Military Intelligence, FBI, CIA Intelligence Problems

Well many have complained that the FBI and CIA dropped the ball in the 9-11 attacks. But I submit to you that the days of Paul and the "One if by land, two if by sea" and the Trojan Horse Story are not the only possible attacks methods of operindi available these days. Today it could be: "one if by land, two if by sea, three if by underground, four if by under sea, five if by air, six if by space, seven if by computer, eight if by germ, nine if by Trojan horse, ten if by wave length, eleven if by weather, etc, etc. So the game is much more complicated than sitting behind your cotton tails not saying a thing. Or telling the people every ship must sail and somewhere on that ocean, I know she's got to be? Think about the situation where the bad guys are as smart as you and have unlimited time to plan and unlimited ways to do it. How can you protect yourself against that? Only by though and infiltration of networks. All this would amount to the strength and unity of the people. Of all these; ones through elevens; are possible scenarios.

Think of the entire array of types of attacks. By germ, well there must be some 200 possibilities. By computer virus attack, think of the unlimited technological targets from plants to business. By space, you have satellites, intercontinental ballistic missiles, land based energy units which can flash a satellite, etc. From the ground you have Earthquakes, dust storms weather, shipping containers, soda machines, buses, trucks, trains, passenger cars, suicide bombers of a multitude of possibilities. When we look at air we see combinations such as spraying AG planes, stealing a jet airliner and using it as a kamikaze, crude technology UAVs, missile, fighter/attack, etc. By sea, underwater submersibles manned and un manned, hijacked ships. By wavelength well we won't even go there. By the way if you think the National Security team is not doing their job or you are worried about false alarms, being prepared and alert, every American is of ultra importance and there is no such thing as being too prepared. The game has changed and the information flow is intense and the number of possibilities has grown and therefore the job is harder.

Did the FBI or CIA fail, or are we simply looking in hindsight and looking for someone to blame? Before we condemn our own team or the never stop world of intelligence we should remember that the midnight ride was over 200 years ago now and all Paul had to do is spot them coming and let the town know how. Today, they could be coming or be here already and they could be amongst us or invisible to the eye. Big difference my friends. Stop pointing fingers and start listening and thinking, it is the eyes and ears of the people and the education of a society to be alert and not get hurt, we, the people are just as much to blame if you are looking for such. There were people at the airport, people issuing licenses, people doing training, foreign neighbors allowing meetings, people in every piece of the equation, if any of those people would have been observing they may have prevented the whole thing, learn to be observant and pay attention, you that means everyone is responsible for our future.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

detailed home cleaning Park Ridge ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

Whats Right About Nebraska: How the Democrats Lost the Heart of American Populism

(Note: This article was written slightly before the 2004 election;... Read More

Trucking and the Flow of Fuel

There are many types of fuels besides that gasoline we... Read More

How Many Cases Will Elliot Spitzer Lose Now?

The devastating loss in case of Elliot Spitzer for NY... Read More

6 Steps to Destroy the American Infidels

The United States has enemies, which call the country the... Read More

When Will America Wake Up?

In order to win the presidency in America, candidates must... Read More

Profiling Eco-terrorists

The FBI recently before Congress stated that Eco-Terrorism was on... Read More

How to Become a Whistle Blower

Since the United States Government is promoting the whistle blower... Read More

Another Round of EU-Iran Talks Starts April 10 - Will Iran Be Referred To The UN Security Council?

Iran's objection to ratifying the International Atomic Energy Agency's Additional... Read More

Carl von Clausewitz On War

For anyone who wishes to become an armchair General in... Read More

Corruption and Transparency

I. The FactsJust days before a much-awaited donor conference, the... Read More

Fury and Sound as GM Seeds Abound

We have all heard of the huge debates surrounding genetically... Read More

Affirmative Inaction

One of Abraham Lincoln's claims to fame is the fact... Read More

MAURITANIA: Celebrating Tayas Ouster? Musical Chairs No Longer Fashionable In Africa

A few hours ago, Colonel Ely Ould Mohamed Vall, the... Read More

Boston Bankers

Many people make a lot of money in war. In... Read More

Experts?

ACCREDITATION: - Scholastic regimentation from the post WWII period has... Read More

Liberal Agenda and Communism; Lance Rants

If we go hog wild towards the liberal agenda where... Read More

How Does the US Congress Really Work?

Many people do not understand politics very well. They often... Read More

Fire Fighting and Healthy Forests

There is debate about the methodology of forestry and also... Read More

Proven Risk Youth Vs At-Risk & High-Risk Youth

In the fields of juvenile justice policy and programming, there... Read More

The Transformation Of Political Science And The Rise In Crime Rates

The current field of political sciences is dominated by a... Read More

Market Impeders and Market Inefficiencies

Even the most devout proponents of free marketry and hidden... Read More

Social Security Rant

As the Baby Boomer Generation continue to get older, one... Read More

The Second Coming in Albania

Blessed with Chinese GDP growth rates (7-8% annually in each... Read More

UAV Decoy Stategies, Theories and The Modern Art of War

Well having studying the need for decreasing America's dependence on... Read More

FTC Franchise Rule Making Sound and Fury in the Sand Box of Free Markets

Today we have a new franchise report from the Federal... Read More

express cleaning service Des Plaines ..