Tweet This Post
Comment by Maggie Szymczyk
March 27, 2015 @ 5:58 am
For this weeks discussion I would like to discuss fusion centers and their benefits to the nation as they seem to play and important role in homeland security and in the future have ability to become a place where every level of government is able to cooperate and effectively communicate with each other and work together. Fusion centers as described by the Department of Homeland Security (2015) “serve as the focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information and have additional responsibilities related to the coordination of critical operational capabilities across the statewide fusion process with other recognized fusion centers. Furthermore, primary centers are the highest priority for the allocation of available federal resources, including the deployment of personnel and connectivity with federal data systems” (pg. 1). Their role in the nation’s preparedness and responses to natural disasters and terroristic attacks are crucial. It is one place where members of different departments and agencies are able to come together and work together as one to deal with the situation at hand. It is where federal, state, local and private sector of government is able to collaborate and effectively communicate to make decisions to resolve the issue that is happening. Their important role is to spread the information to every level of government and create plans of action that will be able to have all players involved.
It is also a place where preparedness for a storm takes place. According to Schulz & Guidetti (2013) “The ability to receive, analyze, disseminate, and gather information – all of which actions, for fusion centers, are essential to the creation and development of critical operational capabilities – put the New Jersey Regional Operations and Intelligence Center (NJ ROIC) squarely in the middle of the efforts to prepare for and react to the rapidly approaching storm” (pg. 16). Fusion centers are the central operating base before, during and after the storm. Members of many agencies and departments are able to come together to collaborate and find the best solutions for the aftermath. It is here where it is possible to quickly respond to threats and help in recovery efforts that are crucial to the citizens when disasters strike. Schulz & Guidetti (2013) also point out “Sandy underscored how fusion centers can meet their own responsibilities in this area by addressing the needs of government agencies and helping the private sector effectively respond to and recover from a major disaster” (pg. 16). It is one place where the issues are address and quick solutions are found. Without the open communication and ability of so many members of different agencies to be together at one place, there efforts would have been much more difficult. We as a nation are trying to achieve the open communicate efforts that are very difficult to establish and the fusion centers are one place where this can happen without major obstacles because all the players are in the same place at the same time. As Rollins & Connors (2007) state “fusion centers are evolving into one-stop shopping organizations that are responsible for analyzing all-hazards threat information, tracking asset location and operational readiness, and issuing reports related to current, emerging, and future threats. At a minimum, the core mission of these post-9/11 fusion centers is to report on information that may affect the security of a given locality” (pg. 3). This is an excellent example of why the fusion centers are such a crucial part of the safety of the nation. They are able to achieve something that otherwise would be very difficult and even impossible. There is no other place where so many members of homeland security communicate can work together so closely and establish goals and solutions.
Another one of a very important concept that the fusion centers bring to the table is value added information to the law enforcement, public safety and private sector through dissemination groups. According to Fuentes (2013) “Most importantly, the ROIC has always been a fusion center that combines both an intelligence center and an emergency operations center. By analyzing and sharing all crimes and all hazards information, the ROIC empowers frontline law enforcement, public safety, fire service, emergency response, public health, and private sector security personnel to fully understand and respond to both man-made and natural threats” (pg. 1). Fusion centers are not important only during natural disasters but also dealing with day-to-day activities. There is always something happening around the world and even though some people would not see that those events can be an indicators, members that work at the fusion centers look at all of those events. The centers share information about crimes and work together to find solutions to reduce the amount of crime that is happening. Their role is not just one focused on natural disasters but also other events that are taking place in a particular state. ROIC deals with every event and every threat dealing with New Jersey but other fusion centers deal with their own region. It is important to have a place where information can be shared about the things like natural disasters and solutions being found together. Fusion center is a place where every member of homeland security stakeholder can contribute and build partnerships that eventually can save lives. It is important to remember that these individuals work together to reduce vulnerabilities and ensure that each states is prepared for any threats and helps in recovery after the threat occurs. It is a crucial element of each state and it is important that fusion centers continue to be funded to ensure safety and security as well as provide help in the time of need. Fusion centers are really important and we should remember that without them our efforts to ensure safety and help in preparedness and recovery would not be as successful as they are right now. Of course, there are always improvements that can be made and I believe in couple of years, fusion centers will be able to achieve perfection. As Napolitano (2011) points out “These centers analyze information and identify trends to share timely intelligence with federal, state, and local law enforcement including DHS, which then further shares this information with other members of the Intelligence Community. In turn, DHS provides relevant and appropriate threat information from the Intelligence Community back to the fusion centers… Our goal is to make every one of these fusion centers a center of analytic excellence that provides useful, actionable information about threats to law enforcement and first responders” (pg. 6). One day that will happen and these centers will play a crucial role in analytical abilities in homeland security as well as a place where partnerships and open communication is possible no matter what agencies and level of government is involved.
Department of Homeland Security. (January 9, 2015). Fusion Center Locations and Contact Information. Department of Homeland Security. Retrieved from http://www.dhs.gov/fusion-center-locations-and-contact-information
Fuentes, R. (February 5, 2013). Fusion Center Coordinates New Jersey Hurricane Sandy Disaster Response. Information Sharing Environment. Retrieved from http://ise.gov/blog/col-rick-fuentes/fusion-center-coordinates-new-jersey-hurricane-sandy-disaster-response
Napolitano, J. (February 9, 2011). Testimony on “Understanding the Homeland Threat Landscape – Considerations for the 112th Congress”. United States House of Representatives Committee on Homeland Security. Retrieved from http://homeland.house.gov/sites/homeland.house.gov/files/02.09.11%20Sec.%20Napolitano%20Testimony.pdf
Rollins, J., Connors, T. (September 2007). State Fusion Center Processes and Procedures: Best Practices and Recommendations. Center for Policing Terrorism at the Manhattan Institute. Retrieved from http://www.manhattan-institute.org/html/ptr_02.htm
Schulz, C., Guidetti, R. (2013). Fusion During Crisis: Aftermath of a Perfect Storm. Domestic Preparedness Journal, Volume 9, Issue 5. Retrieved from http://www.domesticpreparedness.com/pub/docs/DPJMay13.pdf
Comment by Christopher Tingus
March 27, 2015 @ 7:07 am
Thank you Ms. Sztmczyk for this detailed and informative discussion regarding fusion centers and their importance. About two years ago I had reason to utilize the valued resources of our local fusion center and their preparedness to respond and act proved the value of such capable resource centers in bringing together the expertise required to address a specific requirement.
Harwich (Cape Cod), MA 02645
Comment by Citizen Joe
March 27, 2015 @ 7:23 am
Thursday, March 26, 2015
Dysfunctional U.S. National Politics
“Investors seem to underestimate how dysfunctional US national politics has become.” – in Twitter
Nouriel Roubini is an American professor of Economics at New York University`s Stern School of Business and chairman of RGE Roubini Global Economics
This perverted US policy will bring us to War and our liberties and quality of Life truly jeopardized so it is only you who have the willingness to stand forthright for our Judeo-Christian values and understanding your required protection as citizen to thwart those even from within who make their attempts to weaken America and circumvent our Constitution often in lawless manner and despite even this Congress and Senate who seem to as well forget their oath when entrusted to lead our nation and promote policies which provide security and a Homeland unwilling to enable those who seek to make mockery of our system of record keeping and transparency to the People!
One person and one vote can make a difference and you who now take the baton and lead this nation under God must realize just how fortunate We the People here on “Main Street USA” are in having the liberty we are so Blessed with and very much tied to the promise given to Abraham.
Unfortunately we have lost our way and our demise is evident portrayed by the failed leadership we encounter and which prevails from local to state and especially to the divisiveness and bias of this White House. It is your choice just how we proceed, however given Winston Churchill’s assertion that War is very much a part of human history given so much dysfunctional behavior, read and learn history and its lessons before our nation suffers much more travesty and embarrassment.
The present eight year White House resident et al will be replaced in a soon-to-be election which requires that an individual be chosen, whether man or woman or Democrat or Republican who truly respects those who have given Life or limb to allow your freedom and individuality in expressing yourself as a proud American!
God Bless America!
Comment by Matt Doyle
March 27, 2015 @ 8:46 am
Last week I wrote about uberbots as an emerging cyber threat capable of undermining the infrastructure of the Internet. This week I want to focus on the recent rash of DDoS attacks being carried out against government websites. The hacking group Vikingdom2015 appears to have emerged and started carrying out DDoS attacks against American “.gov” websites in just the last two weeks. The group uses Twitter to claim responsibility for their DDoS attacks: “using the hashtag ‘OpAmericanGov’ the Twitter account claimed that both Maine.ov and VisitNH.gov were offline” (Weissman, 2015). The DDoS attacks against Maine.gov seem to be the most damaging of their attacks so far. These attacks resulted in the loss of all state websites for about three hours last Monday and for about two hours this Tuesday. According to Rouselle (2015), there have been a total of four DDoS attacks against Maine.gov this week alone, including yesterday morning, and that even NYC.gov was down briefly yesterday morning as well.
Right now authorities are only speculating about who is responsible for these attacks and where the attacks are coming from. According to Weissman (2015) the only information known about Vikingdom2015 comes from their Twitter which states that the account is from Russia. Vikingdom2015 responded to this speculation with the following tweet: “LOL WE AREN’T FROM RUSSIA” (Weissman, 2015). Just in the past two days the group has released a target list of 44 different government websites. On SoundCloud a recording from the group states: “We will knock all American governments’ websites offline. We do not care if we get caught. We all like doing this. So you better prepare for battle” (Weissman, 2015). The messages being made public by the group and the actions over the past two week indicate that they have no plans of stopping their assault on various government websites throughout the United States. Their real motives or connections are unknown, but for now they seem to be claiming that they are conducting their attacks for at least some personal enjoyment and satisfaction. They are getting a thrill out of seeing the United States struggle to deflect these attacks.
While these attacks have been largely a nuisance, they are a clear indication of the fact that the United States must do more to improve its cybersecurity. Rouselle (2015) writes “while the motivations behind this hacker are still a mystery, this has to be a wake-up call for states to improve their cybersecurity. Hackers are getting smarter and websites need to be secure” (p. 1). This warning aligns with the data from Symantec’s Internet Security Report (2014) which states that DDoS attacks are increasing in number, in size, and in severity, and that the tools needed to carry them out are widely available. Semantec (2014) writes that DDoS attacks are “one of the largest threats to the Internet. As we become more reliant on devices that are connected to the Internet, these attacks will not only increasingly threaten governments, organizations, and business, but also individuals using the Internet for their everyday activities” (p. 26-27). This current situation deserves immediate attention and the United States must remain vigilant of potential copycat cyber-attacks in the coming weeks. Other potential hackers may be interested in hacking the United States for the thrill of it, or if they are skilled enough, they may be hoping to exploit these vulnerabilities with the goal of causing greater damage.
Rouselle, C. (2015). Cyberattacks on Maine.gov, Other State Sites Continue. Townhall.com. http://townhall.com/tipsheet/christinerousselle/2015/03/26/cyberattacks-on-mainegov-continue-n1976642
Symantec Corporation (2014). Internet Security Threat Report. Appendix 2014. Volume 19.
Weissman, C.G. (2015). Someone is attacking government websites, and a new anonymous hacking group is taking credit. Business Insider. http://www.businessinsider.com/vikingdom2015-anonymous-hacking-group-threatens-gov-websites-2015-3#ixzz3VXt4C6gv
March 27, 2015 @ 8:59 am
More and more focus is being placed on cybersecurity by government and industry though Mr. Doyle’s comments and urgings to muster as many of our valued resources to defend ourselves against these increasing attacks afford many of us new information and it is with confidence that those in the cybersecurity space know full well the importance of what Mr. Doyle is expressing in his concern and call for more attention to a very serious threat.
Concerned about our electric grid and other infrastructure which could be challenged by cyber attack, I am hoping that the new Congress will appropriate more tax dollars and spend them wisely to thwart those whop seek our demise and the newly elected White House in ’16 will not only close our border to the south, but will bring our government to a sophisticated level utilizing our superiority in technology w/no “apology” to anyone for the excellence of America!
We work hard and are a disciplined People and we need not be embarrassed and weakened by our own government who we have “entrusted” precious vote to enforce laws and stand strong in our Judeo-Christian principles and commitment to enhancing the quality of Life for mankind!
“Main Street USA”
March 27, 2015 @ 9:02 am
In this open Friday forum, I express alarm at the following report which I am hoping is not true for it again lends to further lack of confidence in those in our own government at the reigns of power and obviously self-serving agenda:
Some media reports:
“We are now working on solid intel that exposes massive clandestine U.S. involvement in the region, including hundreds of millions of dollars in U.S. military hardware having “gone missing” (likely in the hands of ISIS).
Also, U.S. funds are pouring into Syria to train “rebel” forces who are allegedly joining ISIS! Meanwhile, President Obama is calling for Israel to retreat to indefensible “1967 borders,” while his administration scolds Israel for its “occupation” of Palestine” –
March 27, 2015 @ 9:15 am
“Iran will not negotiate away its nuclear program. Nor will sanctions block its building a broad and deep weapons infrastructure.
The strategic implications of Obama’s diplomacy are frightening, and we face the prospect of a thoroughly nuclear-weaponized Middle East.
I refuse to be silent on this, and I urge you to do the same.
For America” –
Former U.S. Ambassador to the United Nations
Comment by William R. Cumming
March 27, 2015 @ 10:04 am
Thanks Chris, Maggie and Matt for comments.
My comment this week focuses on survivability and resilience of MMAs [major metropolitan areas] in the U.S.A.!
There are presently about 20 cities world-wide that have populations exceeding 20 million. In North America one–Mexico City.
The USA by the 2020 Census will have over 12 cities in which the MMA exceeds 1 million. China will have about 200 with over 1 million population.
Any good links to resilience, survivability, and sustainability for these large population centers?
Should there be more focus on these large population centers from an HS standpoint?
Any recent studies of transportation dependency in these areas?
What are the implications of UBER for the evacuation PROTECTIVE ACTION RECOMMENDATION?
Should FEMA constantly study, research, and analyze various PROTECTIVE ACTION RECOMMENDATIONS and what staff and funding are devoted to that effort now?
Should PARs be left to the STATES for issuance, or should all levels of government be involved?
Did you know that NRC case law says FEMA must co-locate during GENERAL ALERTS [actual or potential core melt accidents] and be involved in PAR’s including atmospheric modeling?
Should the WH be involved in PARs?
Did you know that the federal government has almost 200 atmospheric models that it uses almost daily and easily 1/2 involve dispersion of airborne contaminants?
Did you know the SCOTUS hear arguments this week on EPA regulation of airborne dispersion of mercury as a contaminant but only benefits and costs were discussed, not public health and safety?
Did you know that Senator Ted Cruz has announced that if he becomes President he would abolish the Department of Commerce but apparently he does not understand that 2/3rds of the Commerce Dept. budget involves NOAA and Fish & Wildlife?
Comment by Gianna Gallo
March 27, 2015 @ 12:17 pm
Last week I posted about Customs and Border Protection using RFID technology to assist with border crossings. This week I wanted to focus on another use of RFID technology by the TSA to tag baggage.
In order to improve the efficiency of business in one of the most critical areas of operation, Radio Frequency Identification technology is being used in airports to track and handle baggage. The increasing growth in the number of air passengers and the resulting increase in baggage are straining the baggage handling infrastructure around the world. “The US Department of Transportation has reported an increase from 3.84 mishandled bags per thousand enplaned passengers in 2002 to 6.73 in 2006 — an effective 75 percent increase over a four year period, representing an additional 2.3 million mishandled bags each year,” (“Industry Brief,” 2008, p.1). The mishandling of baggage has led to massive costs for the airline industry and has generated major security concerns for the United States.
RFID technology increases automation in baggage handling processes that significantly reduce the number of mishandled bags, the associated costs, and the related security risks. RFID provides real-time visibility into the whereabouts of passenger luggage, complete with invaluable cross-checks at every step of the bag’s travels – all without human intervention (“Industry Brief,” 2008). The RFID tag that would be placed on luggage includes a microchip that sends data to a computer. This is an automatic identification technology that transmits accurate data about an object or person wirelessly using radio waves (Nguyen, 2009). Regardless of whether passengers check in curb-side or at the airline counter, RFID printers will enable instant encoding of an information-rich RFID tag right on the spot. The RFID tag has information such as the passenger’s flight and any specific sorting directions (“Industry Brief,” 2008). The tags then aid in the sortation, routing, and delivery of the luggage to the correct plane.
The use of RFID technology in the U.S. Department of Transportation’s international airport security initiative in Nigeria is a perfect example of how RFID tags increase the United States’ homeland defense in preventing threats associated with airports and international travel. One of the uses of RFID baggage tags is to verify passenger boarding versus luggage loading for positive passenger-baggage matching on flights departing for the United States and other international locations. “The need for matching passengers with checked luggage has been at the forefront of anti-terrorism concerns ever since the in-flights bombings in the 1980s that took down a Pan American 747 over Lockerbie, Scotland and an Air India jumbo jet over the Atlantic,” (Mishra & Mishra, 2010, p.144). Airlines must routinely remove bags from the aircraft when a passenger fails to board. Often, this is a time- intensive, laborious process, which can delay flight departures indefinitely, costing the airline countless amounts of goodwill amongst the passengers, even if such measures are done precisely to safeguard their transit and their very lives (Mishra & Mishra, 2010). Handheld RFID readers allow workers to quickly and easily locate and remove the right bags, without the need to manually handle and scan the bar code on each individual bag. A bag with an RFID tag could be pinpointed accurately in a unit loading device or individual aircraft hold, greatly facilitating offloading if necessary.
When RFID technology is implemented for baggage handling operations, everyone benefits: the airlines, the passengers, and the airports. The RFID project can definitely improve the security management of the airline and airport. Airlines can add different security levels into the baggage tag, and this together with the tracking mechanism can immediately identify and locate any misplaced bag (Mishra & Mishra, 2010). The system and information logged could become key references for security-related issues. The overall transparency of information can help both airlines and airports to enhance and optimize the baggage handling process which ultimately helps the airlines deal with the safety and security of everyone involved. RFID is cost saving, enhances safety, increases customer satisfaction, and assures quality control. This technology should be utilized in order to improve prevention, protection, and response to travel-related threats towards the United States.
(2008). Industry Brief: Baggage Tracking RFID Solutions. Motorola. Retrieved from http://www.motorolasolutions.com/web/Business/_Documents/static%20files/Baggage_Tracking_RFID_Solutions%209-08.pdf
Mishra, D. & Mishra, A. (2010). Improving Baggage Tracking, Security and Customer Services with RFID in the Airline Industry. Acta Polytechnica Hungarica, Vol. 7, No. 2. Department of Computer Engineering, Atilim University: Ankara, Turkey. Retrieved from http://www.uni-obuda.hu/journal/Mishra_Mishra_23.pdf
Nguyen, S. (2009). RFID for Track & Trace of Baggage in Airports. Business Aspects of the Internet of Things, Seminar of Advanced Topics. ETH Zurich – Department of Management, Technology, and Economics.
March 27, 2015 @ 1:46 pm
Thanks Gianna for helpful post!
Maggie! Question? Are Fusion Centers co-located with STYATE EOCs? If not should they be? How do they communicate? Are there metrics to determine Fusion Center capabilities or success or failure?
March 27, 2015 @ 5:07 pm
As far as I know some of the states EOCs are co-located with the fusion centers. I know that New Jersey EOC is located in the same place as the fusion center which is on the premises of the New Jersey State Police Headquarters but if they are not then I believe they should be. Emergency Operation Centers should be closely located to the fusion centers because it would increase the ability to cooperate in the time of a disaster and be an easy way to communicate. I think that they do communicate through the fusion centers because a representative of EOC is involved in all of the operations that take place in the fusion centers. There are metrics that look at fusion centers and they are done by the United States House of Representatives Committee on Homeland Security. They have published a whole document that look at the fusion centers and describe findings and recommendations that fusion centers should take into consideration to improve themselves. The link to the document can be found here: http://homeland.house.gov/sites/homeland.house.gov/files/documents/CHS%20SLFC%20Report%202013%20FINAL.pdf
I think that it is too soon to harshly criticize the fusion centers since they are fairly new and I believe that in a couple of years, we will have a clearer picture of their effectiveness, success and failures. But on the website of the Department of Homeland Security, there are many success stories of fusion centers and I am a strong believes that these centers are crucial to the safety of the nation. The link to read of the duchess stories can be found here: http://www.dhs.gov/fusion-center-success-stories
Comment by Drew Buffalino
March 27, 2015 @ 6:44 pm
For my post this week I want to add to Maggie’s post on fusion centers with my own opinion on their cost/benefits, touching more on the constitutional issue of them as well as how they can be better applied. The fusion center concept on paper is a great idea, but in practice it runs into certain barriers that need to be hurdled before it can be considered a smart practice. The overall goal of homeland security is to support the Constitution of the United States and provide more security and preparedness to citizens and those who live freely within our borders. Rollins states, “Fusion centers, some of which include previously existing or newly established operations centers, involve the receipt, analysis, and dissemination of all-hazards information.” (2007, p. 17). Fusion centers assists in greater security and preparedness ultimately by engaging in information sharing, which in turn increases regional and national situational awareness against crime and natural disasters. This mission is best achieved and provides the most adequate tools for domestic preparedness when it maintains its Constitutional boundaries, and takes the role of a support agency, rather than a centralized authority.
Rollins discusses how fusion centers are run and overseen mainly by the use of governance committees. He states that governance committees can fulfill two management roles: leadership and decision making; along with oversight and accountability (Rollins, 2007). Committees are made up of representatives from the entities who hold stake in the fusion centers and rely on the services (mainly information sharing) that fusion centers provide. This is the best approach to the concept of fusion centers. It allows for the center to be run on a collaborative basis where different stakeholders come together at a determined location in order to collectively work together in increase their relationships and situational awareness. In this sense, there may be collective decisions made, but each organization keeps their individual authority. The systems works more along the live of federalism where it is a voluntary bottom-up approach to collaboration. The fusion center concept, when working in this way, provides for increased teamwork between groups without a centralized authority gaining control and leading to the further possibility of corruption. On paper, when the structure of a fusion center works in this way, it becomes a smart practice in which first responders, law enforcement agencies, NGOs, the private sector and citizens work together to share information and be informed without stepping over jurisdictional lines and abusing individual liberties. It makes fusion centers into a hub of intelligence instead of control. Although this is the best route and would be most effective for freedom and security, it is not how fusion centers always work.
Guidelines for future develop of fusion centers have intentions in mind that could seek to harm the liberty of individuals living in the United States. Michael German and Jay Stanley of the American Civil Liberties Union state, “…the federal government intends for fusion centers to broaden their sources of data “beyond criminal intelligence, to include federal intelligence as well as public and private sector data.”” (2007, p. 7). This idea of crime prevention is one that makes me question whether or not fusion centers are practical for the preservation of liberty. When law enforcement and intelligence analyst are asked to go “beyond criminal intelligence, to include federal intelligence as well as public and private sector data.” it threatens the status quo of the burden of proof. As fusion centers seek to data mine and search for crime rather than investigating discovered cases I believe they develop a ‘guilty until proven innocent’ mentality that strays from the libertarian mindset of ‘innocent until proven guilty’. This will work adversely to the overall goal of supporting the Constitution and defending the rights and safety of citizens. It develops a mindset that threatens liberty and increases suspicion. The increase in suspicion could in turn motivate citizens to not assist law enforcement of others in homeland security, as they now perceive themselves as being viewed as a threat to homeland security. German & Stanley state Federal law Title 28 of the Code of Federal Regulations, Part 23, which governs what information can be put into a law enforcement database and how it can be used in investigations (2007). They state:
The regulation states that all criminal intelligence systems “shall collect information concerning an individual only if there is reasonable suspicion that the individual is involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” (German & Stanely, 2007, p. 10-11)
When fusion centers step over these boundaries and attempt to seek out information that ‘may lead’ to a future crime they risk infringing on the liberties of all individuals and citizens in the United States. By seeking out crime they are generally only looking for information that relates to how the majority of present crime starts, which could always change. They may survey citizens who have not criminal history at all and have not committed any crimes and have no reason to be stopped or questioned. Similar to how law enforcement cannot stop a vehicle that has not committed a crime, fusion centers should not be gathering intelligence on citizens who have not committed a crime.
As long as constitutional boundaries such as those stated above are followed, the concept of fusion centers is a smart practice. But data mining, and over watch of personal Internet communications does make me in some ways question the direction that fusion centers are going in.
German, M. & Stanley, J. (2007). What’s Wrong With Fusion Centers?. American Civil
Liberties Union (ACLU). Retrieved from https://monmouth.desire2learn.com/d2l/le/content/191074/viewContent/1953690/View
Rollins, J. (September, 2007). STATE FUSION CENTER PROCESS AND
PROCEDURES: Best Practices and Recommendations. Policing Terrorism Report. Retrieved from https://monmouth.desire2learn.com/d2l/le/content/191074/viewContent/1953689/View
Comment by Ally M
March 27, 2015 @ 8:23 pm
This week I would like to continue the discussion about technology that will enhance the capabilities of the entire homeland security community. The ability of technology to help this nation prepare for and respond to disasters is growing. There are many potential dangers that we may face and technology could be the ultimate solution. A biological attack is just one of these potential dangers. This nation has experienced a small biological attack but are we fully prepared with the proper procedures and technology to defend against one on a larger scale? After 9/11 this country had to respond to the anthrax attacks. These attacks were targeted towards specific people through letters. Would we be able to respond if a biological attack were to occur where there is a vast amount of people, such as a mall or sporting event? Soft targets are the most vulnerable when it comes to biological attacks due to the amount of people confined in a space.
Detection is the most important part when responding to a potential biological attack. Any emergency can have more than one issue that needs to be resolved by the first responders. The first responders go onto a scene with very little information. It is up to the first responders to analyze the scene properly to determine the correct response. This means that they must have detection equipment with them in the field to make this important determination. It is this equipment that can help save lives and determine the best course of action. The equipment that is currently used has no industry-wide performance criteria to meet. There is no designated organization or agencies responsible to assure that these field devices meet any specified standards. The equipment could not even work and yet they are still available to our first responders. The equipment needs to be reliable in terms of expectancy, sensitivity, and specificity. The equipment needs to work properly to protect our first responders so that they can save lives without risking their own.
Recently progress has been made with the creation of information guidelines with the publication of the Biodetection Technologies for First Responders: 2014 Edition. In this document a number of different types of biodetection technology are categorized into three separate groups. First group is the Developmental Testing and Evaluation Designation. The pieces within this category need more proof of effectiveness but they have potential. The second group is Designated or these pieces of technology have proven their effectiveness with confidence of repeatability. The third group is Certified, here the piece of technology has consistently proven its effectiveness and its endurance (Department of Homeland Security Science and Technology Directorate, 2014).
Before purchasing biological sampling and detection technologies first responders have some significant factors to think of. These include type of information obtained, usefulness and accuracy of results, ease of use in the field, total cost of ownership (hardware, consumables, and training needs), total time from sample to answer, and weight and size (Department of Homeland Security Science and Technology Directorate, 2014). Due to these factors field instruments and type of testing used by the first responders varies from state to state. This will make it even more difficult when coordination with other communities needs to occur during a major event. Having standardized guidelines on proper use of biodetection technology and response to a potential biological threat will allow for there to be a secure understanding across the nation. All first responders will be equally trained to handle a situation.
Department of Homeland Security Science and Technology Directorate. (2014). Biodetection Technologies for First Responders: 2014 Edition. Retrieved from https://www.pnnl.gov/nationalsecurity/technical/chemical_biological/Biodetection_Technologies_for_First_Responders.pdf
March 27, 2015 @ 9:00 pm
Partial comments removed by Philip Palin because of name-calling.
Iran-Backed Rebels Loot Yemen
Files About U.S. Spy Operations
LA Times | March 25
Secret files held by Yemeni security forces
that contain details of American intelligence
operations in the country have been looted by
Iran-backed militia leaders, exposing names
of confidential informants and plans for U.S.-
backed counterterrorism strikes, U.S. officials
U.S. intelligence officials believe additional
files were handed directly to Iranian advisers by
Yemeni officials who have sided with the Houthi
militias that seized control of Sanaa, the capital,
in September, which led the U.S.-backed president
to flee to Aden.
For American intelligence networks in
Yemen, the damage has been severe. Until
recently, U.S. forces deployed in Yemen had
worked closely with President Abed Rabbo Mansour
Hadi’s government to track and kill al Qaeda
operatives, and President Obama had hailed
Yemen last fall as a model for counterterrorism
operations elsewhere. …
Yemeni intelligence officers still loyal to
Hadi’s besieged government burned some secret
files, one official said. But they couldn’t destroy
all of them before the Houthi fighters, whose
leaders have received some weapons and training
from Iran, moved in.
The loss of the intelligence networks, in addition
to the escalating conflict, contributed to the
Obama administration’s decision to halt drone
strikes in Yemen for two months, to vacate the
U.S. Embassy in Sana last month and to evacuate
U.S. special operations and intelligence teams
from a Yemeni air base over the weekend. …
“It was a train wreck that anyone who knows
anything about Yemen could see happening. It
seems we put our head in the sand, and the train
wreck has happened and now we are saying,
‘How did this happen?’” said Ali Soufan, a former
senior fbi agent who worked on terrorism cases
and now heads the Soufan Group, a security firm
in New York.
“We pulled out from any meaningful control
of the situation in the country and now I think it
is too late, because every decision is a bad deci
Comment by Chris Kears
March 27, 2015 @ 9:15 pm
For this weeks post, I want to address the importance of state fusion centers and the homeland security stakeholder community should continue to fund their operations. I found that fusion centers are a vital component in providing effective information and intelligence to the homeland security enterprise. In the aftermath of the 9/11 terrorist attacks, law enforcement was clearly unprepared on how to handle the looming threat of terrorism; as they lack communication and information sharing with other governmental agencies and key contributors. Looking back, it was clear that their capabilities and resources were very limited; making it extremely difficult for law enforcement to report suspicious activity that led to the 9/11 terrorist attacks. With the support from state fusion centers, law enforcement agencies are able to overcoming these shortcoming and provide a more unified approach that is essential in countering the emerging hazards in today’s ever-changing threat environment (Connors and Rollins, 2007).
In the State Fusion Centers Processes & Procedures article, fusion centers provide more than just obtain intelligence. Connors and Rollins (2007) state that fusion centers “have the ability to quickly analyze information in support of the immediate and proactive deployment of operational assets and resources, as well as to analyze and report on long-term threats – whether those threats result from the weather, a bird flu, crime, or a potential terrorist attack” (p. 3). This means that fusion centers react to a full spectrum of public safety threats, both small and large (Connors and Rollings, 2007). The information obtained and analyzed by fusion centers provide a quicker response for homeland security stakeholders; which is key when carrying out their national security protocol. In addition, fusion centers act as a “director,” in the sense that ensure that state and local leadership is knowledgeable about current and emerging threats that seek to target our nation’s critical infrastructure. Although fusion centers provide many benefits to the homeland security enterprise, they cannot be effective without the proper funding grants. Future funding grants must continue to be supported by the homeland security enterprise. Without proper funding, threats similar to 9/11 would be all the more likely to happen and that is a national security threat our nation simply cannot afford to occur.
In the Fusion During Crisis: Aftermath of a Perfect Storm article, examples show that fusion centers are in fact a vital component to the homeland security enterprise. DomPrep Journal (2013) states that “in an age heavily reliant on a consistent flow of timely and accurate information and intelligence, it has become clear that the fusion centers themselves can be appropriately aligned with the federal government’s Incident Command System in a joint effort to respond to and counter major adverse incidents and events” (p. 16). This positive assertion about fusion centers’ success can be contributed to their role before, during, and after Superstorm Sandy. Their development and maturity over the past seven years helped fusion center’s strengthen their approach towards Sandy to provide effective Information and intelligence sharing operations to first responders; which then were able to provide timely information, fuel, food, housing locations, and other supportive necessities to the natural disaster victims. Moving forward after Sandy, the New Jersey Regional Operations and Intelligence Center (NJ ROIC) proposed five critical missions to help continue the development of fusion centers. These critical missions include: enhanced information sharing and the dissemination of disaster information; the parallel gathering and sharing of other categories of essential information; the production of disaster intelligence for senior government executives; the production of disaster intelligence needed by field personnel; and the use of tightly focused collection efforts to support FEMA and the NJ OEM operations (DomPrep Journal, 2013). These enhanced missions addressed by the NJ ROIC seek to strengthen the timely response from fusion centers so that there is a reduction in overwhelming requests from first responders and other emergency personnel who are responding to hazards. With the collaboration from other supporting organizations and the proper funding from the homeland security enterprise, fusion centers have the capabilities of reducing our nation’s vulnerabilities from the emerging threats that seem to continue to appear in today’s ever-changing threat environment.
Connors, T., & Rollins, J. (2007, September 2). State Fusion Centers Processes & Procedures: Best Practices & Recommendations. Retrieved from http://www.manhattan-institute.org/html/ptr_02.htm
DomPrep Journal. (2013). National Domestic Preparedness Journal: Fusion During Crisis-Aftermath of a Perfect Storm. Retrieved from http://www.domesticpreparedness.com/pub/docs/DPJMay13.pdf
Comment by Justyna Gromadzka
March 27, 2015 @ 10:10 pm
For this weeks forum, I would like to discuss the cyber security issues that surround mobile devices. Mobile devices have changed the computing environment and the threats that come along with the internet. The dramatic increase of smartphones worldwide has a great impact on computer security. It is estimated that the number of mobile devices in five years will be about 10 billion (Insight on governance, risk and compliance, 2013). Today’s smartphones can carry out most of the functions that typical PC’s do. Individuals no longer needs a computer to search the internet, check their email, or control their finances. These activities can all be completed with the use of a smartphone. However, smartphones are not nearly as secure as typical computers. Firewalls, antivirus, and encryption software that are found on most computers are uncommon on mobile phones. Additionally, since smartphones often contain large amounts of sensitive data such as personal information, passwords, and banking information, they have become attractive targets for exploitation. One of the biggest threats for mobile devices is that most smart phone users believe that using a mobile device is just as secure as using their computer at home, they fail to realize the security gaps that exist in mobile devices. As the Technical Information Paper-TIP-10-105-01 states, “The user’s limited awareness and subsequent unsafe behavior may be the most threatening vulnerabilities for mobile devised. It is critical to understand that a mobile device is no longer just a phone and cannot be treated as such” (DHS, 2009).
Due to the increased popularity of smartphones, Bring Your Own Device (BYOD) policies are becoming more popular. Companies can have employees use their personal phones to conduct work related activities and do not need to provide a company phone. However, even companies that still provide company phones struggle with personal phones being used to access company data. As the CISCO BYOD Smart Solution paper states, “Users want seamless access to corporate resources no matter which device they use or where that device is connecting from” (CISCO, 2012). This leaves organizations with all kinds of devices on their networks and results in new security issues. “With personal devices now being used to access corporate email, calendars, applications and data; many organizations are struggling with how to fully define the impact to their security posture and establish acceptable procedures and support models that balance both their employees’ needs and their security concerns” (Insight on governance, risk and compliance, 2013). A smartphone being attacked results in more then personal information being accessed. Not only does the smartphone provide hackers with the access to company data, it allows for them to find an easy entry point into the company network. Once in the smartphone, a hacker can use that device to access the network it is connected to. This is a major threat that leaves companies vulnerable. For this reason, BYOD policies need to include innovative protocols to secure company networks and all devices that are are connected to that network.
CISCO (2012). The Cisco BYOD Smart Solution: Security, Flexibility, and Performance for any Workspace. Retrieved from http://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-692412.pdf
Insight on governance, risk and compliance (2013). Bring your own device: Security and risk considerations for your mobile device program. EYGM Limited. Retrieved from
Comment by Colton Strano
March 27, 2015 @ 10:35 pm
This week I would like to piggyback on to Justyna’s post about how deadly cyber threats are pertaining to mobile devices. Mobile devices have proven to a power tool in a hackers arsenal of tricks. Whether it is using a mobile device to hack into a private network or to hack someone else’s mobile devices, both have severe consequences. A recent story of actress Jennifer Lawrence recently had her mobile device hacked but not for money, but to private pictures stored on it (Duke, 2014). With such power in a single mobile device today, the security systems and protocols for networks, other mobile devices, and computers needs to be addressed with an increased level of seriousness. The US-CERT released a document that explains safety tips for mobile devices users to better protect their own phones in case they lose their phone, store important data on it, or use it to browse malicious websites.
The US-CERT Cyber Threats to Mobile Devices document describes a wide variety of threats that exists for mobile devices including; Social engineering, Exploitation of social networks, mobile botnets, exploitation of mobile applications, and exploitation of m-commerce. All of these threats are current and can lead to serious problems for a person, private and public company. One topic that should be considered as a top priority is the exploitation of mobile application because of the increase use of smart phones and applications downloaded and used on a constant day-to-day basis. While some might think downloading Clash of Clans is not going to ruin their bank account, certain types of exploits can be hidden in other less familiar apps downloaded and attack their more personal information on the phone, such as banking apps. “In early 2010, Google found potentially fraudulent banking applications in their Android Market. An anonymous developer known as “09Droid” sold a collection of banking applications that were not authorized by the banks for which they were seemingly developed. It is unclear if the apps were used to gain access to users’ confidential banking information. 09Droid published applications for approximately 40 different banking institutions, all of which Google removed from the Android Market” (US-Cert, 2010, p. 8).
This can have a very large impact on the financial aspect of a single person, or if a large enough population is exploited, a national problem. When a single person claims they have been “hacked” or someone has stolen their money, the bank should have enough reserve to compensate the victims (Federal Trade Commission, 2012). When these numbers grow out of control, the amount the banks have to pay out exceeds their reserve and now causes a national problem. The risk of another depression could be right around the corner if enough personal bank information is stolen and used to clear the accounts because the banks are responsible for their customers money. Mobile device exploiting has made this dilemma more of a reality because of the mass amounts of smart phones, online banking, and mobile banking done.
Duke, A. (2014, September 2). FBI, Apple investigate nude photo leak targeting Jennifer Lawrence, others. Retrieved from CNN: http://www.cnn.com/2014/09/01/showbiz/jennifer-lawrence-photos/
Federal Trade Commission. (2012, August). Electronic Banking. Retrieved from Federal Trade Commission: http://www.consumer.ftc.gov/articles/0218-electronic-banking
U.S. Dept of Homeland Security (2009). Technical Information Paper-TIP-10-105-01. Cyber Threats to Mobile Devices. U.S-CERT.
March 28, 2015 @ 6:54 am
On the Friday free forum and issues related to OUR Homeland Security —
How dare you? It is time for us to shout loudly and demand that our tax dollars stop in supporting this ever corrupt UN! Kick the UN out of New York and suggest they establish their office in Yemen where they will be far more welcomed!
Can You Guess Which Nation the UN Condemned for Women’s Rights Violations?
Jeremiah Jacques | March 25
The United Nation’s main women’s rights group, the Commission on the Status of Women, published a document on March 19 singling out one UN member nation for women’s rights violations. It wasn’t Saudi Arabia, where a strict view
of sharia law says that women of all ages are the property of a male relative.
Nor was it Somalia, which holds the world record for the percentage of girls and women subject to genital mutilation—98 percent. The country was not Pakistan, where at least 1,000 women are killed by male relatives in “honor killings” each year. Nor was it Afghanistan, where more than half of all brides are 15 years old or younger, and 87 percent of women suffer abuse by their husbands.
Afghanistan is the only nation where more women commit suicide than men. It was not Sudan, which has no minimum age for consensual sex, and no law against domestic violence.
The nation was not Yemen, which is “the world’s worst country for women,” according to the World Economic Forum. There is no minimum
age for marriage in Yemen, and 14 percent of its girls are married before age 15.
The report said nothing of these nations’ treatment of women. Of all 193 UN member nations, the only one named and condemned in the document was
The document, called the “Situation of and Assistance to Palestinian Women,” doesn’t mention that 20 percent of Knesset members are women, or that Israeli women enjoy the same rights as those of any Western democracy.
It doesn’t say that Israel was the third country in
history to elect a female head of state, or that the
current Chief Justice of Israel’s Supreme Court is
Instead, it denounces Israel for causing “[h]
igh levels of unemployment and poverty” among
Palestinians, especially women. It doesn’t mention
the dozens of Palestinian women in the West
Bank and Gaza who are killed by Palestinian men
every year in “honor killings” sanctioned by the
Palestinian Authority. Nor does it discuss PA
leader Mahmoud Abbas’s 2012 statement, saying
he had no plans to outlaw these killings.
The UN holds the Jews of Israel responsible
for all problems Palestinian women face.
Rather than use its authority to work toward
positive change, the UN childishly scapegoats
one country—a country that should actually be
upheld as a model of women’s rights. Meanwhile,
the plight of millions of girls and women in other
countries remains ignored.
This report goes beyond the typical anti-Israel,
anti-Semitic bias we’ve come to expect from
the UN. It ventures past the typical absurdity into
a new level of insanity: saying black is white, and
white is black.
March 28, 2015 @ 9:24 am
Turns out all of Hillary’s e-mails, personal and “official” deleted from her “private” server.
ARROGANCE OF POWER CLINTON STYLE?
March 29, 2015 @ 5:19 am
Another brave warrior on our streets serving to protect the public shot and another such shooting of police officer the result of Barry Obama and his illustrious AG, their pal, good ‘ol Al and the Mayor of New York in all the divisiveness and perversion they have spewed:
Boston ‘Top Cop’ in coma after being shot in face ‘point-blank’ during traffic stop, suspect killed.
God Bless this Boston Police officer w/hopes that he will survive and the damage to his face can be addressed by the wonderful medical care Boston surgeons provide!
March 29, 2015 @ 7:27 am
By Wesley Pruden – The Washington Times – Thursday, March 26, 2015
President Obama says Rudy Giuliani was wrong. He does, too, love America. That’s good enough for me. He says he’s a Christian, despite his constant love bombs for Islam, and if that’s good enough for God it’s good enough for me, too. Conversations between believers and the Almighty are confidential, and have yet to be cracked by the National Security Agency (but we can be sure they’re working on it).
The president loves our allies, too. He sent the bust of Winston Churchill back to London, whence it came, only because it was cluttering up the Oval Office and getting rid of it had nothing to do with memories of snubs and affronts his Kenyan father passed down to him (though Churchill was an unrepentant colonialist). The president dearly loves Old Blighty.
PHOTOS: See Obama’s biggest White House fails
He loves la belle France, too, and if it hadn’t interfered with a golf date — a good tee time on a good course on a sunny day must not be wasted — he would have hurried to France to march in step with other heads of the states of the West to pay honor to the slain of the radical Islamic shootouts in Paris.
The president even loves Israel, but in his way. It’s tough love to bring the Jews to heel. Just as Secretary of State John Kerry is topping up a deal to satisfy the mullahs in Iran, comes the news that the United States has declassified a 386-page report that reveals in minute detail Israel’s super-discreet nuclear program. Everybody knows Israel has one, but until now Israel, with American support, has never acknowledged it. To do so, all mature hands have agreed, could set off a nuclear arms race in the Middle East.
The American declassification, first reported by the Israeli news site Arutz Sheva, was made public in the wake of Israeli Prime Minister Benjamin Netanyahu’s speech to Congress, when he warned that the deal envisioned by Mr. Obama would leave Iran with “nuclear breakout capabilities.”
March 29, 2015 @ 7:41 am
Partial comments removed because of name calling:
The “name calling” that you perceive that I choose as an American citizen to reference this perverted and biased and anti-Israeli (Hebrew) US White House administration is in fact not at all “name calling” but what I feel should be shared for I strongly believe that Barry Obama is not only a – factual – supporter of the Muslim Brotherhood, but a supporter of the Shiites and while I may be wrong, if in fact Barry Obama who has so willingly snubbed the Israelis and has now declassified information as well towards the Israeli WMDs on hand lends further support to the statements that the Rev Wright spewed from the pulpit for 20 years while Barry and Michelle Obama sat and listened to attentively instead of walking out from the stated and – factual – remarks that as long as the “Zionists” had WMD in hand, why not Tehran!
This is a Homeland Security issue and referencing Barry Obama as “Barry the Shiite” is truly how I believe and I have no respect whatsoever for Barry Obama and given that we are sharing various perspectives re Homeland Security and policies, the lack of confidence in an individual who was an anarchist at least from my perspective standing on milk cartons with Bill Ayers at Harvard and other such types…promotes much concern about the leadership of America and the likes of Ms. Hillary as well standing shoulder to shoulder in blatant lie at the “Benghazi Massacre’ leaving our brave warriors behind for their own self-serving agenda despite We the People and seeing Barry Obama run to Cairo and “apologize” for America, Ms. Palin, no one is above the law and whether an elected official or not, if one seeks lawless ways and undermines the Constitution, I have a Right top express my perceptions and the significance of the “Brutes of Tehran” in 72 hours to dupe the American people w/this “Chicago-Hollywood-washington charade” well Sir, I have said nothing which requires my comments to be so disrespected for I truly believe that as many Americans do that we are besieged from within!
March 29, 2015 @ 8:32 am
Thanks for the answer Maggie and link. And thanks Drew also.
And additional thanks to Ally, and Drew, and Justna and Colton. Wow! terrific input!
New Jersey is one of two states [the other Micigan] in which the immediate delegate of the Governor for EM is the state police.
In 26 states the STATE ADJUTANT GENERAL [National Guard] is the immediate delegate of the Governor for EM.
In the rest the STATE OEM Director reports directly to the Governor as does the combined OEM and HS organization in California.
March 29, 2015 @ 8:56 am
….and to further my comments Mr. Palin who I have the utmost respect and for the opportunity you and Chris and William and others afford us as citizens and professionals to share our perspectives regarding any elected official and their demeanor and policies and actions which have a direct relationship to the well being of our beloved Republic’s – Homeland Security – let me say, I am truly upset by the news that a white Boston police officer was shot in the face in a routine traffic stop by a Black man criminal who obviously could give a damn about our public servant who comes to the assistance when anyone of us call 911 and I hold Barry Obama, his illustrious AG and good ‘ol Al, their pal sitting right next to them in the White House along with the Mayor of New York and all their spinning of “Hands Up, Don’t Shoot” and so much more bias and hatred and in looking at the profile of Barry Obama and Bill Ayers and this divisiveness and this bias and as we saw the White House quickly intervene in a 911 call w/the Cambridge Police Department, well, where is Barry Obama today speaking to this specific shooting in Boston, no where to be seen – and like others, holds Barry Obama et al responsible for these killings and shooting of police officers on our streets!
I have little respect as well for the political parties, whether Democratic or Republican for they have enabled lawlessness and disregard of our Constitution and our Judeo-Christian values and the void in leadership and pledge in oath to protect the Constitution is every American’s responsibilities and further, as a former elected Massachusetts local official who has won repeatedly in local elections with majority votes, it is not at all uncommon for a politician to be referenced as one sees those in our midst who willingly and knowingly stand together in blatant lie at the “Benghazi Massacre” and erase their server and do not share any or all emails with the public for they are servants of the public!
Both good ‘ol Ms. Hillary and this eight year resident of the WH should be under House arrest for suspicion in breach of faith, treason and as elected officials “entrusted” to serve We the People, their actions must be scrutinized and our various perceptions of these ruthless self-serving tyrants who see themselves above the law!
William Ayers in 2008
During their time “underground”, Ayers and Dohrn formed a relationship that bore them two sons, born in 1977 and 1980. In a late-1970s split of the group, the couple joined the faction that favored surrendering to authorities. In 1980, they took this step themselves. They were both spared federal prosecution due to government misconduct while investigating the two. Dohrn received three years’ probation and was fined $1,500 for the Illinois state charges, but later served seven months in jail for refusal to testify to a grand jury about their former colleagues in the Weathermen.
Ayers and Dohrn are described as fixtures of their Hyde Park, Chicago neighborhood, “embraced, by and large, in the liberal circles dominating politics” there, according to Ben Smith, a writer for The Politico, and their political and activist colleagues believe their achievements of the recent decades overshadow their Vietnam-era radical activities. Ayers has been described as “very respected and prominent in Chicago [with] a national reputation as an educator.”
In conjunction with the approaching September 10, 2001, publication of a personal memoir, Ayers gave an interview to The New York Times in July, which they published on September 11. Ayers then wrote a letter to the editor stating the interview misquoted him and mischaracterized his views, particularly about their reporter’s claim that Ayers wished he had set more bombs. “This is not a question of being misunderstood or ‘taken out of context,’ but of deliberate distortion.” However, Dohrn has said, “There’s no way to be committed to non-violence in one of the most violent societies that history has ever created. I’m not committed to non-violence in any way.”
March 29, 2015 @ 9:06 am
“Imagine with me for a moment if George Washington, John Adams and Thomas Jefferson never existed. Imagine history without Abraham, Moses, King David or the King of Kings, Jesus Christ. Where would we be if these men did not exhibit leadership with courage and sacrifice on the behalf of the people? Where would we be if they had not loved both seen and unseen, resulting in now having both natural and spiritual freedoms throughout the world? I can tell you, we would all be slaves to tyranny in every form (Hebrews 11)!
We can see from the history they wrote, that the evils they faced were powerless over their endeavors because they had their eyes fixed on “The Author and the Finisher of their faith” (Hebrews 12:2), who said that He did not give us a spirit of fear (2 Timothy 1:7)! The Author promised that He would make them more then conquerors (Romans 8:37), gave them power of all of the works of the enemy (Luke 10:19), and promised that He would be an enemy unto all of their enemies and an adversary unto all of their adversaries (Exodus 23:22).
The Author answered King David in his distress by saying that the “kings of the earth set themselves, and the rulers take counsel together, against the Lord, and against his anointed, saying, Let us break their bands asunder, and cast away their cords from us. He that sitteth in the heavens shall laugh: the Lord shall have them in derision. Then shall he speak unto them in his wrath, and vex them in his sore displeasure.” (Psalm 2:2-5)
The Author also promised that He would not fail one word of His blood-bought covenant concerning His people (Psalm 89:34)” –
March 29, 2015 @ 9:07 am
“Evil is Powerless if the Good are Unafraid”
“Evil is powerless if the good are unafraid. That’s why the Marxist vision of man without God must eventually be seen as an empty and a false faith—the second oldest in the world—first proclaimed in the Garden of Eden with whispered words of temptation: ‘Ye shall be as gods.’ The crisis of the Western world, Whittaker Chambers reminded us, exists to the degree in which it is indifferent to God… This is the real task before us: to reassert our commitment as a nation to a law higher than our own, to renew our spiritual strength. Only by building a wall of such spiritual resolve can we, as a free people, hope to protect our own heritage and make it someday the birthright of all men.” —Ronald Reagan
March 29, 2015 @ 4:02 pm
Mar 29, 2015, 06:00PM | Rachel Avraham
“Right as the Jewish people are preparing to celebrate Passover, Yemen appears to be heading into a protracted struggle between the Houthi rebels backed by Iran and a Sunni-led alliance headed by Saudi Arabia.
According to Arutz Sheva, Jewish text known as the Yalkut Shimona states, “In the year in which the Messiah-King appears, all the nations of the world are provoking each other. The King of Persia provokes an Arab king and the Arab king turns to Aram for advice. And the King of Persia goes back and destroys the entire world. And all the nations of the world are in panic and distress and they fall upon their faces and are seized with pains like those of a woman giving birth and Israel is in panic and distress.”
Persia is the ancient name for Iran and the totalitarian dictator of Iran has just provoked Saudi Arabia, which is ruled by an Arab King, prompting him to turn to Aram, whom Jewish scholars interpret to be Edom (Rome representing Europe and the US). Bloomberg reported that Saudi Arabia’s Ambassador to the United States Adel al Jubeir stated that their response to Iran backing the Houthi rebels that took over Yemen was coordinated with the United States, in other words Edom or Aram.
If the rest of the prophesy plays out, then Iran will respond to the Arab king by trying to destroy the entire world. Interestingly, as we speak, Iran is pursuing a nuclear weapons program. They declared themselves to be the Farsi Empire and they are making moves to take over the entire Middle East from Yemen to Syria to Lebanon and Iraq. According to the Twelfth Shia ideology that guides the ideology of Ayatollah Khamenei who is the true ruler of Iran” –
March 29, 2015 @ 8:42 pm
Some comments removed by Philip J. Palin.
Mr. Tingus: I will admit to being ethically uncertain regarding how to deal with your contributions. You are, it seems to me, trying to test exactly where my name-calling and off-topic standards begin-and-end.
Your testing has helped me recognize another issue: to the extent I am associated with this virtual space, I am unwilling to participate in a process that amplifies — may even prompt — your cultivation of anger.
Spontaneous expressions of anger may occasionally be of some benefit; especially when we are angry on behalf of others. In the sustained cultivation of anger, however, I perceive only darkness, despair, and even worse. In our private correspondence over the years I have attempted to dissuade you from such belligerence. These efforts have failed.
I will no longer enable your anger. I cannot imagine it is good for you. I am certain it is unhelpful and is probably destructive to conversation, consideration, and collaboration… all of which are of great value to me. Please participate in a manner that is constructive… or be quiet.
The New York Times |
NYTimes.com |Sunday, March 29, 2015 9:16 PM EDT
Iran Backs Away From Key Detail in Nuclear Deal
With a negotiating deadline just two days away, Iranian officials on Sunday backed away from a critical element of a proposed nuclear agreement, saying they are no longer willing to ship their atomic fuel out of the country.
For months, Iran tentatively agreed that it would send a large portion of its stockpile of uranium to Russia, where it would not be accessible for use in any future weapons program. But on Sunday Iran’s deputy foreign minister made a surprise comment to Iranian reporters, ruling out an agreement that involved giving up a stockpile that Iran has spent years and billions of dollars to amass.
March 30, 2015 @ 2:51 pm
March 30, 2015 @ 5:57 pm
Angry not as you perceive or possibly the few or many readers who differ in opinion, however very much disgustingly disappointed as are many of the more simple folk here on “Main Street USA” by the outright bias and perverseness which has become so entrenched by the expressions by a White House so “destructive to conversation, consideration and collaboration….” i.e, “Hands Up Don’t Shoot” which was as far from the truth as those doing their utmost to keep the video of a young man as a criminal stealing and intimidating a store clerk….
…and certainly I am an American very proud of our nation’s rich history and our obligation as well as a citizen always willing to stand forthright against those that seek to destroy America’s credibility and strength and on behalf of our brave warriors left behind at the “Benghazi Massacre” or the police officers who have been thrown under the bus much like our respected intel community and they exposed to far more life-threatening endangerment by this “Chicago-Hollywood-Washington charade” – Our police and first responders and our men and women – our precious youth in American uniform – deserve far better!
Some stated that John Adams was an angry gentleman and tried to shout him out, however over the course of events, even his adversaries came to realize that their perceptions and policy decisions were not in the best interests of our beloved Republic, unfortunately almost too late!
Given your reply which I must stem the numbers of folks who become outraged by my musings so contrary to them, I will not “be quiet” however now retire from any further contribution to HLSWatch.com because apparently it is ok for those in office as orators in empty rhetoric to be outright deceivers and willing in their arrogant and self-serving mannerisms to blatantly stand in out right lies to their constituents making “apology” for America when so many have died and given limb in serving and preserving liberty!
At this time in history, much like when John Adams was challenging the “silly delegation” which challenged his ideas as to how Liberty should be led against the tyranny of the King is much the same portrayed when I see the delegation sitting across from the Mullahs who have no regard or Respect for any Agreement w/the “infidel” –
….today at least from my vision, I clearly see an ever unstable global landscape as a result of the tainted WH leadership which I imagine Adams would refer to as a great source of “disquietude” – such bias and such outright hatred toward the Hebrew and all witnessed by the Lord! How dare you?
In retiring from making any further contributions or comments or “to be quite” from this valued HLSWatch.com web site and in open forum which enables all to express opinions and comments – I remind all who truly care about America free from your present self-serving political parties and special interest groups which have gripped our nation’s capital in their lusting for power and monies and who so pretend to care about the populace, yet We the People know far better…recalling the poetic line of Daniel Defoe, “Remember all men would be tyrants if they could” – as well as Frederick Douglass who wrote: “The limits of tyrants are prescribed by the endurance of those who they oppress” –
The growing insolence we see among the population is in fact promoted by the injustice towards fellow Americans as a result of an ever imposing government today and without voices of dissension unsupportive of the tyrant and this present administration, well growing difficulties which I have envisioned and so willing to stand in shouting conveyance which would lead to larger struggles which we now see prompts recall from Shakespeare:
“There is tide in the affairs of men,
Which, taken at the flood, leads on to fortune;
Omitted, all the voyage of their life
Is bound in the shallows and in miseries…
And we must take the current when it serves,
Or lose our ventures” –
The hope has been to enlighten those who over time now who can see the great turmoil ahead as a result of the casting off of Biblical verse and teachings and our Judeo-Christian values and commitment to protect Jerusalem far greater than some political party and unfortunately the apparent unappreciative and ignorance among men to the Blessings bestowed upon Abraham who conveyed such to our forefathers who toiled and sacrificed to allow each of us to stand and shout if necessary on behalf of our beloved Republic which We so love and admire and to protect America and good ‘ol Glory….
As Samuel Adams in (1775) wrote: “no People will tamely surrender their Liberties, nor can they be easily subdued, when knowledge is wide spread and Virtue is preserved. On the Contrary, when People are unwisely ignorant, and debauched in their manners, they will sink under their own weight without Aid of foreign invaders” –
In my final sign off to HLSWatch.com as I retire and wish us all the very best and most certainly to my fellow Americans who share the same pride for our wonderful nation, it might be better accepted by some and certainly this administration if I sign off saying, “Inshallah” for maybe this is politically correct and so accepted…however as a Christian and an American, I prefer signing off and wish all well, God Bless us all and America for as Americans we must be proud of our country and our resilience and acceptance of other cultures and Respect for Islam, Judaism, Christianity, Hinduism and so much more where we do not see color, however the bias and bigotry spewed by this White House et al, well, we can only hope that in our next election, whatever party and whether man or woman, our next eight year resident will truly care about America for there is no country or charitable people who can compare —
God Bless us!
“Main Street USA”
PO Box 1612
Harwich (Cape Cod), MA 02645
Comment by Louie
September 25, 2015 @ 1:03 pm
The Master Plumbers Association is at present in search of a Investigation / Project Officer to perform within the membership and customer services team.
Comment by cerrajeros valladolid centro
September 26, 2015 @ 2:59 pm
Jacob showed up on time to modify our lock to the keypad
RSS feed for comments on this post.
Mail (will not be published) (required)
XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Template adapted from Blue Horizon, designed by Kaushal Sheth.