“Give us our share of America,or we’re gonna burn America down said a terrorist on film in 2007. One Terrorist needs and therefore has a support group of many, many people. President Trumps 7 country ban therefore isn’t just about finding terrorists. It’s about finding all of their support groups, all of the members of a project team dedicated to the destruction of America. Think about how many people are involved in the drug smuggling trade and use that model for terrorists. Both are criminal gangs, cells and organizations like Hamas, Hizbollah, alQuada, al-Aqsa, the Palestine Liberation Front, the Islamic Jihad and other secret networks that operate inside America. They bribe government officials and law enforcement. There are “coyotes” who smuggle terrorists, drug dealers and illegal immigrants across America’s borders. Drug control and counter-terrorism follow similar problems of large numbers of interconnected people.
Terrorists need spies in America to work with and for them to get information about the targets. Many spies live and work in the two Embassies of Iran in America.
There are covert networks inside America who use multiple contacts for the effective functioning of their secret society. These people live and work among us but purposely remain invisible to us and to law enforcement but they are there. Why bring in more co-conspirators?
The 19 hijackers came from a network that formed while they were completing terrorist training in Afghanistan. These are more than simple smuggling networks. Many were school chums from many years ago. Some had lived together for years, and others were related by family ties. These were deep trusted ties, that were not easily visible to outsiders, who wove this terror network together. Relationships formed years ago in school and training camps, keep the cells linked. They lived together, attended the same school or went to the same classes/training places. Ingenuity, cunning, elusiveness and deceit are part of their talents. Why are some judges so obtuse about these people?
And judges are human. They make mistakes. They lie. They have been known to accept bribes.
There are many people involved in establishing a hijacker network.
Some were trained to fly. Others were trained to attack the passengers.
How does a covert network accomplish its goals?
We know the 19 hijackers did not work alone. They had other accomplices who did not get on the planes. These co-conspirators were conduits for money and also provided needed skills and knowledge. There were direct and indirect associates.
President Trump is trying to prevent terrorist actions but there are already cells of terrorists here.
As was evident with the September 11th hijackers, investigators found the connections between the hijackers and also discovered several of the hijackers’ associates.
How do you discover a network that focuses on secrecy and stealth?
Covert networks often don’t behave like normal social networks. Conspirators don’t advertise their conspiracy.
The hijacker’s network had a hidden strength – massive redundancy through trusted prior contacts. These ties made the network very resilient. These ties were solidly in place before the hijackers made their way to America. These strong ties were invisible during their stay in America. It was only after the tragic event that intelligence from Germany and other countries, revealed the apparent center of this violent network. The dense connections of the ‘Hamburg cell’ are now obvious
This dense under-layer of prior trusted relationships made the hijacker network both stealth and resilient. Although we do not know all of the internal ties of the hijackers’ network it appears that many of the ties were concentrated around the pilots.
Conclusion
To draw an accurate picture of a covert network, the President needs to identify ties between the conspirators. The same four relationships we often map in many business organizations would tell us much about illegal organizations. This data is occasionally difficult to unearth with cooperating clients. With covert criminals, the task is enormous, and may be impossible to complete.
1. Trust
Prior contacts in family, neighborhood, school, military, club or organization. Public and court records. Data may only be available in suspect’s native country.
2. Task
Logs and records of phone calls, electronic mail, chat rooms, instant messages, Web site visits. Travel records. Human intelligence: observation of meetings and attendance at common events.
3. Money & Resources
Bank account and money transfer records. Pattern and location of credit card use. Prior court records. Human intelligence: observation of visits to alternate banking resources such as Hawala.
4. Strategy & Goals
Web sites. Videos and encrypted disks delivered by courier. Travel records. Human intelligence: observation of meetings and attendance at common events.
Of course, the president will not have access to many of these sources.
The best solution for network disruption may be to discover possible suspects and then, via snowball sampling, map their individual personal networks – see whom else they lead to, and where they overlap. To find these suspects it appears that the best method is for diverse intelligence agencies to aggregate their individual information into a larger emergent map. By sharing information and knowledge, a more complete picture of possible danger can be drawn.
It stands to reason that there are hundreds of Terror Supporters in America. A handful of terrorists need hundreds of spies who in turn need thousands of people to support them. Finding one Terrorist is not the end of the game because there are thousands of supporters of Terrorism who get under the radar as they live and work in America. Their purpose is to bring America down; to conquer and control the country.
America has thousands of groups, sub-groups and individuals living her who want to conquer and control America. there are hundreds of thousands overseas in places like Nigeria where Boko Haram kidnapped 276 girls from a school in Chibok, Nigeria, on 14 April 2014. Even First Lady Michelle Obama couldn’t get then back. Fifty-seven of the girls escaped from Boko Haram. The rest are still missing, with little hope of returning to their previous lives.
Iran has a spy office in Manhattan at 45 W 34th Street, New York, NY 10001 and another spy office in Washington D.C. at 2200 Pennsylvania Avenue NW, Zip is 20037. These are sometimes called embassies but their purpose is to spy on America.
There are covert networks inside America who use multiple contacts for the effective functioning of their secret society. These people live and work among us but purposely remain invisible to us and to law enforcement but they are there. Why bring in more co-conspirators?
Some were trained to fly. Others were trained to attack the passengers.
How does a covert network accomplish its goals?
We know the 19 hijackers did not work alone. They had other accomplices who did not get on the planes. These co-conspirators were conduits for money and also provided needed skills and knowledge. There were direct and indirect associates.
The hijacker’s network had a hidden strength – massive redundancy through trusted prior contacts. These ties made the network very resilient. These ties were solidly in place before the hijackers made their way to America. These strong ties were invisible during their stay in America. It was only after the tragic event that intelligence from Germany and other countries, revealed the apparent center of this violent network. The dense connections of the ‘Hamburg cell’ are now obvious
This dense under-layer of prior trusted relationships made the hijacker network both stealth and resilient. Although we do not know all of the internal ties of the hijackers’ network it appears that many of the ties were concentrated around the pilots.
Conclusion
To draw an accurate picture of a covert network, the President needs to identify ties between the conspirators. The same four relationships we often map in many business organizations would tell us much about illegal organizations. This data is occasionally difficult to unearth with cooperating clients. With covert criminals, the task is enormous, and may be impossible to complete.
1. Trust
Prior contacts in family, neighborhood, school, military, club or organization. Public and court records. Data may only be available in suspect’s native country.
2. Task
Logs and records of phone calls, electronic mail, chat rooms, instant messages, Web site visits. Travel records. Human intelligence: observation of meetings and attendance at common events.
3. Money & Resources
Bank account and money transfer records. Pattern and location of credit card use. Prior court records. Human intelligence: observation of visits to alternate banking resources such as Hawala.
4. Strategy & Goals
Web sites. Videos and encrypted disks delivered by courier. Travel records. Human intelligence: observation of meetings and attendance at common events.
Views: 6