Berto Jongman: Map of USA Terror Hotspots in Past

09 Terrorism, 10 Security, Academia
Berto Jongman

Terrorist Attack Map Shows Terrorism ‘Hot Spots' Across U.S.

Can science predict where terrorists will strike? Not quite. But researchers at the University of Maryland (UMD) and the University of Massachusetts, Boston (UMB) have created a detailed map of where terrorism attacks have occurred since 1970 – and it reveals some big surprises.

The map's accompanying study, conducted at the UMD's National Consortium for the Study of Terrorism and Responses to Terrorism (START), found that while certain areas (those surrounding Manhattan and Los Angeles, for example) have endured as terror ‘hot spots' throughout the study, others have come and go. In the 2000s, for example, there has been a higher-than-average rate of attacks in Maricopa County, AZ, Phoenix's county. King County, WA, on the other hand, was a terror hot spot in the 1970s and 1980s, but has been largely quiet since.

Click on Image to Enlarge

The START researchers called 65 of the nation's 3,143 counties hot spots, although that only means that these counties experienced higher than the national average of 6 attacks from 1970-2008.

The study, which looked at all 3,143 U.S. counties, also found that terrorism hot spots and motivations have changed dramatically from decade to decade. Where do terrorists come from? In the last decade, many politicians have conjured the image of Islamic fundamentalists from the Middle East. But in the 1970s, many attacks classified as ‘terrorist' came from left-wing groups in Berkeley, San Francisco and surrounding areas.

The research showed a strong association between the county in which a terrorist attack occurred and its motivation. “For example,” a University of Maryland statement notes, “Lubbock County, Texas, only experienced extreme right-wing terrorism while the Bronx, New York, only experienced extreme left-wing terrorism.”

Similarly, particular ideologies' inclination to terrorist attacks varied over the years.

“The 1970s were dominated by extreme left-wing terrorist attacks,” co-author Bianca Bersani, assistant professor of sociology at UMB, said. “Far left-wing terrorism in the U.S. is almost entirely limited to the 1970s with few events in the 1980s and virtually no events after that.” Perhaps unsurprisingly, domestic left-wing terrorism overwhelmingly took place in the San Francisco Bay area during the Vietnam War.

Other interesting findings include the fact that “religiously motivated attacks occurred predominantly in the 1980s, extreme right-wing terrorism was concentrated in the 1990s and single issue attacks [‘e.g., anti-abortion, anti-Catholic, anti-nuclear, anti-Castro'] were dispersed across the 1980s, 1990s and 2000s.”

The researchers hope that the insights from the study can be used to determine the relationship between terrorism and ordinary crime, which has historically been much easier to predict.

Berto Jongman: Kurzweil Blog – Bypass the Internet!

Autonomous Internet
Berto Jongman

Bypass the Internet!

Amara D. Angelica

Kurzweil Blog, January 30, 2012

I’m sick of hearing about how we need to cave into repressive governments and throttle back Google, Twitter, Facebook, and other information services and accept Web censorship and limits on free expression. Get the hell off my cloud.

“If a full-surveillance world prevents us from speaking, then we need to make another platform where freedom of speech and freedom of thought can be maintained,” as futurist Ian Pearson puts it.

P2P Goverance

“I’ve written a number of times about jewelery nets and sponge nets. These could do the trick. With very short-range communication directly between tiny devices that each of us wears just like jewellery, a sponge network can be built that provides zillions of paths from A to B, hopping from device to device till it gets there.

No ISPs needed

“Each device is autonomous. Each shares data with its immediate neighbors, and route dynamically according to a range of algorithms available to them. They can route data from A to B so that every packet goes by a different route of need be. Even without any encryption, only A and B can see the full message.

“The capability to make these kinds of devices is almost here. If some government officials don’t like it, well, so what? Right now, I don’t have a lot of respect for government.”

Right on. Anybody out there developing these nets? Let’s hear from you!

See Also:

Autonomous Internet (126)

Josh Kilbourn: Record 1.2 Million People Fall Out Of Labor Force In One Month, Labor Force Participation Rate Tumbles To Fresh 30 Year Low

Uncategorized
Josh Kilbourn

Record 1.2 Million People Fall Out Of Labor Force In One Month, Labor Force Participation Rate Tumbles To Fresh 30 Year Low

Tyler Burden

ZeroHedge, 3 February 2011

A month ago, we joked when we said that for Obama to get the unemployment rate to negative by election time, all he has to do is to crush the labor force participation rate to about 55%. Looks like the good folks at the BLS heard us: it appears that the people not in the labor force exploded by an unprecedented record 1.2 million. No, that's not a typo: 1.2 million people dropped out of the labor force in one month! So as the labor force increased from 153.9 million to 154.4 million, the non institutional population increased by 242.3 million meaning, those not in the labor force surged from 86.7 million to 87.9 million. Which means that the civilian labor force tumbled to a fresh 30 year low of 63.7% as the BLS is seriously planning on eliminating nearly half of the available labor pool from the unemployment calculation. As for the quality of jobs, as withholding taxes roll over Year over year, it can only mean that the US is replacing high paying FIRE jobs with low paying construction and manufacturing. So much for the improvement.

Chart below shows it all – that jump is not a fat finger!

And Labor Force

Continue reading “Josh Kilbourn: Record 1.2 Million People Fall Out Of Labor Force In One Month, Labor Force Participation Rate Tumbles To Fresh 30 Year Low”

Eagle: Is US Democracy Being Bought and Sold? -Jazeera Survey Multi-Media Article

07 Other Atrocities, 11 Society, Articles & Chapters, Corporations, Corruption, Cultural Intelligence, Government, IO Impotency, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Power Behind-the-Scenes/Special Interests
300 Million Talons...

Our naked, obese, rather retarded Emperor is “outed.”

Is US democracy being bought and sold?

How corporations, unions and political action committees are shaping the candidate pool.

Read full article with many video and other links.

See Also:

Review: The Best Democracy Money Can Buy

DefDog: Anonymous Intercepts FBI – Scotland Yard Conference Call On — Wait for It — Hacking… + Meta-RECAP

Computer/online security, Cultural Intelligence, IO Impotency, Law Enforcement
DefDog

Example of the state of USGOV systems….

Anonymous gain access to FBI and Scotland Yard hacking call

BBC news, 3 February 2012

Hacking network Anonymous has released a recording of a conference call between the FBI and UK police in which they discuss efforts against hacking.

The call, said to have taken place last month, covers the tracking of Anonymous and similar groups, dates of planned arrests and evidence details.

Anonymous also published an email, apparently from the FBI, showing the email addresses of call participants.

The FBI confirmed the intercept and said it was hunting those responsible.

The loose collective Anonymous have targeted a number of big institutions in recent years

“The information was intended for law enforcement officers only and was illegally obtained. A criminal investigation is under way to identify and hold accountable those responsible,” it said in a statement.

London's Metropolitan Police's central e-crime unit said the matter was being investigated but that no operational risks had been identified.

A comment on one of the Twitter accounts linked to Anonymous, AnonymousIRC, said: “The FBI might be curious how we're able to continuously read their internal comms for some time now.”

Read full article.

Phi Beta Iota:  This is too funny for words.  Hackers and Phi Beta Iota have been very clear for over 20 years that most law enforcement systems are easy to hack into, especially now that they are all digital and controlled by a server where no one has had the brains to change the factory installed root password.  What is really happening now is that government incomtence in security is being “outed.”  CIA has worked overseas for decades, pretending to be clandestine when in fact all case officers have been known to local liaison.  Similarly, government “security” is an oxymoron.  On the one hand, it does not exist, and on the other we are spending tens of billions on the well-intentioned but ignorant threatics of the Transportation Security Agency (TSA) and the world's most expensive coffee klatch, the National Counter-Terrorism Center (NCTC).  This is what you end up with when a government of arrogant “experts” and even more arrogant politicians refuse to listen to both insider iconoclasts and outsider “loyal opposition” minds that actually know what they are talking about and see these things 20 years before the “leaders” at the top, who are really nothing more than clerks fighting for budget share, without a strategic bone in their bodies.

1994 Sounding the Alarm on Cyber-Security

See Also:

Continue reading “DefDog: Anonymous Intercepts FBI – Scotland Yard Conference Call On — Wait for It — Hacking… + Meta-RECAP”

Berto Jongman: Does Terrorism Work? What Do They Want? + Meta-RECAP

09 Justice, 09 Terrorism, 10 Security, 11 Society, Articles & Chapters
Berto Jongman

Does Terrorism Really Work? Evolution in the Conventional Wisdom Since 9/11 (Max Abrahms)

What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy (Max Abrahms)

Why Terrorism Does Not Work (Max Abrahms)

Max Abrahms Website

Phi Beta Iota:  Terrorism is a tactic.  Both Israel and the USA have used it to great effect, and evidently continue to use it today, not only as a flag political tactic, but in the case of Isreal, to sell security services (warn of car bomb; car bomb; sell tons of cameras and security services to morons that don't realize they've been had).  Terrorists want what we all want: dignity for themselves and legitimacy in any government that pupports to be responsible for their liberty and general welfare.  The Preamble to the Constitution is always a useful touchstone–Ron Paul does not get three of the four parts:

We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.

See Also:

Continue reading “Berto Jongman: Does Terrorism Work? What Do They Want? + Meta-RECAP”