Wednesday, November 28, 2007

Terrorist Use of Chemical and Biological Weapons

The following outlines are from an expert source. The single issue terror group use Biological Weapons (BW) as a first choice. Most incidents are hoaxes. Conventional Terror (CT) is second choice. Apocalyptic groups fit this Method of operation (MO) in the first instance. It is clear that the American president and the 2008 Presidential Candidates are prentenders to the office and are of questionable integrity on homeland security.

I am attempting to reset my cellphone but Malibu Ca is still causing tracphone lines to be on emergency standing EVDO does work however. My main phone is on Verizon.

David Nollmeyer
Cambria CA.

Reynolds M. Salerno, Ph.D.Sandia National LaboratoriesFebruary 2003

Terrorist Use of Chemical and Biological Weapons

Historical Record and Future Threat

􀁺Based on historical record, religious/apocalyptic groups pose the greatest threat (e.g. Rajneeshees, Aum Shinrikyo)
􀁺Globally, terrorists generally have preferred the "instant" gratification of explosives
􀂄Many non-WMD alternatives available to terrorists
􀁺Terrorists tend to use CBW that
􀂄Require little educational training
􀂄Require little manipulation
􀂄Are easily deployed (crude dissemination methods)
􀁺Chemicals are the terrorist CBW agents of choice
􀂄Most biological cases are hoaxes
􀁺U.S. anthrax attacks a watershed?
􀂄Sophisticated biological processing and dissemination techniques
􀂄Lack of restraint to cause mass casualties
Other Aspects of CBW Terrorism Threat
􀁺Dual use agents and technologies
􀁺Wide access to CBW information
􀂄Internet resources and "how to" books
􀁺Relatively low cost
􀂄Little infrastructure required for CBW
􀁺High consequence pathogens and toxins stored and used in laboratories and culture collections throughout world
􀂄Frequent outbreaks of exotic, highly infectious disease
􀁺Large stockpiles of chemical agents in Russia under questionablesecurity
􀂄Most chemical agents widely available
􀁺Unemployed weapons engineers from FSU and elsewhere may be hiredby well funded terrorist organizations

Chemical agent choices

􀂄Chlorine
􀂄Cyanide
􀂄Rat poison
􀂄Ricin
􀁺Biological agent choices
􀂄Salmonella typhimurium
􀂄Bacillus anthracis
􀂄Botulinum toxin
􀂄Yersin

technorati tags:

















Labels: , , , , , , , , , ,

Sunday, November 11, 2007

State Sponsored Terror


The concept of a Single Issue Terror Group is becoming a disturbing concept that is focusing in a constraining but positive manner my opposition to the ongoing attack in the United States. LAPD avenging LGBT History and are ill equipped to perform any positive activities other than destroy the United States. Both public and civilian populations are informant based and complicit.A scapegoating purge will most likely attempt to wash the hands of dead presidents as Ronald Reagan. Due to time and logistic constraints the following is edited from:
A Military Guide to Terrorism in the Twenty-First Century 15 August 2005

Social
Often particular social policies or issues will be so contentious that they will incite extremist behavior and terrorism. Frequently this is referred to as “single issue” or “special interest”terrorism. Some issues that have produced terrorist activities in the United States and othercountries are:


Animal rights

Abortion

Ecology/environment

Minority rights


Networked Structure
Terrorists are now increasingly part of far more indistinct and broader system of networksthan previously experienced. Groups based on religious or single-issue motives lack a specificpolitical or nationalistic agenda; they therefore have less need for a hierarchical structure tocoordinate the achievement of their goals. Instead, they can depend and even thrive on loose affiliation with like-minded groups or individuals from a variety of locations. General goals and targets are announced, and individuals or cells are expected to use flexibility and initiativeto conduct the necessary action.

Basic Concepts
Networks consist of nodes. A node may be an individual, a cell, another networkedorganization, or a hierarchical organization. They may also consist of parts of other organizations, even governments, which are acting in ways that can be exploited to achieve the network’s organizational goals.The effectiveness of a networked organization is dependent on several things. The network achieves long-term organizational effectiveness when the nodes share a unifying ideology, common goals or mutual interests. When there is failure to accept the overall goals of theorganization, pieces of the network will drop out. This is less catastrophic than a splintering within a hierarchical group. Another difficulty for network organizations not sharing a unifying ideology is that nodes can pursue objectives or take actions that do not meet the goals of the organization, or are actually counterproductive. In this instance, the independence of nodes fails to develop synergybetween their activities or contribute to common objectives.Networks distribute the responsibility for operations, and provide redundancies for key functions. The various cells need not contact or coordinate with other cells except for thoseessential to a particular operation or function. The avoidance of unnecessary coordination or command approval for action provides deniability to the leadership andenhances operational security.Networks are not necessarily dependent on the latest information technology for their effect.The organizational structure and the flow of information inside the organization are the defining aspects of networks. While information technology can make networks moreeffective, low-tech means such as couriers and landline telephones can enable networks to operate effectively in certain circumstances.

Hub or Star and Wheel
Nodes communicate with one central node. The central node need not be the leader or decision maker for the network. A variation of the hub is a wheel design where the outer nodes communicate with one or two other outer nodes in addition to the hub. A wheel configuration is a common feature of a financial or economic network.

Government Affiliation Categories
Categorizing terrorist groups by their affiliation with governments provides indications of their means for intelligence, operations, and access to types of weapons. U.S. joint doctrine identifies three affiliations: non-state supported, state-supported, and state-directed terrorist groups.

Non-state supported. These are terrorist groups that operate autonomously, receiving nosignificant support from any government.State-supported. These are groups that generally operate independently but receivesupport from one or more governments.
State-directed. These groups operate as an agent of a government and receive substantialintelligence, logistic, and operational support from the sponsoring government.


A Military Guide to Terrorism in the Twenty-First Century 15 August 2005

technorati tags:

















Labels: , , , , , , , , ,

Thursday, November 08, 2007

Sociopaths Lack Guardian Angel

Sociopaths Lack Guardian Angel
Kathleen Fackelmann

Leading natavistic criminologist Adrian Raine of University of Pennsylvania after analyzing reasarch on 1400 persons stated that killers and antisocial people are more likely to have abnormalities in the prefrontal cortex. This location in forehead is involved in making moral decisions.

"The prefrontal cortex is like the guardian angel of behavior," stated Raine.

Guido Frank a -University of Colorado-Denver researcher argues that after analysis of brain scans of aggressive teenage males that abnormalities in the amygdala may also be prevalent. These preliminary findings according to Raine are the strongest to link abnormalities in the brain to violent behavior. Raine also states that proving brain damage that predisposes one to violence may not be excusable in court.

Raine stated,"We must protect society."

technorati tags:

















Labels: , , , , , , , , ,