Total Pageviews

2/06/2012

Terrorist/Revolutionary Literature and the FBI Orwellian Police State paranoia

Fascinating document posted on the always interesting public intelligence.

Notable for it's mention of Peroxides. Electronics.

Peroxides b/c TATP which has been blogged about elsewhere, perhaps even on Schnieder on Security?

Give it a look and see?

http://www.schneier.com/

Also timers and RF, electronics? The whole planet is filling up with consumer electronics and increasingly agile mobile devices. Should this technology be somehow alien to the consumer? Is a consumer of electronics curiosity about these electronics to be suspect?

ALSO:

It closes with this:

"Some of the activities, taken individually,
could be innocent and must be examined by
law enforcement professionals in a larger
context to determine whether there is a basis
to investigate.  The activities outlined on this
handout are by no means
all-inclusive but have been compiled from a
review of terrorist events over several years."

"and must be examined by
law enforcement professionals in a larger
context to determine whether there is a basis
to investigate."

-----> What is the nature of this "investigation" and is the usual legal process of getting a warrant pursued? What about notice of the individual being investigated?


THE FINE PRINT....


Notice the fine print: "

This project was supported by Grant Number 2007-MU-BX-K002, awarded by the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.  Each indictor listed above, is by
itself, lawful conduct or behavior and may also constitute the exercise of rights guaranteed by the U.S. Constitution. In addition, there may be a wholly innocent explanation for conduct or behavior that
appears suspicious in nature. For this reason, no single indicator should be the sole basis for law enforcement action. The totality of behavioral indicators and other relevant circumstances should be
evaluated when considering any law enforcement response or action."

---->"Each indictor listed above, is by
itself, lawful conduct or behavior and may also constitute the exercise of rights guaranteed by the U.S. Constitution."

---->"In addition, there may be a wholly innocent explanation for conduct or behavior that
appears suspicious in nature."

---->"The totality of behavioral indicators and other relevant circumstances should be
evaluated when considering any law enforcement response or action."


This last comment is disturbing. It almost seems like an axiomatic statement of intent? Who is going to decide what the "totality of behavioral indicators" are? What is a behavioral indicator for that matter? Who will do this evaluation? Are computers already deciding these things and then pushing red flagged data streams further up the chain of command in some FBI signals intercept and analysis operation? We as American citizens do not know the answers to these questions even though we have been asking for some time. The system is silent in regards to details about the way in which intelligence data is handled. And that lack of transparency is unconstitutional, insofar as it infringes upon the liberty of the individual without due process protections, etc.




http://info.publicintelligence.net/FBI-SuspiciousActivity/Internet_Cafe.pdf

Brought to us by the FBI and the BJA

Document titled "Defending Communities against Terrorism: Potential Indicators of Terrorist Activities Related to Internet Cafes"



Asks: WHAT SHOULD I CONSIDER SUSPICIOUS?


People Who:
 Are overly concerned about privacy, attempts to shield the screen from view of
others
 Always pay cash or use credit card(s) in different name(s)
 Apparently use tradecraft: lookout, blocker or someone to distract employees
 Act nervous or suspicious behavior inconsistent with activities
 Are observed switching SIM cards in cell phone or use of multiple cell phones
 Travel illogical distance to use Internet CafĂ©
Activities on Computer indicate:
 Evidence of a residential based internet provider (signs on to Comcast, AOL,
etc.)
 Use of anonymizers, portals, or other means to shield IP address
 Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
 Encryption or use of software to hide encrypted data in digital photos, etc.
 Suspicious communications using VOIP or communicating through a PC game



 Download or transfer files with “how-to” content such as:
- Content of extreme/radical nature with violent themes
- Anarchist Cookbook, explosives or weapons information
- Military tactics, equipment manuals, chemical or biological information
- Terrorist/revolutionary literature
- Preoccupation with press coverage of terrorist attacks
- Defensive tactics, police or government information
- Information about timers, electronics, or remote transmitters / receivers


1 comment:

  1. Heya i am for the first time here. I found this board and I find It truly useful & it helped me out much. I hope to give something back and aid others like you helped me.
    Specialty Products Company 87400 Cam Bolt for GM Truck

    ReplyDelete