Berto Jongman: Map of USA Terror Hotspots in Past

09 Terrorism, 10 Security, Academia
Berto Jongman

Terrorist Attack Map Shows Terrorism ‘Hot Spots' Across U.S.

Can science predict where terrorists will strike? Not quite. But researchers at the University of Maryland (UMD) and the University of Massachusetts, Boston (UMB) have created a detailed map of where terrorism attacks have occurred since 1970 – and it reveals some big surprises.

The map's accompanying study, conducted at the UMD's National Consortium for the Study of Terrorism and Responses to Terrorism (START), found that while certain areas (those surrounding Manhattan and Los Angeles, for example) have endured as terror ‘hot spots' throughout the study, others have come and go. In the 2000s, for example, there has been a higher-than-average rate of attacks in Maricopa County, AZ, Phoenix's county. King County, WA, on the other hand, was a terror hot spot in the 1970s and 1980s, but has been largely quiet since.

Click on Image to Enlarge

The START researchers called 65 of the nation's 3,143 counties hot spots, although that only means that these counties experienced higher than the national average of 6 attacks from 1970-2008.

The study, which looked at all 3,143 U.S. counties, also found that terrorism hot spots and motivations have changed dramatically from decade to decade. Where do terrorists come from? In the last decade, many politicians have conjured the image of Islamic fundamentalists from the Middle East. But in the 1970s, many attacks classified as ‘terrorist' came from left-wing groups in Berkeley, San Francisco and surrounding areas.

The research showed a strong association between the county in which a terrorist attack occurred and its motivation. “For example,” a University of Maryland statement notes, “Lubbock County, Texas, only experienced extreme right-wing terrorism while the Bronx, New York, only experienced extreme left-wing terrorism.”

Similarly, particular ideologies' inclination to terrorist attacks varied over the years.

“The 1970s were dominated by extreme left-wing terrorist attacks,” co-author Bianca Bersani, assistant professor of sociology at UMB, said. “Far left-wing terrorism in the U.S. is almost entirely limited to the 1970s with few events in the 1980s and virtually no events after that.” Perhaps unsurprisingly, domestic left-wing terrorism overwhelmingly took place in the San Francisco Bay area during the Vietnam War.

Other interesting findings include the fact that “religiously motivated attacks occurred predominantly in the 1980s, extreme right-wing terrorism was concentrated in the 1990s and single issue attacks [‘e.g., anti-abortion, anti-Catholic, anti-nuclear, anti-Castro'] were dispersed across the 1980s, 1990s and 2000s.”

The researchers hope that the insights from the study can be used to determine the relationship between terrorism and ordinary crime, which has historically been much easier to predict.

Dolphin: Scientists Cure Cancer, But No One Takes Notice

07 Health, Academia, Commerce, Corruption, Ethics, Government
YARC YARC

Scientists Cure Cancer, But No One Takes Notice

Canadian researchers find a simple cure for cancer, but major pharmaceutical companies are not interested.

Researchers at the University of Alberta, in Edmonton, Canada have cured cancer last week, yet there is a little ripple in the news or in TV. It is a simple technique using very basic drug. The method employs dichloroacetate, which is currently used to treat metabolic disorders. So, there is no concern of side effects or about their long term effects.

This drug doesn’t require a patent, so anyone can employ it widely and cheaply compared to the costly cancer drugs produced by major pharmaceutical companies.

Read full article with significant graphic.

 

Event: 22-24 Aug 2012 Denmark European Intelligence & Security Informatics Conference

09 Terrorism, 10 Transnational Crime, Academia

European Intelligence & Security Informatics Conference (EISIC 2012)
The Premier European Conference on Counterterrorism and Criminology
Odense, Denmark August 22-24, 2012
http://www.eisic.org, http://www.eisic.eu
Co-sponsored by IEEE Computer Society

———————
Call for Papers  DUE 22 APRIL 2012
———————

Continue reading “Event: 22-24 Aug 2012 Denmark European Intelligence & Security Informatics Conference”

Thomas Briggs: No, China Does Not Have 3,000 Nuclear Weapons (Nor Does CIA Have Clandestine Assets Anywhere Relevant)

02 China, 10 Security, Academia, Budgets & Funding, Corruption, Director of National Intelligence et al (IC), DoD, Government, IO Deeds of War, Military, Peace Intelligence
Thomas Leo Briggs

Here is another posting related to this topic to balance the earlier piece from the Washington Post.

No, China Does Not Have 3,000 Nuclear Weapons

A study from Georgetown University incorrectly suggests that China has 3,000 nuclear weapons.The estimate is off by an order of magnitude.

By Hans M. Kristensen

EXTRACT:

According to the International Panel on Fissile Materials, China has produced an estimated 2 tons of plutonium for weapons. Some has been consumed in nuclear tests, leaving roughly 1.8 tons. The estimate is consistent with what the U.S. government has stated and theoretically enough for 450-600 warheads.

Total production of HEU is thought to have been approximately 20 tons. Some has been spent in nuclear tests and research reactor fuel, leaving a stockpile of some 16 tons. That’s theoretically enough for roughly 640-1,060 warheads.

Another critical material is Tritium, which is used in thermonuclear weapons. China probably only produces enough Tritium at its High-Flux Engineering Test Reactor (HFETR) in Jiajiang to maintain an arsenal of about 300 weapons.

The U.S. intelligence community concluded in 2009 that China likely has produced enough weapon-grade fissile material to meet its needs for the immediate future. In other words, no vast warhead expansion is in sight.

Read more, several excellent images.

Click on Image to Enlarge

Phi Beta Iota:  We are reminded of how the British government sacrificed its intelligence and integrity in copying from a university paper to inflate the Iraq WMD threat, and we continue to believe that the “restricted” papers the students were given are both grounds for an investigation of their professor, and grounds for an Inspector General if not a Department of Justice inquiry into illegal PSYOP funding influence from the Pentagon to Georgetown University.  It merits positive comment that neither the CIA's “all source” Directorate of Intelligence nor the CIA's Open Source Center are capable of this level of work–the students, and their professor–have done a great deal of good.  They simply cannot combine — as the CIA and DIA cannot combine — open sources in all languages; deep analytic tradecraft; and rigorous personal integrity….nor does the CIA have any clandestine assets in China relevant to this particular inquiry, nor does the US Intelligence Community have leadership capable of focusing all-source collection and requisite (non-existent) processing on this vital question.  On the one hand, the Pentagon is correct to say that the US intelligence community stinks on all questions Chinese; on the other, the Pentagon and the White House are telling impeachable lies to Congress and the public on all matters relating to the Chinese threat and the Pentagon budget.  Our personal speculative estimate of China's nuclear capability is closer to 30 operable weapons, to which we add that the US has never actually tested any of its nuclear weapons–we literally do not know if they will work as advertised.

Thomas Briggs: Georgetown Students Scoop Secret World on China’s Tunnel System for Nuclear Weapons – or a PSYOP Against US Public?

02 China, 04 Education, 04 Inter-State Conflict, 07 Other Atrocities, 10 Security, Academia, Corruption, Government, IO Deeds of War, Military, Peace Intelligence
Thomas Leo Briggs

A wonderful example of what can be done with open source material!

Georgetown students shed light on China’s tunnel system for nuclear weapons

By

Washington Post, November 29, 2011

The Chinese have called it their “Underground Great Wall” — a vast network of tunnels designed to hide their country’s increasingly sophisticated missile and nuclear arsenal.

For the past three years, a small band of obsessively dedicated students at Georgetown University has called it something else: homework.

Read full article.

Phi Beta Iota:  The ability of students to excel in relations to spies is not knew, even with hard targets such as China.  For decades this web site and its antecedents have been saying “Do not send a spy where a schoolboy can go.”  HOWEVER, in this specific case, with China as the target and the Pentagon budget on the line, there is a very high probability that the students are unwitting dupes in an illegal PSYOP being used to create an unethical justification for an ideological and political build-up against China, while protecting the bloated and extraordinarily corrupt Pentagon budget from the mandatory reductions agreed to in relation to the crisis at hand.  Bottom line:  the students have earned an A but the integrity of this endeavor is suspect.

David Brin: Ignorance, Greed & Ideology Killing Us All

Academia, Blog Wisdom, Civil Society, Commerce, Cultural Intelligence, Politics of Science & Science of Politics
David Brin

How Ignorance, Greed and Ideology Are Warping Science and Hurting Democracy

Julian Brookes

Rolling Stone Politics, 15 November 2011

“Whenever the people are well informed” an optimistic Thomas Jefferson wrote, “they can be trusted with their own government.” Sure – but what if the people have no clue? 

Most of the big challenges facing America and the world today – from climate change to disease to population growth – revolve around science and technology. If we – We, the People – are going to make smart decisions on what to do about these problems, we need to have at least a rough understanding of the basic science involved. Problem is, we don't.

As science writer Shawn Lawrence Otto points out in a tough-minded new book, Fool Me Twice: Fighting the Assault on Science in America, too many Americans are either plain ignorant of science or actively hostile to it, or both.

Read more.

DefDog: Law Schools Not Teaching How to Lawyer

04 Education, Academia, Cultural Intelligence
DefDog

This just doesn't apply to lawyers, but most college grads are ill
prepared to enter the work force….

What They Don’t Teach Law Students: Lawyering

New York Times,  November 19, 2011

EXTRACT:

What they did not get, for all that time and money, was much practical training. Law schools have long emphasized the theoretical over the useful, with classes that are often overstuffed with antiquated distinctions, like the variety of property law in post-feudal England. Professors are rewarded for chin-stroking scholarship, like law review articles with titles like “A Future Foretold: Neo-Aristotelian Praise of Postmodern Legal Theory.”

So, for decades, clients have essentially underwritten the training of new lawyers, paying as much as $300 an hour for the time of associates learning on the job. But the downturn in the economy, and long-running efforts to rethink legal fees, have prompted more and more of those clients to send a simple message to law firms: Teach new hires on your own dime.

“The fundamental issue is that law schools are producing people who are not capable of being counselors,” says Jeffrey W. Carr, the general counsel of FMC Technologies, a Houston company that makes oil drilling equipment. “They are lawyers in the sense that they have law degrees, but they aren’t ready to be a provider of services.”

Read full article.

Phi Beta Iota:  The entire US educational system is hosed.  From college students who graduate with no more capability than high school graduates to half century ago, to “professional” degrees that do not teach how to “do” only how to take tests, the disconnect from reality is huge.   While some intelligence studies have emerged, after the pioneering effort of Mercyhurst under Bob Heibel, they do not actually teach the craft of intelligence or how to do holistic analytics or create workable open source information technology support packages — they simply prepare rounded cogs for the secret intelligence world.

See Also:

Education (General) (128)

Education (Universities) (58)