+ All Categories
Home > Documents > June 23, 2016 U.S. soldiers arrested for allegedly...

June 23, 2016 U.S. soldiers arrested for allegedly...

Date post: 11-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
21
Aerial view of Fort Bliss June 23, 2016 U.S. soldiers arrested for allegedly smuggling illegal immigrants across Texas border. By Sharyl Attkisson, Sinclair Broadcast Group U.S. authorities are investigating an illegal immigrant smuggling operation allegedly run by active duty military soldiers out of the Ft. Bliss U.S. Army post in El Paso, Texas. Ft. Bliss is headquarters for El Paso Intelligence Center (EPIC), a federal tactical operational intelligence center. According to sources and documents, two U.S. soldiers, Marco Antonio Nava, Jr. and Joseph Cleveland, were arrested last Saturday by border patrol officers at Falfurias, Texas Border Patrol Station Checkpoint attempting to smuggle two Mexican citizens into the U.S. The Mexicans were riding in the back seat of the car. [MORE ON PAGE 2] THIS ISSUE Featured Technology Scandalous From Sentinel CMD Threat Meter P 1 P 3 P 5 P 8 P 9 Sentinel Program Strategies For Patriots Uncommon Knowledge Acronyms P 11 P 13 P 18 P 21
Transcript
Page 1: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

Aerial view of Fort Bliss

June 23, 2016

U.S. soldiers arrested for allegedly smuggling illegalimmigrants across Texas border.By Sharyl Attkisson, Sinclair Broadcast Group

U.S. authorities are investigating an illegal immigrant smuggling operation allegedly run by active duty military soldiers out of the Ft. Bliss U.S. Army post in El Paso, Texas. Ft. Bliss is headquarters for El Paso Intelligence Center (EPIC), a federal tactical operational intelligence center.

According to sources and documents, two U.S. soldiers, Marco Antonio Nava, Jr. and Joseph Cleveland, were arrested last Saturday by border patrol officers at Falfurias, Texas Border Patrol Station Checkpoint attempting to smuggle two Mexican citizens into the U.S. The Mexicans were riding in the back seat of the car. [MORE ON PAGE 2]

THIS ISSUEFeaturedTechnologyScandalousFrom Sentinel CMDThreat Meter

P 1P 3P 5P 8P 9

Sentinel ProgramStrategies For PatriotsUncommon KnowledgeAcronyms

P 11P 13P 18P 21

Page 2: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE2

U.S. soldiers arrested. . . con't Upon their arrest, the soldiers, who were not in uniform at the time, informed Border Patrol agents they are part of the 377 TC Company at Ft. Bliss.

Nava told investigators it was the second time that he and Cleveland had smuggled in illegal immigrants for pay and, during a debriefing, described a smuggling ring allegedly involving other Ft. Bliss soldiers. Nava identified a leader of the group as a Private First Class, as well as other participants. He said he wasn’t sure how long the ring had been operating. Attempts to seek comment and information from Ft. Bliss were not successful.

Nava stated that one week before his arrest, the group of Ft. Bliss soldiers successfully smuggled six illegal immigrants through the Falfurrias Checkpoint. When questioned how they did it, “Nava stated that all of the aliens were simply sitting inside the vehicles with them.” The illegal immigrants had been picked up at a trailer, then dropped off at a house 30 minutes north of Houston, Texas. According to Nava, each of the soldiers involved was paid $1,000 cash for that successful smuggling trip. They were to be paid $1,500 for the June 18 run a week later that Border Patrol agents intercepted. Border agents were able to review text messages exchanged between six soldier smugglers.

This isn’t the first time military troops have been linked to human trafficking across the Mexican border, according to internal documents. One government official stated, “I know we had previously received reports that military personnel were involved in smuggling”

According to internal government documents, the border has been something of a revolving door for the two Mexican citizens arrested in the June 19 attempt. Jose Rebollar-Osorio had three prior removals from the U.S. on record. Marcelino Oliveros-Padilla also had three prior removals as well as an immigration-related conviction.

END

Page 3: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE3

X-Ray Vision System Sees Through Concrete Walls

The makers, Cambridge Consultants expect it will be used by law enforcement agencies, emergency services or soldiers in ‘high-risk and hostile situations with minimal time and very narrow margin for error’.

The Prism can see through wood, concrete or bricks and gives a 3-D image of any movement inside the building. Users stand with their back to the wall as the machine scans using ultra-wideband radio frequencies then look at the display to see what is going on.

The machine can also be linked up remotely to computers so commanders back at base know what is going on. Ultra-wideband, also known as pulse radio, is very hard to detect and is able to work in a large area.

For every helpful device there lies a unintended evil use. Think of what kind of damage criminals or a burglar crew could

do with this technology in your neighborhood?

Not to mention a severe breach ofprivacy issues by the government!

A device that lets you see through walls has been developed by a British company as the first of its kind. The device, called the Prism 200c, is small enough to fit inside a backpack.

According to the Daily Mail, “The Prism 200c looks through solid objects then displays an image of what is on the other side on a hand-held screen.”

Page 4: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE4

X-Ray Vision System. . . con't

The ongoing imperative to turn soldiers into "super-soldiers" has seen some pretty superhero-esque technological enhancements become real-world defense sector pursuits, like the ability to hear through walls, to fly at will, or to harness superhuman strength. Now we can add x-ray vision to that list.

END

Page 5: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE5

June 23, 2016 - By Denise Simonwww.FoundersCode.com

Per Documents, State Dept. Knew About Hillary ServerEmails: State Dept. scrambled to trouble on Clinton’s server.

Washington (AP) State Department staffers wrestled for weeks in December 2010 over a serious technical problem that affected emails from then-Secretary Hillary Clinton’s home email server, causing them to temporarily disable security features on the government’s own systems, according to emails released Wednesday.

The emails were released under court order Wednesday to the conservative legal advocacy group Judicial Watch, which has sued the State Department over access to public records related to the presumptive Democratic presidential nominee’s service as the nation’s top diplomat between 2009 and 2013.

The emails, reviewed by The Associated Press, show that State Department technical staff disabled software on their systems intended to block phishing emails that could deliver dangerous viruses. They were trying urgently to resolve delivery problems with emails sent from Clinton’s private server.

“This should trump all other activities,” a senior technical official, Ken LaVolpe, told IT employees in a Dec. 17, 2010, email. Another senior State Department official, Thomas W. Lawrence, wrote days later in an email that deputy chief of staff Huma Abedin personally was asking for an update about the repairs. Abedin and Clinton, who both used Clinton’s private server, had complained that emails each sent to State Department employees were not being reliably received.

THE LIES AND COVER-UPS JUST NEVER STOPS, NO SURPRISE.

Page 6: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE6

State Dept. Knew. . . con't

After technical staffers turned off some security features, Lawrence cautioned in an email, “We view this as a Band-Aid and fear it’s not 100 percent fully effective.”

The AP initially reported Wednesday that the emails described security features being turned off on Clinton’s own private server, but State Department spokesman John Kirby clarified hours later that the emails described “a series of troubleshooting measures to the department’s system — not Secretary Clinton’s system — to attempt to remedy the problem.”

The emails were released under court order Wednesday to the conservative legal advocacy group Judicial Watch, which has sued the State Department over access to public records related to the presumptive Democratic presidential nominee’s service as the nation’s top diplomat between 2009 and 2013.

Clinton has repeatedly denied there is any evidence her private email server ever was breached. Her campaign did not immediately provide comment Wednesday.

Days after the technical crisis, on Jan. 9, 2011, an IT worker was forced to shut down Clinton’s server because he believed “someone was trying to hack us.” Later that day, he wrote, “We were attacked again so I shut (the server) down for a few min.” It was one of several occasions when email access to Clinton’s BlackBerry smartphone was disrupted because her private server was down, according to the documents.

JOIN THE WATCHMEN OF AMERICA TODAY! STOP MISSING OUTwww.WatchmenOfAmerica.com

Page 7: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE7

State Dept. Knew. . . con't

The AP reported last year that in the early morning hours of Aug. 3, 2011, Clinton received infected emails, disguised as speeding tickets from New York. The emails instructed recipients to print the attached tickets. Opening an attachment would have allowed hackers to take over control of a victim’s computer.

In a blistering audit released last month, the State Department’s inspector general concluded that Clinton and her team ignored clear internal guidance that her email setup broke federal standards and could leave sensitive material vulnerable to hackers. Her aides twice brushed aside concerns, in one case telling technical staff “the matter was not to be discussed further,” the report said.

The State Department has released more than 52,000 pages of Clinton’s work-related emails, including some that have since been classified. Clinton has withheld thousands of additional emails, saying they were personal. The emails released Wednesday were not made available until after the inspector general’s office published its report, and Judicial Watch asked a federal judge to force the State Department to turn them over.

The case is one of about three dozen lawsuits over access to records related to Clinton’s time as secretary, including one filed by the AP. As part of its ongoing suit, lawyers from Judicial Watch on Wednesday questioned Bryan Pagliano, a former IT staffer for Clinton who helped set up the server, under oath. According to the group, Pagliano repeatedly responded to questions by invoking his Fifth Amendment right against self-incrimination, as he did last year before a congressional committee.

The FBI is also investigating whether Clinton’s use of the private email server imperiled government secrets. It has recently interviewed Clinton’s top aides, including former chief of staff Cheryl Mills and Abedin.

Republican presidential candidate Donald Trump said in a speech Wednesday that Clinton’s email server “was easily hacked by foreign governments.” Trump cited no new evidence that hackers had successfully breached Clinton’s server, but he said unspecified enemies of the United States were in possession of all her emails.

“So they probably now have a blackmail file over someone who wants to be President of the United States. This fact alone disqualifies her from the presidency,” Trump said. “We can’t hand over our government to someone whose deepest, darkest secrets may be in the hands of our enemies.” [ READ MORE HERE ]

END

Page 8: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE8

FROM SENTINEL COMMANDABOUT FOUNDERS CODE.....

DENISE SIMON is a Senior Research / Intelligence Analyst for Foreign and Domestic Policy for numerous flag officers and intelligence organizations.

Her blog, Founders Code is considered by many to be the "go to source" for ahead-of-the-curve information.

In addition to her up the minute blog, Denise hosts her own weekly radio show, "The Denise Simon Experience". Her radio show can be heard on Red State Talk Radio, Talk 92.1FM, WSFB 97.7 and other terrestrial and Internet based radio networks.

Denise Simon’s impressive list of special guests include Kris “Tanto” Paranto, Jack Abramoff, LTG Tom McInerney, MG Paul Vallely, Alex Holstein, Jason Mattera, Charles Faddis, Charles Ortel, Claire M. Lopez, Robert Grenier, Tim Furnish, Tom Wyld, Johnny Walker, David Gaubatz and Allen West.

Denise is a regular guest / analyst on the nationally syndicated radio show, "The Captain's America - First Watch" (hosted by Matt Bruce) as well as on Cowboy Logic Radio (Red State Talk Radio).

We encourage you to sign up for her "Daily SITREP" and please follow Denise on Twitter and Facebook.

Denise Simon, is also the 2nd Officer for the Watchmen of America organization and serves as the Primary intelligence Officer in the exclusive Watchmen Sentinel Program.

You can find her broadcasting on:

Page 9: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE9

The National Threat Meter indicates the levels of dangers that we are facing based on events taking place and anticipated events for the future.

The level changes according to current events and situations that exist that indicate there are reasons for deep concern.

Threat Analysis:

Today were are seeing a definite increase in homeland terrorist attacks by terror cells and individuals occupying the United States. Terrorist extremists such as groups like ISIS and others are in fact perpetrating these acts of terror here in the U.S. along with ISIS sympathizers and supporters who may or may not be U.S. born.

With these increased attacks, the Threat Level has increased dramatically. Those who are attending events and functions anywhere that large crowds of people are gathered are at the greatest risk. Whether you are at a very large sports event, parade, holiday celebration, etc.

Even a quiet afternoon or evening out at a restaurant or nightclub could cause you to be considered high targets at this point and Americans need to heighten their senses and be more alert than ever and use defensive strategies to be more guarded when out in public places.

Increased suspicions that some of these attacks are considered "False Flags" makes the situation even more volatile and dangerous. Citizens need to stay sharp and avoid putting themselves in certain situations without first examining and determining their level of risk, when attending public gatherings. Learn to recognize the signs and indicators that may shed light on suspected attackers.

SEE OUR SPECIAL STRATEGIC INFORMATION REGARDINGSTAYING ALERT FOR POTENTIAL DANGERS IN THIS ISSUE - PAGE 13

Page 10: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE10

ARMED MAINERS STOP GUN-WIELDING HEROIN TRAFFICKERS FROM NEW YORKJune 26, 2016

Armed bystanders came to the rescue over the weekend, on June 26 at an Augusta, Maine, Wal-Mart when shooting broke out in the parking lot.

Augusta police said shooting broke out between two people in two cars Sunday evening.

Police said the gun fight was interrupted when two armed bystanders intervened. Maine became a constitutional carry state in 2015 — meaning no permit is required to carry a concealed firearm.

According to CentralMaine.com, the following individuals were charged in connection to what cops say is a heroin-related incident:

• Kwiesha “Reggie” McBride of Harlem, New York, charged with reckless conduct with a firearm, Class C, and aggravated trafficking in drugs (heroin), Class B. His bail was set at $50,000.

• Frankie Dejesus of Rochester, New York, charged with reckless conduct with a firearm, Class C, and aggravated assault, Class B. His bail was set at $25,000.

• Diana Davis of Rochester, New York, charged with aggravated assault, Class B. Her bail was set at $5,000.

• Samantha Tupper, of Augusta, charged with probation violation and furnishing drugs (heroin), Class B. She was held without bail.

No one was injured in the shooting.

THESE ARE THE KINDS OF STORIES THE MEDIA WILLNOT REPORT FOR OBVIOUS REASONS !!

Page 11: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE11

WHAT IS THE SENTINEL PROGRAM? WHAT IF LIBERALSHAD THEIR WAY?

Our SENTINEL Project is designed for our members who wish to participate in a specialized watch program, involving the monitoring and reporting of specific events and activities in their local area or region and RECON of information back to a Centralized Receiving Center (CRC) for dissemination and/or immediate dispatch to all of our Patriot Members and the General Public.

Sentinel Definition - a person charged to keep watch for some anticipated event or activity. a lookout, lookout person, picket,

scout, sentry, spotter, watch, security guard, watchman, watcher - a guard who keeps watch

The Sentinel Program is open to all Members of the Watchmen Of America program.

The idea behind the Sentinel Program is to have several individuals in each of the 50 United States whereby specific observations of certain activities are performed and reported back to a Centralized Receiving Center (CRC) here at our website. This information, usually critical in nature, can then be forwarded to all of our Patriot Members in the event of an emergency.

Many times, events take place in local areas that are not immediately reported on the mainstream media outlets such as television, newspaper, or radio broadcasts. The events are sometimes reported the next day, week, etc. or possibly never covered at all by the media. When activities such as government raids, unlawful roadblocks, martial law, random search and seizures, etc. take place, we all as concerned Patriots need to be made aware of these events. Not only to be prepared for ourselves and the protection of our families, but to warn all others of these events as well.

DO YOU REMEMBER THIS?

Page 12: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE12

WHAT IS THE SENTINEL PROGRAM? - CON'T

This is the reason for the creation of the Sentinel Program. We need true dedicated Patriots to volunteer to participate in alerting this website whenever such events occur, and to respond to requests for investigation and confirmation of reports that come in.

We do not ask that you get involved directly in any of these situations or to put yourself in harms way. You are simply expected to gather as much information (INTEL) and evidence about the activity as possible and report it back to us, and try to keep us posted, so we can pass this along to others.

There are many means by which information about these events or activities can be obtained. Perhaps the situation is covered by your local TV news stations but is not covered on a national level, this happens very frequently. Another way is to monitor Police Band radios or Citizen Band (CB) radios and HAM radios. Perhaps you are out on the town one night and you personally were subjected to an unlawful road block or witnessed a convoy of military vehicles armed and otherwise in an unusual place or location.

As a Sentinel, you could therefore capture evidence by way of photo, video, etc. and report these activities back to us as they may be part of a larger operation directed against all Freedom loving Patriots.

This is a fantastic system and it is now proven to work..........BUT, it doesn't work without YOU.

We need your help. We need YOU to volunteer and be trained to participate and be there for ALL Patriots when we cannot always know what is taking place, due to media blackouts, locale, etc.

If you feel that you are able to fulfill this role and are dedicated, and are willing to put forth the effort we urge you to fill out an application as a Sentinel here at WatchmenOfAmerica.com and be a part of the Freedom Movement.

There are a limited number of positions in each state available, so please act quickly.

JOIN THE WATCHMEN TODAYAND BECOME A SENTINEL

Page 13: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE13

STRATEGIES FOR PATRIOTSSuspicious Activity - See Something, Say Something

What To Do If You Spot Suspicious Terrorist Activity If you see suspicious behavior, do not confront the individuals involved.

Take note of the details using the "SALUTE" method of reporting INTEL.

SALUTE stands for:

S = Size (Jot down the number of people, gender, ages, and physical descriptions) A = Activity (Describe exactly what they are doing)L = Location (Provide exact location) U = Uniform (Describe what they are wearing, including shoes)T = Time (Provide date, time, and duration of activity) E = Equipment (Describe vehicle, make, color etc., license plate, camera, guns, etc)

Suspicious activity is often recalled after an event. We must train ourselves to be on the lookout for things that are out of the ordinary and arouse suspicions.

Keep in mind, those who commit terrorist acts:

Usually live among us without appearing suspicious while planning and preparing for their attack. They may be your neighbor, student or friend.

Often they will need training or equipment that will arouse suspicion.

Need to conduct surveillance on possible targets and gather information on the planned attack location. All of these things make terrorists vulnerable to detection, by those watching for certain characteristics.

Learn to recognize the difference between normal and abnormal behavior. It can be a fine line. Stay alert in your daily travels and routines and get to know:

• Who your neighbors are • What cars are normally in your neighborhood • Who regularly makes deliveries at work and in your

neighborhood

Staying alert is NOT about becoming paranoid. Staying alert is being aware of one’s surroundings. Be alert to indications of possible trouble. They may include:

• A local activity that could indicate problems in your community.

• One of the clues that led to the recent break-up of a terrorist plot was that several of the cell members were spotted celebrating in an apartment complex on the anniversary of 911.

• Previous activity or crimes. • Controversial issues being debated. • Suspicious thefts.

Page 14: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE14

STRATEGIES FOR PATRIOTS - CON'T

It is impossible to identify a terrorist by:• Appearance • Nationality • Language

You CAN only identify a terrorist threat by observing or hearing about suspicious activity that may lead to a criminal act.

Identifying suspicious activity is not a difficult science. Rely on your judgment. Your suspicion of a threat could be confirmed with only one incident or it could take a series of incidents. Your suspicions will need to be based on:

• Experience • Judgment • Common sense

Review some possible suspicious activity. Here is just one example:

Unusual Interest in High Risk or Symbolic Targets

Maybe you are at a high profile location or, perhaps a National Monument and you notice a person nearby taking several photos. That’s not unusual. But then you notice that the person is only taking photos of the locations surveillance cameras, entrance crash barriers and access control procedures. Is that normal for a tourist? Not.

The following should cause a heightened sense of suspicion:• suspicious or unusual interest • surveillance (suspicious in nature) • inappropriate photographs or videos • note-taking • drawing of diagrams • annotating maps • using binoculars or night vision devices

Page 15: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE15

STRATEGIES FOR PATRIOTS - CON'T

Unusual or suspicious activity does not necessarily mean that terrorist activity is happening, but be aware of the following suspicious behaviors:

• Individuals acting furtively and suspiciously • Individuals avoiding eye contact • Individuals departing quickly when seen or approached • Individuals in places they don’t belong • A strong odor coming from a building or vehicle • An overloaded vehicle • Fluid leaking from a vehicle, other than the engine or gas

tank • Over dressed for the type of weather

Fraudulent Identification Many of the 9/11 terrorists were in the country illegally and using fraudulent IDs. Altering or using false government identification in any way and for any purpose is against the law.

Fraudulent ID’s include:

• drivers license • social security card • passport • birth certificate • INS identification

If you believe someone is using or has altered government identification, please notify the law enforcement authorities. Do NOT request to see another person’s ID when not appropriate. Allow law enforcements to do the investigating.

Page 16: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE16

STRATEGIES FOR PATRIOTS - CON'T

Terrorists, when not acting alone, need to meet with their conspirators and often times work within a cell. Pay attention to visitors and guests that:

• arrive and leave at unusual hours • try not to be noticed • act in a suspicious manner • park an unusual distance from the meeting • have an unusual number of unrelated people living together • Not all people who maintain privacy are terrorists. But people intent on doing illegal acts want to be left alone.

Some signs that may raise your suspicions.• they only let you into the apartment or house with plenty of prior notice • they change the locks often • they keep certain rooms off limits • they cover tables and other pieces of furniture • they never allow maid service in a hotel room • they only take hotel room service outside the door • they only accept deliveries at the hotel’s front desk or outside a closed door

Deliveries are a common method for terrorists to carry out their attacks. Be aware of:

• a vehicle with hazardous material parked or driving in an inappropriate area • unusual deliveries of chemicals or fertilizer • unattended bags or boxes in a public access place • fire extinguishers that may have been moved or tampered with • unusual or unexpected mail

Page 17: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE17

STRATEGIES FOR PATRIOTS - CON'T

Unusual Purchases or TheftsTerrorists need supplies to carry out their attacks and accomplish their goals.

Pay attention to purchases, rentals or thefts of:

• police, security, public utility, mail carrier, or airline uniforms and equipment• explosives • weapons • ammunition • propane bottles • toxic chemicals • vehicles able to contain or haul hazardous materials

Additional suspicious activity may include:

• Someone bragging or talking about plans to harm citizens in violent attacks or who claims membership in a terrorist organization that espouses killing innocent people.

• Suspicious packages, luggage, or mail that have been abandoned in a crowded place like an office building, an airport, a school, or a shopping center.

• Suspicious letter or package that arrives in your mailbox. (Stay away from the letter or package and don’t shake, bump or sniff it; wash hands thoroughly with soap and water.

• Someone suspiciously exiting a secured, non-public area near a train or bus depot, airport, tunnel, bridge, government building, or tourist attraction.

Any type of activity or circumstance that seems frightening or unusual within the normal routines of your neighborhood, community, and workplace.

• Someone unfamiliar loitering in a parking lot, government building, or around a school or playground.

• Anyone asking a lot of questions ‹ especially concerning routes or loads or drop-off times.

• Recruiters should be alert for unusual employment applications. Don’t assume it couldn’t be an inside job.

• A trucker returning to his or her vehicle from a restaurant or truck stop should make sure no one is loitering around the truck. Watch out for walk-arounds.

END OF STRATEGIES FOR PATRIOTS

Page 18: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE18

UNCOMMON KNOWLEDGE

ISIS KILL LIST TARGETS AMERICANCIVILIANS, BUT DO THEY KNOW?

JUNE 28, 2016 Denise Simon

Is anyone telling the civilians they are targets of Islamic State? Nope…Anyone explain why? The military? the FBI? The police? Nope... Is anyone collaborating, coordinating and protecting citizens? Nope!!

ISIS ‘Kill Lists’ Increasingly Target U.S. Civilians Report: Calls for random attacks by hacking groups illuminate ‘evolving terror threat’

Pro-ISIS hacking groups have started including American civilians along with military, government, and law enforcement personnel on “kill lists,” consistent with the terror group’s effort to expand attacks to random targets and instill fear in the public, according to a new report.

The SITE Intelligence Group, an organization that monitors jihadist propaganda, examined eight lists recently circulated online by pro-ISIS hacking groups, including some that name random civilian targets.

“These lists, with targets spanning drone operators to random civilians, appear to have achieved at least part of their presumed intentions: heightened alert by government workers, FBI visits to startled civilians, and significant media attention,” SITE wrote in its report.

“This embrace of random targets, though new within the context of hackers’ kill lists, is nonetheless consistent with IS’ methodology, and demonstrates application of attack instructions from IS’ leadership and affiliates,” the report explained, using another name for the Islamic State, or ISIS.

Page 19: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE19

UNCOMMON KNOWLEDGE - CON'T

Eight lists released over the course of two months this year have targeted federal government employees, military personnel, state and local government officials, and random residents of New York and Texas. While most of the kill lists have not been pushed through official ISIS channels, fighters and supporters of the terror group have promoted the targets through social media.

ISIS has inspired self-radicalized terrorists who have launched attacks inside the United States. Omar Mateen, a U.S. citizen, pledged allegiance to the terror group during conversations with 911 operators during a gun attack that killed 49 victims at an Orlando gay club earlier this month. The couple who opened fire on a San Bernardino, California, holiday party last December are also believed to have pledged support to ISIS.

The FBI declined to comment specifically on investigative matters related to the kill lists but said that the agency routinely notifies people and organizations of information collected during investigations that could be “perceived as potentially threatening in nature.”

“Potential threats may relate to individuals, institutions, or organizations, and are shared in order to sensitize potential victims to the observed threat, and to assist them in taking proper steps to ensure their safety,” Matthew Bertron, a representative for the FBI’s National Press Office, told the Washington Free Beacon.

Kill lists from pro-ISIS hacking groups have become increasingly abundant since the so-called Islamic State Hacking Division called for attacks on 100 military personnel in March of last year, and later released lists targeting 10 Italian Army officers and over 1,000 military and government personnel. While this particular hacking group—once headed by ISIS fighter Junaid Hussain before he was killed in an airstrike—has focused on military and government personnel, others have emerged to target civilians and local officials.

A pro-ISIS group called the United Cyber Caliphate, for example, released five different target lists between March and May of this year. The lists publicized personal information about 11 Tennessee state county board members; 3,600 New York citizens; and 1,543 Texas residents, according to SITE’s report. Two lists each separately included information about 50 federal government employees, including workers from the Departments of State, Defense, and Navy.

While the list of New York residents was removed from the hosting site where it was posted, the lists with information on individuals in Tennessee and Texas remained online.

Another group named the Caliphate Cyber Army also released two lists, one of which called for attacks on 56 New Jersey state police staff and another that targeted 36 Minnesota state police officers.

While inactive between September 2015 and May of this year, the Islamic State Hacking Division also recently released names and personal information of 76 U.S. military personnel who work with drones.

CONTINUED ON NEXT PAGE

Page 20: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE20

UNCOMMON KNOWLEDGE - CON'T

“In just over a year, kill lists from pro-IS hacking groups have not only become more abundant, but have also expanded in terms of target selection,” the SITE report stated. “Between March and May of this year, kill lists by these groups have expanded beyond conventional criteria to random civilian targets, instructing to ‘shoot them down.’”

The lists are consistent with ISIS ideology supporting attacks on all non-Muslims living in countries at war with the terror group, according to SITE.

The promotion of the lists also highlights ISIS militants’ exploitation of social media to recruit and inspire attacks, regardless of the fact that the pro-ISIS hacking groups do not appear to be publicly coordinating with one another.

“Given the power and ease of social media, along with the increasing ubiquity of Internet access and smart phones, every IS supporter can act as their own online media group, recruitment office, or fundraising organization. Likewise, every IS-supporting hacker can use their skills to serve the group’s goals, whether they be a fighter or a supporter in non-combat zones,” the report stated.

The SITE Intelligence Group could not confirm that the groups obtained the information by hacking into government or other private systems but said that it was both possible and plausible. The report noted that some of the information on the lists is available through public channels though they “appear to be compiled via non-public sources, especially when factoring what would be immense labor and difficulty required to manually compile the information via those public sources.”

The Islamic State Hacking Division is believed to have obtained data for its list targeting over 1,000 U.S. military personnel from Ardit Ferizi, a Kosovo citizen who hacked into a U.S.-based company’s servers to harvest the information. The Justice Department charged Ferizi with computer hacking, identity theft, and providing material support to ISIS last October.

END OF STORY

JOIN THE WATCHMENTODAY!!

Page 21: June 23, 2016 U.S. soldiers arrested for allegedly ...watchmenofamerica.homestead.com/INTELLIGENCE... · The ongoing imperative to turn soldiers into "super-soldiers" has seen some

PAGE21

SCOTUS - Supreme Court Of The United StatesPOTUS - President Of The United StatesOPSEC - Operational SecurityCOMSEC - Communications SecurityIC - Intelligence CommunityINTEL - IntelligenceHUMIT - Human IntelligenceIMINT - Imagery intelligenceSIGINT - Signal Intelligence

CRC - Central Receiving CenterPAS - Patriot Alert SystemWOA - Watchmen Of AmericaSENCMD - Sentinel CommandOSINT - Open Source IntelligenceTECHINT - Technical IntelligenceBIOINT - Biometric IntelligenceCOMINT - Communications IntelligenceELINT - Electronic Intelligence


Recommended