Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Al Qaida
Osama Bin Laden may be dead. "We have sources that have told us for the last several years now that they believe he was dead but they just don't have any proof of that fact," says Scott Stewart Vice President of Tactical Intelligence at Stratfor. Al Qaida linked websites have been promoting a message from him for a more than a week. The message is going to be screened carefully for evidence that it is indeed him and for the usual forensics that might give clues as to his whereabouts.
Ayman al Zawahiri released a video message on August 27 called the "Path of Doom". Was it a flop? US intelligence sources indicate it might be, because it didn't go "viral" on the internet. It appears the message reached a much smaller number of sites than other messages he released between November 2008 and February 2009. Why is that? Experts say periodically sites or portals that ar used to spread Al Qaida's messages are shut down, sometimes Al Qaida loses operative who work on propaganda to air strikes. In this case it's hard to say why.
It should come as no surprise to you that terrorists and criminals are adapting to exploit different technologies to achieve its goals. Now we're hearing that international drug trafficking networks are using Google Earth to locate the roadblocks and security forces so as to avoid them. Algerian police say Al Qaida in the land of the Mahgreb actually bragged about in a web posting. Authorities around the world have also noted more reliance on technology such as blue tooth to carry out criminal and terrorist deeds.
One of the hallmarks of Al Qaida's attack methodology is to launch a strike and then once the first responders arrive and the TV cameras are rolling to launch a second wave of attacks. That's what happened on September 11, 2001 at the World Trade Center. It happened just a few days ago as well in North Waziristan, bu the shoe was on the other foot. According to U.S. intelligence, missiles fired from drones hit a compound a compound and three vehicles in the village of Mizar Madakhel. After local militants cordoned off the area and began recovering bodies, a second volley of missiles struck.
Narco-traffickers have found a new source of profit. Current and former U.S. government officials say they're helping international terrorists try to penetrate the U.S. borders.
National Security Correspondent JJ Green learns that stopping these kinds of attacks depends on something called "evolving intelligence."
The uprisings in North Africa and the Middle East have almost crippled the intelligence services in those countries.
J.J. Green, WTOP national security correspondent
When President Obama announced the plot had been dusrupted on October 29th, JJ Green had an *aha* moment.
Tags: security , Intel Briefing , Transportation Security Administration , TSA , John Pistole , Transportation Security Operations Center , underwear bomber , Phillip Mudd , Fred Burton , Target America