Search This Blog

Tuesday, August 11, 2015

Interstate Commerce Theft CIT BICE ICE

This  Motorcycle PIC Is An Artifact Jurisdiction Now FBI 
http://thenewmiddleeastsouthcentraltexas.blogspot.com/2013/12/all-rural-roads-lead-to-american.html

Have you found where we left Bob Hope's 707 Private Jet?
We are not all found of Fonda

Do I have to draw you a map, O'Dell's maps are better than googles!.

The Following extracted and noted 'Published By Texas Governor Rick Perry for 
the General Public'

See Letter to Congressman Henry Cuellar "This Public Domain Pamphlet Does not Include Federal FAA Certificate Holders" after contacting the number on the packet FEMA
Electronic Attacks On The Public, Human Experimentation, Hyper-Surveillance, Abuse by Political Leaders, Biological Weapons and Gang Stalking  Notation: Anything that enters the human body with the intent to change human behavior, or investigative frequencies are considered a Biological Weapon and is forbidden by the High Court and International  Law 1997 which is considered torture. See Link: http://www.hrweb.org/legal/cat.html Microwave, Infrared, Radio, Ionizing particles, Recombinant Viruses, or the use of any electromagnetic waves, delivered by a Vector,  Any Vector* http://solidstateindependence.blogspot.com/2013/03/what-is-state-sponsored-terrorism-and.html


I think it was Senator High-tower that Wrote This Execution Law?
http://www.burntorangereport.com/diary/30798/breaking-ken-paxton-indicted-on-3-felony-counts-of-fraud


What Is Domestic Terrorism?

2.3.1.2 Domestic Terrorism Domestic terrorism will continue to pose a threat in Texas over the next five years. Domestic terrorist groups usually fall into two broad categories: left-wing extremists and right-wing extremists. Left-wing groups commit acts of sabotage or violence in order to advance a political agenda, usually related to trade globalization, human and labor rights, animal rights or the environment. Right-wing groups include white supremacist or anti-government groups who target law enforcement officials, government officials, and minority groups. Examples of left-wing groups are the Animal Liberation Front (ALF), the Earth Liberation Front (ELF) and the Stop Huntington Animal Cruelty (SHAC) group. These three groups are simply examples of left-wing domestic terrorists; they do not represent all potential threats in this area.

Left-wing domestic terrorists tend to target research laboratories, nuclear power plants, pharmaceutical and cosmetic companies, and organizations that monitor or lobby against their political views. Examples of right-wing groups are Skinheads, the modern Ku Klux Klan, other neo-Nazi white supremacist groups, and anti-government groups. These organizations tend to target minority groups—including Jews, African-Americans, homosexuals, and Catholics—as well as government officials.

Terrorists do not always operate within the construct of an organized group, but may instead operate as “lone wolf” actors. Lone wolf actors are individuals who draw ideological inspiration from terrorist organizations, but operate alone on the fringes of those movements. An example might be an individual who opposes animal testing and targets individuals and facilities associated with animal testing. Another example is an individual who sympathizes with the Palestinian cause and is inspired to act against individual Jews or Jewish institutions – of which Texas has many.

 A lone wolf jihadist with sympathy for a terror group like Al-Qaeda or Hamas could pose a considerable threat. An example is Major Nidal Malik Hasan, a U.S. Army psychiatrist, who on November 5, 2009, opened fire at Fort Hood, near Killeen, Texas, who has been charged with the murder of 13 military personnel and the attempted murder of 32 others injured in the shooting spree. At the time of this writing, the investigation was still underway; however, Hasan has been connected to several jihadists, including radical Imam Anwar al-Awlaki, who has also been linked to several of the 9/11 hijackers. It has been determined that Hasan acted as a lone wolf Islamic extremist terrorist.

Citation: Texas Homeland Security Strategic Plan 2010-2015 Governor Rick Perry
Who Is Listening Watching? All Telecommunications Devices
Including The Internet

A. HITRAC: Cyber Threat Analysis. HITRAC [HITRAC threat analysis focuses mainly on regional, critical infrastructure, cyber, and explosives threats] analyzes cyber threats to critical infrastructure; develops tailored cyber threat assessments with federal, state, local, and tribal officials; conducts cyber analytic outreach on behalf of the Office of Intelligence and Analysis; and produces cyber-related requirements on behalf of DHS. Products generated by these analyses include:
◦Cyber-related Homeland Intelligence Reports. ◦Cyber Monitor. ◦Homeland Security Cyber Threat Report. ◦Drafting or contributing to Intelligence Community Bulletins. ◦Cyber Threat Briefing.

B. DIR: The Department of Information Resources (DIR) provides statewide leadership and oversight for management of government information and communications technology. [They Buy Devices and Services From Private Security Firms]
Other Devices Uses Biometrics / Geospatial / Geospatial Tracking / Satellite / Drones

2.6.1. Enhance security features in state driver licenses and identification cards to include the use of biometrics. (TC: 1, 2, 3, 4, 8, 19)
Furthermore, the fingerprint database will be compared with the federal Integrated Automated Fingerprint Identification System (IAFIS) to identify felony criminals and terrorists attempting to obtain a Texas driver license. Facial recognition technology will also be used to minimize the abuse of Texas driver licenses by criminals and terrorists.

In addition to driver licenses, criminals and terrorists also seek to exploit certain professional identifications for sensitive critical infrastructure sectors, primarily the transportation sector. Texas will work closely with DHS to implement the Transportation Worker Identification Credential system and HazMat driver license security program.

In July 2009, Texas was a key player in the National Level Exercise (NLE 09), where Texas' critical infrastructure was targeted by notional terrorist groups. In the exercise, Texas demonstrated the ability to discern intentions and take actions to prevent them. This ability to act was the result of unprecedented interagency coordination and synchronized actions made possible through the use of the state’s geospatial information system, known as TxMAP.

In addition to the key role it played during NLE 09, TxMAP greatly facilitated emergency response understanding and actions during Hurricane Ike in September 2008.

The Texas Fusion Center maintains the centralized CI/KR [Critical Infrastructure and Key Structures] database of threat, vulnerability and consequence information in order to prioritize vulnerability reduction efforts across the pool of CI/KRs, and provide a layer of data for TxMAP, the state’s geospatial technology platform. DHSDHS Protective Security AdvisorsDHS to provide targeted funding to local jurisdictions for the purchase of equipment that will extend the zone of protection beyond the gates of CI/KR facilities through the Buffer Zone Protection Program. The Buffer Zone Protection Program provides both funding and coordination to bring all levels of government, law enforcement and the private sector [Private Security Firms]together to create Buffer Zone plans to reduce vulnerabilities in areas surrounding prioritized CI/KR.

Citation: Texas Homeland Security Strategic Plan 2010-2015 Governor Rick Perry
Where Does The Information Go?
State and Private Security Firms and
National Network of Fusion Centers

National Network of Fusion Centers
State and major urban fusion centers (fusion centers) serve as focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information between the federal government and state, local, tribal, territorial (SLTT) and private sector partners.

Located in states and major urban areas throughout the country, fusion centers are uniquely situated to empower front-line law enforcement, public safety, fire service, emergency response, public health, CIKR protection, and private sector security personnel to understand local implications of national intelligence, thus enabling local officials to better protect their communities. 

Fusion centers provide interdisciplinary expertise and situational awareness to inform decision-making at all levels of government. They conduct analysis and facilitate information sharing while assisting law enforcement and homeland security partners in preventing, protecting against, and responding to crime and terrorism.

Fusion centers are owned and operated by state and local entities [Private Security Firms] with support from federal partners in the form of deployed personnel, training, technical assistance, exercise support, security clearances, connectivity to federal systems, technology, and grant funding.
The Current Threat Environment and Role of Fusion Centers in National Security Both at home and abroad, the United States faces an adaptive enemy in an asymmetric threat environment. Events since May 2009 have demonstrated that the threat to the homeland is not abating. A National Network of Fusion Centers (National Network) is uniquely situated to empower front-line law enforcement, public safety, emergency response, and private sector security personnel [Private Security Firms] to lawfully gather and share information to identify emerging threats. 

The national security enterprise must reach beyond the capabilities of the federal government and national Intelligence Community to identify and warn about impending plots that could impact the homeland, particularly when the individuals responsible for the threats operate within the United States and do not travel or communicate with others overseas. By building trusted relationships and collaborating with SLTT  [State, Local, Tribal and Territorial] and private sector partners [Private Security Firms], fusion centers can gather and share the information necessary to pursue and disrupt activities that may be indicators of, or potential precursors to, terrorist activity. With timely, accurate information on potential terrorist threats, fusion centers can directly contribute to and inform investigations initiated and conducted by federal entities, such as the Joint Terrorism Task Forces led by the Federal Bureau of Investigation.

***********
How Can You Help Protect Yourself and Family?
And Who Should Be Trusted
  • Volunteers in Policing (VIPs) Program, which connects citizens to law enforcement volunteer opportunities.
  • Medical Reserve Corps Program, which allows medical, public health and other volunteers to offer their expertise to their communities, particularly during emergencies and other times of need. [Including Health and Human Services]
  • Neighborhood Watch Program, which incorporates terrorism awareness education into its existing neighborhood crime prevention organizations (Law Enforcement, Protective Security Advisers  and Military Does Not Count They Are Investigating)
Note: 

FAA Certificate Holders such as Pilots, Aerospace Engineers, Aircraft Electricians, Aircraft Mechanics are not listed on the Texas Perry Program. They are part of the Federal Aviation Administration and many volunteer as First Responders for Suspicious or Downed Aircraft 

All United States Citizens: Have a constitutional duty to respond to threats and dangers such as rendering aid to traffic accident victims, again not listed on the Perry plan.

********************

Who Is Spying / Stalking

Private Security Firms

  These Are Not The Private Security Firms For Banks, Pharmacies, Casinos
Video Removed


THE SPY FILES (LEARN): 
http://www.aclu.org/spy-files 

PRIVATE COMPANIES SUE: http://www.youtube.com/user/lissakr11?
feature=mhee#p/c/BA4420F58FD3EAD3/0/-mCO7T1-XTE 

Watch: http://www.youtube.com/watch?feature=player_embedded&v=8filVph9nNQ 

See map: http://bit.ly/9w0rir 

Explore connections: http://bit.ly/bitKPu 

"Spread it around"
By Order of Governor Rick Perry

When The Police Get Caught They Call It A Crime Not Terrorism?
UPDATE Reuters 4-UK police arrest Murdoch tabloid staff, raid offices
News Corp's Management and Standards Committee, set up in the wake of the phone hacking scandal, said Saturday's operation was the result of information it had passed to police. "News Corporation made a commitment last summer that unacceptable news gathering practices by individuals in the past would not be repeated," the committee said in a statement confirming the arrests of four "current and former employees" of the Sun.
Read Full Article: http://www.reuters.com/article/2012/01/28/newscorp-arrests-idUSL5E8CS03Y20120128

**************************************

Definitions:

CI/KR: Critical Infrastructure and Key Structures

CIKR:  Critical Infrastructure and Key Structures

Biometrics: (or biometric authentication) "Consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance."
Examples: 1  Facial Recognition 2. Finger Print Recognition 3. Voice Recognition (Not All Inclusive)

DHS: Department Homeland Security

Geospatial: Mapping

Geospatial Tracking: Tracking the movements of an automobile, individual, Contraband etc.

Situational Awareness: A Situated Knower

SLTT: State, Local, Tribal and Territorial

Political Targeting: Texas Governor Rick Perry Abused The 911 Patriot Act by Targeting Texans For 10 Years To Hold Political Power


The World's Smallest and Loudest Electric Guitar 


First posted 03/18/2013 

What is the Texas Chinese Model? 
A DOD Staff Member Tries to Get Budget money for situational Knowledge 'Situated Knower' After Stealing 456135816 Copyright by using every electronic device and means. This type of knowledge is protected by our constitution and is illegal 'fruit from the poisonous tree!' 

Example: Microsoft and Blackboard Cloud Carries Your DNA Information shared with foreign entities. The Original Equipment Manufacturer or 'OEM' CEO is liable. 

What is a situated knower ? 
Example: A slave seamstress of a plantation owner's wife makes dresses for the owner's wife and spends most of her time in the same room trying to satisfy her master is a situated knower.

Google is a situated knower - are your blogs blocked and censored?

Texas Governor Wrote It Abbott Signed It - They Left Out Federal FAA First Responders by Intent - Many where targeted and harmed by the State of Texas

Who Made Stalking Legal In Texas? 
Answer: Congressman Henry Cuellar and Texas Governor George W. Bush




Post a Comment