Military Intelligence, FBI, CIA Intelligence Problems

Well many have complained that the FBI and CIA dropped the ball in the 9-11 attacks. But I submit to you that the days of Paul and the "One if by land, two if by sea" and the Trojan Horse Story are not the only possible attacks methods of operindi available these days. Today it could be: "one if by land, two if by sea, three if by underground, four if by under sea, five if by air, six if by space, seven if by computer, eight if by germ, nine if by Trojan horse, ten if by wave length, eleven if by weather, etc, etc. So the game is much more complicated than sitting behind your cotton tails not saying a thing. Or telling the people every ship must sail and somewhere on that ocean, I know she's got to be? Think about the situation where the bad guys are as smart as you and have unlimited time to plan and unlimited ways to do it. How can you protect yourself against that? Only by though and infiltration of networks. All this would amount to the strength and unity of the people. Of all these; ones through elevens; are possible scenarios.

Think of the entire array of types of attacks. By germ, well there must be some 200 possibilities. By computer virus attack, think of the unlimited technological targets from plants to business. By space, you have satellites, intercontinental ballistic missiles, land based energy units which can flash a satellite, etc. From the ground you have Earthquakes, dust storms weather, shipping containers, soda machines, buses, trucks, trains, passenger cars, suicide bombers of a multitude of possibilities. When we look at air we see combinations such as spraying AG planes, stealing a jet airliner and using it as a kamikaze, crude technology UAVs, missile, fighter/attack, etc. By sea, underwater submersibles manned and un manned, hijacked ships. By wavelength well we won't even go there. By the way if you think the National Security team is not doing their job or you are worried about false alarms, being prepared and alert, every American is of ultra importance and there is no such thing as being too prepared. The game has changed and the information flow is intense and the number of possibilities has grown and therefore the job is harder.

Did the FBI or CIA fail, or are we simply looking in hindsight and looking for someone to blame? Before we condemn our own team or the never stop world of intelligence we should remember that the midnight ride was over 200 years ago now and all Paul had to do is spot them coming and let the town know how. Today, they could be coming or be here already and they could be amongst us or invisible to the eye. Big difference my friends. Stop pointing fingers and start listening and thinking, it is the eyes and ears of the people and the education of a society to be alert and not get hurt, we, the people are just as much to blame if you are looking for such. There were people at the airport, people issuing licenses, people doing training, foreign neighbors allowing meetings, people in every piece of the equation, if any of those people would have been observing they may have prevented the whole thing, learn to be observant and pay attention, you that means everyone is responsible for our future.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

disinfecting cleaning services Winnetka ..
In The News:

Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.

In Defense of the Feds Vs Katrina

I, too, am saddened by the disaster in New Orleans... Read More

Lets Make Some Things Clear about John Thune/Dan Nelson/MetaBank MetaGate

Let's make one thing clear: This Dan Nelson Automotive fiasco... Read More

Between Hiroshima Japan 6 August and the NY 11 September!

Japan lit its candles of pure, "noble sadness" on the... Read More

How To Date Ann Coulter (If You Must)

I've decided to go public with my intentions: I will... Read More

US Army in Catch 22 on Gays Issue

Many of those who wish to fight for our country... Read More

May Day, May Day

Down The Bush and BlairBy now everyone, except us, is... Read More

A Cheap Holiday in Other Peoples Misery (catching up with Mordechai Vanunu in Israel)

One of my favourite pieces of music is the Sex... Read More

A Few Quick Thoughts on Freedom and Technology

We have known of the innate characteristic need of members... Read More

World Moving from Socialism to Capitalism

The recent Jakarta summit of Asia and Africa brought remembrance... Read More

Using a Meteor Shower as Decoy for ICBM Attack

In the event of that a threatening nation to the... Read More

Minor Disruptions Cause Chaos in Transportation

Recently the Los Angeles Transit workers are on Strike and... Read More

The Protocols of Sion #1

There is a lot of debate about who made the... Read More

The Dawn On The Nile Valley Has Secrets To Tell!

Amnesty International comments on the proposal that has been laid... Read More

Maryland State Legislator wants to kill jobs and small business

Last year a Maryland State Legislator whom I presume never... Read More

America Needs an Education Reinvention Bill NOW!

In order to build a stronger, more self-sufficient America, America... Read More

Take Marijuana Off the DEAs Docket

Quit paying the DEA to chase marijuana. We could save... Read More

Canning International Terrorists? Literally

Well here is a great new product, we first saw... Read More

Banana Republic - United Kingdom

The recent scathing remarks by High Court Judge Richard Mawrey... Read More

3D Tactical Image Projection Enhanced Decoy System

I propose a special Projection Device code-named: "TIPED". This system... Read More

Make Plastic Out of Corn

Here is an interesting thought; Corn to make Plastic An... Read More

Is Inflation Harmful

Q. Should the Government be concerned if the CPI rises... Read More

A Look Ahead to 2008 (Part I)

Just as everyone has breathed a sigh of relief at... Read More

A Journey Through History

History repeats itself, goes the cliche. It does so, perhaps,... Read More

The US Government; Under Sarbaines Oxley

Sarbaines Oxley was probably the easiest way to destroy free... Read More

Upcoming Palestinian Elections Might Put Extremists In Power

The Palestinian Fatah Movement is doing whatever it can to... Read More

last minute cleaning help Highland Park ..