Military Intelligence, FBI, CIA Intelligence Problems

Well many have complained that the FBI and CIA dropped the ball in the 9-11 attacks. But I submit to you that the days of Paul and the "One if by land, two if by sea" and the Trojan Horse Story are not the only possible attacks methods of operindi available these days. Today it could be: "one if by land, two if by sea, three if by underground, four if by under sea, five if by air, six if by space, seven if by computer, eight if by germ, nine if by Trojan horse, ten if by wave length, eleven if by weather, etc, etc. So the game is much more complicated than sitting behind your cotton tails not saying a thing. Or telling the people every ship must sail and somewhere on that ocean, I know she's got to be? Think about the situation where the bad guys are as smart as you and have unlimited time to plan and unlimited ways to do it. How can you protect yourself against that? Only by though and infiltration of networks. All this would amount to the strength and unity of the people. Of all these; ones through elevens; are possible scenarios.

Think of the entire array of types of attacks. By germ, well there must be some 200 possibilities. By computer virus attack, think of the unlimited technological targets from plants to business. By space, you have satellites, intercontinental ballistic missiles, land based energy units which can flash a satellite, etc. From the ground you have Earthquakes, dust storms weather, shipping containers, soda machines, buses, trucks, trains, passenger cars, suicide bombers of a multitude of possibilities. When we look at air we see combinations such as spraying AG planes, stealing a jet airliner and using it as a kamikaze, crude technology UAVs, missile, fighter/attack, etc. By sea, underwater submersibles manned and un manned, hijacked ships. By wavelength well we won't even go there. By the way if you think the National Security team is not doing their job or you are worried about false alarms, being prepared and alert, every American is of ultra importance and there is no such thing as being too prepared. The game has changed and the information flow is intense and the number of possibilities has grown and therefore the job is harder.

Did the FBI or CIA fail, or are we simply looking in hindsight and looking for someone to blame? Before we condemn our own team or the never stop world of intelligence we should remember that the midnight ride was over 200 years ago now and all Paul had to do is spot them coming and let the town know how. Today, they could be coming or be here already and they could be amongst us or invisible to the eye. Big difference my friends. Stop pointing fingers and start listening and thinking, it is the eyes and ears of the people and the education of a society to be alert and not get hurt, we, the people are just as much to blame if you are looking for such. There were people at the airport, people issuing licenses, people doing training, foreign neighbors allowing meetings, people in every piece of the equation, if any of those people would have been observing they may have prevented the whole thing, learn to be observant and pay attention, you that means everyone is responsible for our future.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

best cleaning company Lincolnshire ..
In The News:

Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.

When Will America Wake Up?

In order to win the presidency in America, candidates must... Read More

Eminent Domain Suggested as Cost Saving Measure in DC

Washington DC council member David Catania actually suggested that the... Read More

Arson Neighborhood Mobile Watch Program for Summer Fire Season

Due to the bizarre weather patterns this winter California got... Read More

Is Reinstating The Draft Such a Bad Idea?

In his bid for the presidency, John Kerry pronounced a... Read More

Companies, Consumer and Cost of Fuel

Which companies are most affected by fuel? Who really bears... Read More

Spies in Seminaries - Stalin the CEO

The use of religion is well-documented as a social engineering... Read More

Dealing With UK Water Rates Debts: What You Need To Know

UK Water RatesYOU CANNOT BE DISCONNECTED FOR WATER RATES DEBTSWater... Read More

What Is The Filibuster All About?

The filibuster has been a tool available to U.S. Senators... Read More

Media Advertising: New Alcohol Advertising Codes - 1 October 2005

Businesses advertising alcohol either in TV or non-broadcast format need... Read More

Philosophical Thoughts from a Road Warrior; Part II

Continued thoughts while driving down the road in a huge... Read More

The Revolt of the Poor: The Demise of Intellectual Property?

Three years ago I published a book of short stories... Read More

The Worlds Eldest Democracy Was A Truly Romantic Affair

Visible remnants of the world's eldest democracy can be seen... Read More

Image is Everything in Redevelopment Projects

Revitalization Downtown projects are all the rage in fact the... Read More

Monetary Flows, Retained Earnings, Over Regulation and Abundant Resources

All countries have specific things that are abundant in the... Read More

Cloaking Giant Airships is Possible, Why Stop There?

We know we can cloak a giant airship from those... Read More

MUD

MUD ? Much Unnecessary DisclosureThe Federal Trade Commission recently asserted... Read More

How to Tell When Government Regulators are Shopping You

In this day and age of tattletale, whistleblower heroes and... Read More

Politicians Will Save Civilization

Most politicians are completely out to lunch and totally Machiavellian... Read More

The Politics Of The American Dream

The American Dream is the promise to have it all... Read More

People Say ? and Do ? the Dumbest Things

When Pennsylvania Senator Arlen Spector exercised his right to free... Read More

George Bush--A New World Order

When this president's father was in the Oval Office, he... Read More

Uncle Sam Cracks Down Online!

In a move that rocked the online world and left... Read More

National ESRI Policies

Many are very impressed with the NIMA (National Imagery and... Read More

Gas Prices and the Impact of Inflation

Year Item Price Rate of Inflation 03/80 Gasoline (per gallon)... Read More

Harmonic Beams to Pre-Detonate Shoulder Launched Surface to Air Missiles

Using Harmonic Beams to Pre-Detonate Shoulder Launched Surface to Air... Read More

on demand house cleaning Lake Forest ..