Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Al Qaida
Osama Bin Laden may be dead. "We have sources that have told us for the last several years now that they believe he was dead but they just don't have any proof of that fact," says Scott Stewart Vice President of Tactical Intelligence at Stratfor. Al Qaida linked websites have been promoting a message from him for a more than a week. The message is going to be screened carefully for evidence that it is indeed him and for the usual forensics that might give clues as to his whereabouts.
Ayman al Zawahiri released a video message on August 27 called the "Path of Doom". Was it a flop? US intelligence sources indicate it might be, because it didn't go "viral" on the internet. It appears the message reached a much smaller number of sites than other messages he released between November 2008 and February 2009. Why is that? Experts say periodically sites or portals that ar used to spread Al Qaida's messages are shut down, sometimes Al Qaida loses operative who work on propaganda to air strikes. In this case it's hard to say why.
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
One of the hallmarks of Al Qaida's attack methodology is to launch a strike and then once the first responders arrive and the TV cameras are rolling to launch a second wave of attacks. That's what happened on September 11, 2001 at the World Trade Center. It happened just a few days ago as well in North Waziristan, bu the shoe was on the other foot. According to U.S. intelligence, missiles fired from drones hit a compound a compound and three vehicles in the village of Mizar Madakhel. After local militants cordoned off the area and began recovering bodies, a second volley of missiles struck.
Narco-traffickers have found a new source of profit. Current and former U.S. government officials say they're helping international terrorists try to penetrate the U.S. borders.
National Security Correspondent JJ Green learns that stopping these kinds of attacks depends on something called "evolving intelligence."
The uprisings in North Africa and the Middle East have almost crippled the intelligence services in those countries.
J.J. Green, WTOP national security correspondent
When President Obama announced the plot had been dusrupted on October 29th, JJ Green had an *aha* moment.
Tags: security , Intel Briefing , Transportation Security Administration , TSA , John Pistole , Transportation Security Operations Center , underwear bomber , Phillip Mudd , Fred Burton , Target America