Gun Control, Knife Control,…Acid Control? Its seems like there is nothing Americans can agree on lately. We are fighting old wars and new ones right here in the states. Though the bullets have not yet begun to fly. The truth of the matter is that there is one threat we all should be agreeing on …
6 Key Things to Do Before, During, and After a Terrorist Attack These things aren’t going away. Whether at home or abroad it’s clear we are under attack. Though many governments refuse to admit that we have serious issues with radical Islam the body count doesn’t lie. Aside from that version of terror we are …
The post 6 Key Things to Do Before, During, and After a Terrorist Attack appeared first on SHTF & Prepping Central.
Make no mistake, electing a commander in chief to keep America safe will be the most important issue in next Tuesday’s election. And keeping America safe during these times will be the greatest challenge of our next president. Just consider the present landscape at home and abroad.
- Radical Islamist attacks on U.S. soil and abroad;
- One thousand active FBI probes of ISIS in the U.S.;
- FBI investigations of ISIS in all fifty states;
- An aggressive China laying claim to the South China Sea where $5-trillion of the world’s economy passes on an annual basis;
- Chinese cyber warfare against American businesses and the Federal Government;
- An Iranian nuclear deal allowing the terrorist regime to move forward with Intercontinental Ballistic Missile (ICBM) development at some point;
- The need to address the electromagnetic pulse (EMP) threat;
- No land-based missile defense capability on the entire East Coast of the U.S.;
- The dispersion and expansion of radical Islam well beyond Al Qaeda into groups such as ISIS, Boko Haram and others;
- Radical Islamists effectively using social media for recruitment efforts;
- The volatile Kim Jong-un advancing North Korea’s nuclear and missile programs;
- Nuclear weapons in an unreliable and unstable Turkey;
- Failure to secure America’s borders.
Surviving a Terrorist Attack: 5 Things You Need To Know Over the past two decades, terrorism has been rapidly climbing the list of likely disasters. Pretty soon, terrorist attacks in the U.S. could be as common as hurricanes. But while millions of people prepare for hurricane season every year, far fewer people prepare for terrorism. …
The post Surviving a Terrorist Attack: 5 Things You Need To Know appeared first on SHTF & Prepping Central.
In light of the recent Paris terrorism attacks, and the relentless media coverage of this incident, maybe, just maybe, “preppers” are so crazy after all.
One thing is clear.
The days of Mayberry are over.
Maybe getting started as a “prepper” isn’t such a dumb idea.
In fact, in today’s times, it might save you and your families’ lives.
You see it all over the mainstream media as well as our favored alternative media websites, things are changing rapidly, and not for the better. You can feel it in your gut, things are going to go from bad to worse, and seem to be happening at alarmingly faster pace. With all of the horrific things that are happening in our once great country, now is the time to prepare for the bad times that are inevitably coming. But where do you begin? What can you do? The first thing is to start by making a list. Make a list of everything you want to do to prepare, and keep this list visible so you are always forcing yourself to look at it so you can be doing something to get prepared.
Without a doubt, things are changing.
Don’t expect a TV talking head to tell you what you need to do.
Do you trust the police to serve and protect?
It sure seems as if we’ve entered a form of police state living in America.
Police grabbing assets of innocent citizens to pad their budgets.
Have we turned a corner in Our country?
Is the real problem Americans killing other Americans? Is this the terror we now fear?
This New York Times article raises though-provoking questions about police abuse and terrorism in America:
State violence, as epitomized in these cases by what people view as police abuses, conversely, has produced a specific feeling of terror, one that is inescapable and unavoidable.
The difference in people’s reactions to these different kinds of killings isn’t about an exaltation — or exploitation — of some deaths above others for political purposes, but rather a collective outrage that the people charged with protecting your life could become a threat to it. It is a reaction to the puncturing of an illusion, the implosion of an idea. How can I be safe in America if I can’t be safe in my body? It is a confrontation with a most discomforting concept: that there is no amount of righteous behavior, no neighborhood right enough, to produce sufficient security.
It produces a particular kind of terror, a feeling of nakedness and vulnerability, a fear that makes people furious at the very idea of having to be afraid.
Is this police abuse and terror limited to the black communities?
Or is it spreading to all corners of our society?
In an ongoing effort to stop terrorism, the government has now instituted a new policy for all banks.
One that if not complied with could send bank executives to jail.
The new program is asking banks to notify the government of large cash withdrawals and is even asking banks to seize your money so they can investigate what you might be doing with it.
How crazy is that?
Via The Sovereign Man Simon Black
What a lot of people don’t realize is that banks are already unpaid government spies.
Federal regulations in the Land of the Free REQUIRE banks to file ‘suspicious activity reports’ or SARs on their customers. And it’s not optional.
Banks have minimum quotas of SARs they need to fill out and submit to the federal government.
If they don’t file enough SARs, they can be fined. They can lose their banking charter. And yes, bank executives and directors can even be imprisoned for noncompliance.
This is the nature of the financial system in the Land of the Free.
And chances are, your banker has filled one out on you—they submitted 1.6 MILLION SARs in 2013 alone.
But now the Justice Department is saying that SARs aren’t enough.
Now, whenever banks suspect something ‘suspicious’ is going on, they want them to pick up the phone and call the cops:
“[W]e encourage those institutions to consider whether to take more action: specifically, to alert law enforcement authorities about the problem, who may be able to seize the funds, initiate an investigation, or take other proactive steps.”
So what exactly constitutes ‘suspicious activity’? Basically anything.
According to the handbook for the Federal Financial Institution Examination Council, banks are required to file a SAR with respect to:
“Transactions conducted or attempted by, at, or through the bank (or an affiliate) and aggregating $5,000 or more…”
It’s utterly obscene. According to the Justice Department, going to the bank and withdrawing $5,000 should potentially prompt a banker to rat you out to the police.
But that’s the America we live in.
Where being suspected of being a suspect, makes you a suspect.
These kinds of programs have been popping everywhere.
Years ago it was the FBI asking camping store owners to notify them if someone made large cash purchases in their stores.
Then it was revealed the NSA was online snooping and spying on every keystroke you ever entered when you went online.
And they’re watching you to see if you might be giving $5,000 to Granny for a brand new deck.
Be careful what you do with your money now, lest you attract the attention of big brother.
A top bio-weapons expert who defected from Russia is being harshly critical of how Obama has handled the Ebola crisis.
Though he’s not sure if it’s willful ignorance or outright ineptitude (honestly it could be either), he says what Obama’s done has exposed Americans to incredible dangers.
Dr. Serguei Popov is one of American’s leading biochemists and microbiologists. He defected from Soviet Russia in 1992 and has been teaching at George Mason University of late.
And he’s none too pleased with Obama allowing flights from hot-zone countries to continue to come into the U.S.
As The Blaze reports, Popov said, “I don’t buy the argument that restricting air travel from Africa would aggravate the epidemiological crisis… I believe it is disingenuous to the public when they say Ebola is not airborne.”
Popov doesn’t know why America hasn’t shut down the air travel from infected countries, but he admitted that in the past, governments have used containment to keep deadly viruses like Ebola at bay.
As The Blaze wrote:
Popov referred to the 1971 smallpox outbreak that killed three people in a city near the Aral Sea, in what is now Kazakhstan. The city was quarantined immediately by the government and lead to city-wide vaccinations that saved lives. People were not allowed in or out of the city until it was cleared.
Popov said that even though Ebola doesn’t travel long distances like other airborne viruses like smallpox or the flu, it could be highly contagious in close quarters and that in urban settings, it could be very easy for a fully infected person to pass the virus from host to host.
‘It makes sense to suspect Ebola transmission by droplets of bodily fluids,’ he said.
Asked about the possibility of Ebola being transmitted by droplet, Norlund, the CDC spokeswoman, referred to the agency’s guidelines, which say Ebola is not airborne.
Popov believes that the United States is not taking the possibility of an epidemic seriously.
It is a ‘fundamental mistake how the administration has chosen to handle this,” he said. “[They are] watching the epidemic unfold and not taking the appropriate action to contain it.’
Some suspect that Obama doesn’t want to shut down the border because it’s his way of punishing Americans for their history of slavery. Others suspect he might use an Ebola outbreak to impose martial law.
Whatever the reasons are exactly, there is no doubt that Obama could have handled the crisis much better. Perhaps he was just using Ebola as a test to see how Americans would respond?
If Americans ever have to face a cataclysmic biological threat — whether it’s Ebola or something else — everything will be shut down.
The grocery store won’t be open.
The gas stations will be closed.
And you’ll be left to fend for yourself.
Shortly after the Boston Marathon bombing, the Boston Police Department teamed up with IBM to develop facial recognition technology in an attempt to stop possible terror events in the future.
With that in mind, Boston hosted a music festival in both May and September 2013 called The Boston Calling Music Festival.
Concertgoers were expecting they would be there only to watch a show. But little did they know that the Boston PD was using advanced spy technology to watch them.
Using 10 cameras capable of intelligent video analysis, police and IBM captured thousands of faces and scanned individuals for details including skin color, height and clothing to screen for possible forensic identification. The tech also watched traffic and crowd congestion, searched for suspicious objects and monitored social media in real-time.
The facial recognition technology they were using was reportedly meant to analyze every single attendee’s face, whether he or she wanted to be analyzed or not.
Worse yet? The information that was gleaned from the test was not secured in any way.
Apparently, much of the sensitive material detailing the program and compiled after the pictures were taken was found online… an entire year after the recordings took place.
Other data stored online by Boston police in unsecured servers include drivers’ licenses, addresses, parking permit information, and more — so it’s safe to say police weren’t all that concerned about privacy or safety.
Boston PD initially denied any involvement in the programs’ deployment on May 25-26 and Sept. 7-8 at City Hall Plaza, stating in an email from a representative that “BPD was not part of this initiative.”
‘We do not and have not used or possess this type of technology,’ the department wrote to Dig.
Files on the program uncovered online include photographic evidence showing Boston PD present inside IBM’s program monitoring stations and receiving instruction on how to use the tech. When presented with this evidence, Boston officials admitted the city’s direct involvement.
“The city of Boston engaged in a pilot program with IBM, testing situational awareness software for two events hosted on City Hall Plaza: Boston Calling in May 2013, and Boston Calling in September 2013,” Boston Mayor Marty Walsh press secretary Kate Norton wrote in an email to the publication.
“The purpose of the pilot was to evaluate software that could make it easier for the city to host large, public events, looking at challenges such as permitting, basic services, crowd and traffic management, public safety, and citizen engagement through social media and other channels. These were technology demonstrations utilizing pre-existing hardware (cameras) and data storage systems.”
So the Boston PD carried out an egregious violation of privacy. They lied about their involvement, then “confessed” when confronted with the evidence.
Citizens should expect better behavior from their police. Then again, we’re talking about the Boston police, the same “peace officers” who kicked down the doors of innocent people as they searched for the Boston bombing suspects.
Clearly, respecting privacy rights and honoring the law of the land aren’t their highest priorities — if they are priorities at all.
The truth is, violations of privacy carried out by the “authorities” are going to continue whether we like it or not.
How does it feel to know you’re being watched right now? Click here to learn what you can do to protect your privacy.
The threat of a cyber-terrorist attack on U.S. energy companies is very real according to the cyber security firm Symantec.
Symantec warns of the new “Dragonfly virus,” which comes out of Eastern Europe. This malware virus has the power to utterly ruin large swaths of the electric grid should it manage to infect a power company’s computer systems.
The virus — which targets energy grids, major electricity generation firms, petroleum pipelines operators, and energy industrial equipment providers — has been around since 2011 and has already affected thousands of organizations in over 84 countries.
According to Symantec, the danger associated with the Dragonfly virus is it gives the hackers running the malware software the ability to gain privileged access inside the company’s operations systems.
Once the software is installed, hackers can torpedo the systems with just the click of a mouse.
Security experts are unsure where the virus originated, but believe that since all of the countries that have been affected so far have been part of NATO, that it could definitely be a foreign nation like Russia who is responsible for the virus.
The fact our nation’s power grids are so susceptible to cyber terrorism is frightening.
Should our nation’s grids suffer any cataclysmic attack, it would render millions of Americans defenseless and unable to provide for themselves.
The worst part about the Dragonfly virus is that many of the nation’s computer systems are believed to already have it since the malware is installed with updates for their operational controls.
The Dragonfly group is said to have at its disposal a range of malware tools to disrupt computer systems, especially industrial control systems. Sources believe it operates similar to the Stuxnet malware that the United States and Israel had used against Iran’s nuclear program to disrupt the operation of its centrifuges that enrich uranium.
According to Symantec, Dragonfly used two main malware tools – Backdoor Oldrea and Trojan Karagany. The former appears to be customized malware written for the attackers.
Eric Chien of Symantec’s Security Technology and Response Team told Bloomberg in an interview the type of access Dragonfly has indicates something more than snooping.
“When they do have that type of access, that motivation wouldn’t be for espionage,” Chien said. “When we look at where they’re at, we’re very concerned about sabotage.”
“The worst-case scenario would be that the systems get shut down,” Chien said. “You could see the power go out, for example, and there could be disruption in that sense.”
And just to make things clear, this is not the only cyber-threat leveled at the power systems here in the U.S.
Recently the FBI uncovered “Ugly Gorilla, a Chinese hacker who has been targeting utility companies’ systems to cut off heat and damage pipelines.”
Knowing how vulnerable the nation’s grid system is to cyber attack means if you want to prepare for a possible “grid down” scenario, you had better do so sooner than later.
This is perhaps the biggest 9/11 story of the last 12 months… but few Americans seem to be aware of it.
While U.S. media has continued to parrot the official “terrorists with box cutters” story… and deny all evidence contrary to it… at least one major media company has gone on the record alleging that 9/11 was an inside job.
Just before the 2013 anniversary of 9/11, Russia Today ran a 13-minute segment covering some of the major scientific evidence that proves the official 9/11 story cannot possibly be true.
Russia Today examines why and how a third building (WTC 7) collapsed on 9/11. They also reveal new information about “Operation Gladio,” a long-term program to carry out false flag terrorism as a means of increasing government power.
You can watch the full video segment here:
The Department of Homeland Security has taken to arresting flea market vendors instead of terrorists these days.
Infowars has reported that the DHS has begun investigations in Massachusetts, Maryland, Texas and New Hampshire to uncover which merchants at local flea markers are selling counterfeit merchandise.
Isn’t that the role of community police?
This past week DHS officials teamed up with police forces in Essex county, Massachusetts to help bust 40-some odd merchants for the sale of “bogus merchandise.”
This of course highlights the fact that not only is taxpayer money being used to support an agency that is piggybacking on the efforts of police to crackdown on petty crime… it’s actually detracting from the DHS’s ability to handle real threats to national safety.
In fact, recent revelations have indicated that not only is DHS ignoring their mission to stop terrorism, they’ve even helped facilitate the unlawful entry of suspected terrorists into the U.S. on multiple occasions.
As Paul Watson, contributor to Prison Planet noted:
“Perhaps the most egregious example emerged in 2012 when a leaked study produced by the National Consortium for the Study of Terrorism and Responses to Terrorism at the University of Maryland, and funded by the DHS to the tune of $12 million, largely ignored Islamic terrorism while concentrating on the threat posed by Americans who are ‘reverent of individual liberty.’”
The DHS is ignoring one of the most vocal and militantly anti-U.S. forces on the planet, and is instead spending their time investigating freedom lovers and flea market vendors.
What’s even more peculiar: Not only is DHS going after the wrong targets, they’ve even created a de-facto “hands off list” allowing for the free movement in and out of the U.S. of individuals with known associations to terrorist groups.
As Republican Chuck Grassley was able to show:
“Documents pertaining to the [hands-off list] reveal that an Islamic leader with reported ties to several terrorist groups was removed from a watch list and given a visa despite officials suggesting that he endorsed and incited terrorist attacks.”
Unfortunately, this isn’t a revelation of ineptitude on the DHS’s part.
It’s actually a wanton display of misappropriations of both funds and efforts to pursue non-legitimate threats that aren’t even threatening our nation’s safety.
In this day of hyper-public electronic communication, it’s surprising what people will put on display for the world to see.
Even though people know sophisticated software tracks their every move online, that didn’t stop a young girl from the Netherlands from sending American Airlines a threatening tweet on Sunday.
A young girl by the name of “Sarah” using the twitter handle of @QueenDematriax_ tweeted directly at American Airlines early Sunday that “something big was going to happen” on June 1st.
Her tweet below appeared live on Twitter’s newsfeed and was immediately responded to.
American Airlines quickly tweeted back and told “Sarah” that threats of that nature were taken very seriously and that all of the information about both her and her computer had been forwarded to security along with the FBI so she could be prosecuted.
Though Sarah quickly countered “she was only joking” and that she was “just a white girl,” it didn’t stop police in Rotterdam, Netherlands from arresting her.
“Sarah” has since changed her twitter username and is currently being held by police for “creating a false alarm.”
Though the motives for the tweet have yet to be explained, a copycat tweet was sent to Southwest airlines just a few hours later. Southwest Airlines responded in similar fashion, tracking both the IP and address of the user and contacting authorities immediately.
“Sarah” indicated she was only joking, but does that let her off the hook? She is now learning the truth of Solomon’s Proverb:
Like a madman who throws firebrands, arrows and death, so is the man who deceives his neighbor, and says, “Was I not joking?”
Free speech may cover many things, but, frankly, making threats that could endanger the lives of other people is just plain stupid.
Watch what you say… people are listening.
SCADA is so vulnerable, Kaspersky told the AusCERT audience: “It’s not possible to protect. Stuxnet told us that modern systems are not protected at all. SCADA could be very easy victims – the result of an attack could be like Stuxnet but everywhere.”
He said his company’s research suggests that malware costs the world economy $US100 billion each year, and noted other vendors estimates of the total trillion-dollar cybercrime industry mean that, “because of cybercrime, we have the equivalent of two or three Japanese tsunamis a year” of economic damage.
People “need to understand the danger of cyber-weapons and of cyber-war to ruin national infrastructure. Transportation, power-grids, power plants … it would take us back to the pre-electric era.”
The US has plans in place to attack Iran if other measures fail to stop it developing nuclear weapons, Washington’s envoy to Israel says.
Dan Shapiro said the US hoped diplomacy and sanctions would persuade Iran to alter its nuclear programme, but a military option was “ready”.
US President Obama has previously said military action has not been ruled out.
An ongoing review of medical facility security surrounding radioactive materials by the Government Accountability Office has turned up examples of vulnerabilities.
In prepared testimony (.pdf) presented March 14 to the Senate Homeland Security and Governmental Affairs subcommittee on oversight of government management, the federal workforce and the District of Columbia, the GAO notes that there exists no specific national standard for facility radiological source controls.
On Friday, U.S. Department of Homeland Security Secretary Janet Napolitano said in an interview in Paris that the risk of the “lone wolf” terrorist, with no ties to organized terrorist groups is on the rise, and the global threat has shifted.
Secretary Napolitano urged European partners to seal the deal on the US-EU Agreement on the Use and Transfer of Passenger Name Records, recently initialed in Paris… Some European countries have been reluctant to sign the information-sharing agreement between nations of passenger data, as it is viewed by many as controversial due to privacy concerns.
The government and industry computer systems are facing a “disturbing” number of cyber attacks, including a recent serious assault on the Foreign Office’s network, the head of the communications spy agency said on Monday.
Iain Lobban, director of the Government Communications Headquarters (GCHQ), said the attacks posed a threat to the economic wellbeing.
Department of Homeland Security Secretary Janet Napolitano said today that a major computer attack against critical U.S. infrastructure could result in a loss of life and massive economic damages.
“The network intrusion that shuts down the nation’s critical infrastructure .. . could cause loss of life but also a huge economic loss.” Napolitano said at a cybersecurity event sponsored by the Washington Post. “We’ve seen attempts on Wall Street, transportation systems, things of those sorts.”
Cybersecurity experts have long warned that hackers could target electrical grids and power plants, which could affect hospitals and water treatment plants.