recent study by a congressional advisory panel, the U.S.-China Economic and Security Review Commission. While it is hard to quantify the value of the intellectual property that is stolen by the Chinese each year -- because many businesses do not like to report getting hacked -- Dan Slane, chairman of the commission, estimated it was in the hundreds of billions of dollars.

Hacker strategy


Alan Paller, director of research at the SANS Institute, a Bethesda, Md., security firm, said Chinese hackers target Western companies with an approach dubbed "1,000 grains of sand," meaning they go after every piece of information in search of competitive intelligence. Most companies keep silent about the attacks, but they draw heavy scrutiny from law enforcement officials.

"The odds of the 25 biggest companies in California not being fully compromised by the Chinese is near zero," Paller said. "That is true of companies across the country."

China defended its Internet policies at a news conference Thursday. Jiang Yu, spokeswoman for China's Ministry of Foreign Affairs, said China's Internet is open and welcomes foreign companies. She also said Chinese law prohibits hacker attacks but declined to say whether the Chinese government is bound by the law.

Google on Tuesday revealed that it had fallen prey to a series of cyber attacks originating from China. The Mountain View, Calif., Internet giant said it believed the attackers wanted access to the e-mail accounts of Chinese human rights activists. But the incursions, which also included theft of intellectual property, raised the possibility that the hackers were also attempting economic espionage.

Google took the bold stance of making the attacks public, catching the Chinese government off guard. The company's defiance of the world's most populous country stunned observers. It also prompted questions about the scope and nature of the attacks.

"For a big multinational company to consider leaving a critical market means the overall damage to its operation and assets is likely to be greater than the benefits," said Oded Shenkar, a professor of business management at Ohio State University and the author of "The Chinese Century." "Google is not only making a human rights statement; my educated guess is that there is much more to it than that."

It is unclear exactly where the attacks came from, and Google was careful not to directly accuse the Chinese government of orchestrating them. But Chinese cyber spying has been a persistent problem for years with dozens of attacks on commercial, government and military targets, analysts say.

A growing menace


The attacks against the U.S. are ramping up, according to the congressional U.S.-China commission, which noted in October that Chinese espionage was "straining the U.S. capacity to respond."

The report focused on an attack on one company, concluding that it was supported and possibly choreographed by the Chinese government. The report also alleged that China's military, the People's Liberation Army, is responsible for aspects of cyber spying and has created cyber warfare units.

McAfee Labs, which has analyzed the attacks on Google and other companies, said Thursday that the hackers had deployed highly sophisticated "advanced persistent threats" that in the past were primarily used against governments. The attacks targeted individuals with known access to valuable corporate information.

Google may have been particularly vulnerable because all of its technology is online and networked, said Marc Rotenberg, executive director of the Electronic Privacy Information Center.

On Wednesday, Google said it would improve security for Gmail users by encrypting data to its servers. Such steps are crucial for Google, whose business hinges on its ability to protect its users' privacy and maintain their trust, said Collins Stewart analyst Sandeep Aggarwal.

"Commercial organizations can rarely defend themselves against sophisticated government attacks," said Phil Lieberman, chief executive of Lieberman Software, a Los Angeles security software firm.

Last week, a Santa Barbara software maker filed a $2.2-billion lawsuit against the Chinese government and several Chinese technology firms, accusing them of conspiring to steal and disseminate the U.S. firm's Internet filtering technology.

The Los Angeles law firm representing Cybersitter in the lawsuit said Thursday that it was besieged by similar cyber attacks originating in China. On Monday evening its lawyers began receiving 10 different Trojan horse e-mails designed to retrieve information from its computers, said Gregory Fayer, an attorney at Gipson Hoffman & Pancione. The law firm has turned over the e-mails to the FBI, which is investigating, Fayer said.

After Google's announcement, Adobe Systems Inc. and Rackspace Hosting Inc. also reported attacks.

A national priority

Early last year, President Obama identified protecting computer networks in the private and public sectors as a national security priority. But bureaucratic infighting among law enforcement and intelligence agencies and disagreements with business interests about the role of government in controlling the Internet delayed naming a White House cyber-security "czar."

In December, Obama appointed Howard Schmidt, a former chief security executive at Microsoft with 31 years' experience in law enforcement and the military, to the post.

How to protect the nation's cyber infrastructure, largely in private sector hands, from alleged state-sponsored attacks has become a matter of intensifying debate in Washington, analysts say.

The U.S. has no formal policy for dealing with such attacks. Renewed attention could help shape policy and smooth passage of legislation, analysts said.

"This highlights a core dilemma for the U.S. cyber strategy," Mulvenon said. "What can the U.S. government do to defend Google? Really not very much."
The report by the Economic and Security Review Commission is available here.
Sigaba is offline   Reply With Quote
Old 01-17-2010, 01:27   #9
HowardCohodas
Guest
 
Posts: n/a
Quote:
Originally Posted by Sigaba View Post
Does it have to be a question of either/or? Bush the Younger's formulation for GWOT focused on rouge states giving terrorists access to WMDs. But what about other forms of collaboration?
As a nation we have frequently underestimated the dangers of a fifth column over the more obvious dangers. One of the great things that George Bush did was publicly and aggressively address the rouge states, but he also aggressively addressed the fifth column dangers. I can't say the same for our current President.

Unfortunately, political correctness is an enabler of fifth column dangers that even a 9/11 event could not ameliorate.

Last edited by HowardCohodas; 01-17-2010 at 01:30. Reason: Premature posting
  Reply With Quote
Old 01-17-2010, 05:09   #10
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,476
Quote:
Originally Posted by HowardCohodas View Post
As a nation we have frequently underestimated the dangers of a fifth column over the more obvious dangers.
Do you have specific examples in mind?
Quote:
Originally Posted by HowardCohodas View Post
Unfortunately, political correctness is an enabler of fifth column dangers that even a 9/11 event could not ameliorate.
When have considerations of domestic politics not shaped America's conduct during a war?
Sigaba is offline   Reply With Quote
Old 01-17-2010, 06:11   #11
HowardCohodas
Guest
 
Posts: n/a
Quote:
Originally Posted by Sigaba View Post
Do you have specific examples in mind?When have considerations of domestic politics not shaped America's conduct during a war?
This dialog seems more to be dueling monologues where I point you that the sky is blue and you reply that water is wet.

So, let me try to make my point more explicitly. I thought my reference to a "fifth column" would help the focus. A "fifth column" is defined to be "a group of people who clandestinely undermine a larger group, such as a nation, from within, to the aid of an external enemy." Now, if you want an example besides the title of this thread (The Islamic Infiltration: Inside Our Government, Armed With Our Secrets...) I suggest you read "Witness" by Whittaker Chambers.

Of course domestic politics shapes a country's conduct. However, my point was about the relative potential danger of a "few jihadists" vs. country actors. I think a few jihadists within the government holds more potential danger than country actors. An understanding of asymmetric warfare is helpful here. Not understanding their potential danger leads to ideas stated here that country actors are of more concern. I find this a fatal attitude. Furthermore, I posit that rampant political correctness exacerbates the problem.

My position is that fifth column efforts are more danger to us than country actors from their very nature, i.e. clandestine.
  Reply With Quote
Old 01-17-2010, 07:22   #12
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
So what would one suggest we call the House Committe On Internal Security* this time?

Richard's $.02

* Nee Overman Committee, Fish Committee, Special Committee on Un-American Activities.
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 01-17-2010, 08:18   #13
HowardCohodas
Guest
 
Posts: n/a
Quote:
Originally Posted by Richard View Post
So what would one suggest we call the House Committe On Internal Security* this time?

Richard's $.02

* Nee Overman Committee, Fish Committee, Special Committee on Un-American Activities.
Something subtle like "Select Committee on Finding and Recommending for Prosecution Traitors to America." It's important to obfuscate it's true purpose.
  Reply With Quote
Old 01-17-2010, 15:41   #14
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,476
Quote:
Originally Posted by HowardCohodas View Post
Entire post.
The fact that you decline the opportunity to provide specific examples to back up your generalizations speaks for itself.

Or is your reference to Whitaker Chambers--a person whose reputation has not held up well under the scrutiny of researchers--an example of the fifth column in action? (The recent works on VENONA, the Rosenbergs, and the KGB's operations in the U.S. might be more fitting examples.)
Sigaba is offline   Reply With Quote
Old 01-17-2010, 15:48   #15
HowardCohodas
Guest
 
Posts: n/a
Quote:
Originally Posted by Sigaba View Post
The fact that you decline the opportunity to provide specific examples to back up your generalizations speaks for itself.

Or is your reference to Whitaker Chambers--a person whose reputation has not held up well under the scrutiny of researchers--an example of the fifth column in action? (The recent works on VENONA, the Rosenbergs, and the KGB's operations in the U.S. might be more fitting examples.)
Congratulations. You win. Intelligent dialog with you is beyond my gifts.

Last edited by HowardCohodas; 01-17-2010 at 15:51. Reason: Clarification
  Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Forum Jump



All times are GMT -6. The time now is 21:28.



Copyright 2004-2022 by Professional Soldiers ®
Site Designed, Maintained, & Hosted by Hilliker Technologies