Page 8 of 9 First ... 456789 Last
  1. #78
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  2. # ADS
    Circuit advertisement Planned Attacks ?
    Join Date
    Always
    Location
    Advertising world
    Posts
    Many
     

  3. #79
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    Iranian Hackers Gained Access To ‘Mission Critical’ U.S. Power Plant Blueprints, Report Says
    Dec. 21, 2015 10:04am Jon Street

    SAN JOSE, Calif. (AP) — Security researcher Brian Wallace was on the trail of hackers who had snatched a California university’s housing files when he stumbled into a larger nightmare: Cyberattackers had opened a pathway into the networks running the United States power grid.

    Digital clues pointed to Iranian hackers. And Wallace found that they had already taken passwords, as well as engineering drawings of dozens of power plants, at least one with the title “Mission Critical.” The drawings were so detailed that experts say skilled attackers could have used them, along with other tools and malicious code, to knock out electricity flowing to millions of homes.

    Wallace was astonished. But this breach, The Associated Press has found, was not unique



    This map depicts the electric power grid across the United States. (Image: Argonne National Laboratory)

    About a dozen times in the last decade, sophisticated foreign hackers have gained enough remote access to control the operations networks that keep the lights on, according to top experts who spoke only on condition of anonymity due to the sensitive nature of the subject matter.

    The public almost never learns the details about these types of attacks – they’re rarer but also more intricate and potentially dangerous than data theft. Information about the government’s response to these hacks is often protected and sometimes classified; many are never even reported to the government.

    These intrusions have not caused the kind of cascading blackouts that are feared by the intelligence community. But so many attackers have stowed away in the systems that run the U.S. electric grid that experts say they likely have the capability to strike at will.

    And that’s what worries Wallace and other cybersecurity experts most.

    “If the geopolitical situation changes and Iran wants to target these facilities, if they have this kind of information it will make it a lot easier,” said Robert M. Lee, a former U.S. Air Force cyberwarfare operations officer. “It will also help them stay quiet and stealthy inside.”

    In 2012 and 2013, in well-publicized attacks, Russian hackers successfully sent and received encrypted commands to U.S. public utilities and power generators; some private firms concluded this was an effort to position interlopers to act in the event of a political crisis. And the Department of Homeland Security announced about a year ago that a separate hacking campaign, believed by some private firms to have Russian origins, had injected software with malware that allowed the attackers to spy on U.S. energy companies.

    “You want to be stealth,” said Lillian Ablon, a cybersecurity expert at the RAND Corporation. “That’s the ultimate power, because when you need to do something you are already in place.”

    The hackers have gained access to an aging, outdated power system. Many of the substations and equipment that move power across the U.S. are decrepit and were never built with network security in mind; hooking the plants up to the Internet over the last decade has given hackers new backdoors in. Distant wind farms, home solar panels, smart meters and other networked devices must be remotely monitored and controlled, which opens up the broader system to fresh points of attack.

    Hundreds of contractors sell software and equipment to energy companies, and attackers have successfully used those outside companies as a way to get inside networks tied to the grid.

    Attributing attacks is notoriously tricky. Neither U.S. officials nor cybersecurity experts would or could say if the Islamic Republic of Iran was involved in the attack Wallace discovered involving Calpine Corp., a power producer with 82 plants operating in 18 states and Canada.

    Private firms have alleged other recent hacks of networks and machinery tied to the U.S. power grid were carried out by teams from within Russia and China, some with governmental support.

    Even the Islamic State group is trying to hack American power companies, a top Homeland Security official told industry executives in October.

    Homeland Security spokesman SY Lee said that his agency is coordinating efforts to strengthen grid cybersecurity nationwide and to raise awareness about evolving threats to the electric sector through industry trainings and risk assessments. As Deputy Secretary Alejandro Mayorkas acknowledged in an interview, however, “we are not where we need to be” on cybersecurity.

    That’s partly because the grid is largely privately owned and has entire sections that fall outside federal regulation, which experts argue leaves the industry poorly defended against a growing universe of hackers seeking to access its networks.

    As Deputy Energy Secretary Elizabeth Sherwood Randall said in a speech earlier this year, “If we don’t protect the energy sector, we are putting every other sector of the economy in peril.”
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  4. #80
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    The Calpine Breach

    The AP looked at the vulnerability of the energy grid as part of a yearlong, AP-Associated Press Media Editors examination of the state of the nation’s infrastructure. AP conducted more than 120 interviews and examined dozens of sets of data, government reports and private analyses to gauge whether the industry is prepared to defend against cyberattacks.

    The attack involving Calpine is particularly disturbing because the cyberspies grabbed so much, according to interviews and previously unreported documents.

    Cybersecurity experts say the breach began at least as far back as August 2013, and could still be going on today.

    Calpine spokesman Brett Kerr said the company’s information was stolen from a contractor that does business with Calpine. He said the stolen diagrams and passwords were old – some diagrams dated to 2002 – and presented no threat, though some outside experts disagree.

    Kerr would not say whether the configuration of the power plants’ operations networks – also valuable information – remained the same as when the intrusion occurred, or whether it was possible the attackers still had a foothold.

    According to the AP investigation, the hackers got:

    -User names and passwords that could be used to connect remotely to Calpine’s networks, which were being maintained by a data security company. Even if some of the information was outdated, experts say skilled hackers could have found a way to update the passwords and slip past firewalls to get into the operations network. Eventually, they say, the intruders could shut down generating stations, foul communications networks and possibly cause a blackout near the plants.

    -Detailed engineering drawings of networks and power stations from New York to California – 71 in all – showing the precise location of devices that communicate with gas turbines, boilers and other crucial equipment attackers would need to hack specific plants.

    -Additional diagrams showing how those local plants transmit information back to the company’s virtual cloud, knowledge attackers could use to mask their activity. For example, one map shows how information flows from the Agnews power plant in San Jose, California, near the San Francisco 49ers football stadium, to the company headquarters in Houston.

    Wallace first came across the breach while tracking a new strain of noxious software that had been used to steal student housing files at the University of California, Santa Barbara.

    “I saw a mention in our logs that the attackers stored their malware in some FTP servers online,” said Wallace, who had recently joined the Irvine, Calif.-based cybersecurity firm Cylance, Inc., fresh out of college. “It wasn’t even my job to look into it, but I just thought there had to be something more there.”

    Wallace started digging. Soon, he found the FTP servers, typically used to transfer large numbers of files back and forth across the Internet, and the hackers’ ill-gotten data – a tranche of more than 19,000 stolen files from thousands of computers across the world, including key documents from Calpine.

    Before Wallace could dive into the files, his first priority was to track where the hackers would strike next – and try to stop them.

    He started staying up nights, often jittery on Red Bull, to reverse-engineer malware. He waited to get pinged that the intruders were at it again.

    Months later, Wallace got the alert: From Internet Protocol addresses in Tehran, the hackers had deployed TinyZbot, a Trojan horse-style of software that the attackers used to gain backdoor access to their targets, log their keystrokes and take screen shots of their information. The hacking group, he would find, included members in the Netherlands, Canada, and the United Kingdom.

    The more he followed their trail, the more nervous Wallace got. According to Cylance, the intruders had launched digital offensives that netted information about Pakistan International Airlines, the Mexican oil giant Pemex, the Israel Institute of Technology and Navy Marine Corps Intranet, a legacy network of the U.S. military. None of the four responded to AP’s request for comment.

    Then he discovered evidence of the attackers’ most terrifying heist – a folder containing dozens of engineers’ diagrams of the Calpine power plants.

    According to multiple sources, the drawings contained user names and passwords that an intruder would need to break through a firewall separating Calpine’s communications and operations networks, then move around in the network where the turbines are controlled. The schematics also displayed the locations of devices inside the plants’ process control networks that receive information from power-generating equipment. With those details, experts say skilled hackers could have penetrated the operations network and eventually shut down generating stations, possibly causing a blackout.

    Cylance researchers said the intruders stored their stolen goods on seven unencrypted FTP servers requiring no authentication to access details about Calpine’s plants. Jumbled in the folders was code that could be used to spread malware to other companies without being traced back to the attackers’ computers, as well as handcrafted software designed to mask that the Internet Protocol addresses they were using were in Iran.

    Circumstantial evidence such as snippets of Persian comments in the code helped investigators conclude that Iran was the source of the attacks.

    Calpine didn’t know its information had been compromised until it was informed by Cylance, Kerr said.

    Iranian U.N. Mission spokesman Hamid Babaei did not return calls or address questions emailed by AP.

    Cylance notified the FBI, which warned the U.S. energy sector in an unclassified bulletin last December that a group using Iran-based IP addresses had targeted the industry.

    Whether there was any connection between the Iranian government and the individual hackers who Wallace traced – with the usernames parviz, Alireza, Kaj, Salman Ghazikhani and Bahman Mohebbi – is unclear.
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  5. #81
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    A ‘lucrative’ target

    Cyberattacks designed to steal information are steadily growing in scope and frequency; there have been high-profile hacks of Target, eBay and federal targets such as the U.S. Office of Personnel Management. But assaults on the power grid and other critical infrastructure aim to go a step further.

    Trained, well-funded adversaries can gain control of physical assets – power plants, substations and transmission equipment. With extensive control, they could knock out the electricity vital to daily life and the economy, and endanger the flow of power to mass transportation, military installations and home refrigerators.

    In the summer of 2014, a hacker of unknown origin, using masking software called Tor, took over the controls of a large utility’s wind farm, according to a former industry compliance official who reviewed a report that was scrubbed of the utility’s name. The hacker then changed an important setting, called the automatic voltage regulator, from “automatic” to “manual,” he said.

    That seemingly simple change to any power plant can damage the generator and destabilize parts of the nearby grid if the plant’s output is high enough.

    Last year, Homeland Security released several maps that showed a virtual hit list of critical infrastructure, including two substations in the San Francisco Bay area, water and gas pipelines and a refinery. And according to a previously reported study by the Federal Energy Regulatory Commission, a coordinated attack on just nine critical power stations could cause a coast-to-coast blackout that could last months, far longer than the one that plunged the Northeast into darkness in 2003.

    “The grid is a tough target, but a lucrative target,” said Keith Alexander, the former director of the National Security Agency who now runs a cybersecurity firm. The number of sophisticated attacks is growing, he said. “There is a constant, steady upbeat. I see a rising tide.”

    No one claims that it would be easy to bring down the grid. To circumvent companies’ security, adversaries must understand the networks well enough to write code that can communicate with tiny computers that control generators and other major equipment. Even then, it’s difficult to cause a widespread blackout because the grid is designed to keep electricity flowing when equipment or lines go down, an almost daily occurrence that customers never see.

    Because it would take such expertise to plunge a city or region into darkness, some say threats to the grid are overstated – in particular, by those who get paid to help companies protect their networks. Still, even those who said the risks of cyber threats can be exaggerated agree it is possible for cyberattackers to cause a large-scale blackout.

    And nearly everyone agrees that there are weaknesses that open the door to malefactors.

    Traditional central power stations and transmission systems include equipment that is decades old and physically unable to handle electronic threats. Some run on machines that use software that is so old that malware protections don’t exist, such as Windows ’95 and FORTRAN, a programming language developed in the 1950s.

    At the Tennessee Valley Authority, a corporation owned by the federal government that powers 9 million households in the southeastern U.S., a former operations security expert said in recent years he saw passwords for some key operating systems stored on sticky notes.

    “Some of the control systems boot off of floppy disks,” said Patrick Miller, who has evaluated hydroelectric dam cybersecurity for the U.S. Bureau of Reclamation and Army Corps of Engineers. “Some dams have modeling systems that run on something that looks like a washing machine hooked up to tape spools. It looks like the early NASA stuff that went to the moon.”

    The rush to tie smart meters, home programmable thermostats and other smart appliances to the grid also is causing fresh vulnerabilities.

    About 45 percent of homes in the U.S. are hooked up to a smart meter, which measures electricity usage and shares information with the grid. The grid uses that information to adjust output or limit power deliveries to customers during peak hours.

    Those meters are relatively simple by design, mostly to keep their cost low, but their security is flimsy. Some can be hacked by plugging in an adapter that costs $30 on eBay, researchers say.

    FERC recently raised concerns about another area that is not covered by federal cybersecurity rules: contractors that sell energy companies software and equipment. As is evident from the Calpine incident, attackers have used outside companies to pull off hacks against energy companies.

    “We’ve got these vulnerable systems out there that are old and never had security built into them, and now we’re exposing them to a wider audience,” said Justin Lowe, a utility cybersecurity expert at PA Consulting Group.

    “That wider audience is getting much more hostile.”

    Defending the grid

    The full extent of the attacks on the grid is not public knowledge. A Freedom of Information Act request by the AP for information regarding any FBI investigations of such hacks was not fulfilled. The Department of Justice said that agency kept no record of how often any such cases had been prosecuted.

    The North American Electric Reliability Corporation, which oversees the reliability of the electrical sector, collects information about cyber incidents involving utilities and other users, owners, and operators of the bulk power system – but it is scrubbed of identifying information and details are confidential and exempt from disclosure under FOIA.

    Authorities say they take the threat seriously. In response to a FOIA request, Homeland Security said it had helped more than 100 energy and chemical companies improve their cyber defenses, and held both classified and unclassified briefings in June 2013 and late 2014 on threats to companies associated with power grid operations.

    A small DHS team compiles statistics about hacks and vulnerabilities on control systems powering the grid and other public infrastructure, and responds to some attacks. But former federal employees who spoke on the condition of anonymity because the information was sensitive said government red tape kept the team from thoroughly responding to the smaller municipal and rural utilities that most needed their help, and that the statistics overstated the agency’s grasp of the problem.

    The companies themselves say they are vigilant – though they caution no fortifications are foolproof.

    Early this year, an operations supervisor in Virginia for a subsidiary of American Electric Power – the nation’s largest power grid operator, with operations in 38 states – opened a personal email on a company laptop and unwittingly downloaded a piece of malware called CryptoLocker.

    Known as “ransomware,” CryptoLocker is a relatively common type of malware that reaches to outside servers, usually overseas, and downloads encryption instructions that scramble a computer’s contents, making them inaccessible to anyone without a specific “key.” The malware then moves through a computer – and computer network – and encrypts all the files it can, keeping users from accessing anything.

    In exchange for a fee, the hackers provide the victim a key that allows the files to be unlocked.

    Members of AEP’s cyber-security team – housed in the company’s Columbus, Ohio, headquarters behind an unmarked door that unlocks with a fingerprint scanner – saw the strange network behavior as soon as it started.

    “When you see this (code) attempting to hit thousands of systems outside of the AEP network, that’s a ‘holy crap’ moment,” said Sean Parcel, AEP’s lead cyberinvestigator.

    Had CryptoLocker wormed its way into AEP’s system, the business and operations networks could have locked up, experts say.

    But Parcel said AEP’s cyberteam already had blocked the foreign addresses that the malware needed to reach to start encrypting files, part of a policy of systematically blocking hundreds of Internet Protocol addresses each week to keep employees from inadvertently downloading malicious code.

    AEP said the team remotely isolated and erased the supervisor’s computer before its systems were affected.

    Like most big utilities, AEP’s power plants, substations and other vital equipment are managed by a network that is separated from the company’s business software with layers of authentication, and is not accessible via the Internet. Creating that separation, and making sure that separation is maintained, is among the most important things utilities can do to protect the grid’s physical assets.

    But cybersecurity experts say the protective gaps between computer systems that manage utilities’ business operations and machines that manage their grids are not always as wide or as unbridgeable as utilities say they are. And even the utilities’ own experts, who maintain it would be extraordinarily difficult for a hacker to knock out power to customers, admit there is always a way in.

    “If the motivation is high enough on the attacker side, and they have funding to accomplish their mission,” Parcel said, “they will find a way.”

    http://www.theblaze.com/stories/2015...t-in-the-dark/
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  6. #82
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    Iraqi Refugee Arrested For Alleged Terror Plot
    http://www.cbsnews.com/live/video/ir...d-terror-plot/

    Terrorism-related arrests made in Sacramento, Houston
    By Don Thompson Associated Press
    Posted: 01/07/2016 05:57:11 PM PST3 Comments | Updated: about 4 hours ago


    SACRAMENTO, Calif. -- Authorities said Thursday that two people have been arrested on terrorism-related charges in California and Texas, including a refugee from Iraq who is charged with lying to federal investigators about his travels to Syria.

    A criminal complaint unsealed Thursday accuses Aws Mohammed Younis Al-Jayab, 23, of traveling to Syria to fight alongside terrorist organizations and lying to investigators about it.

    The complaint said Al-Jayab, a Palestinian born in Iraq who came to the United States as an Iraqi refugee in October 2012, communicated on social media about his intent to return to Syria to fight for terrorist organizations, discussing his previous experience fighting against the regime in Syria. When he was interviewed by citizenship officials, he lied about his travels and
    ties, the complaint alleges.

    Ben Galloway of the federal defender's office is the suspect's attorney. He did not immediately return telephone and emailed messages Thursday.

    The U.S. Attorney's Office in Sacramento said Al-Jayab was arrested Thursday morning in Sacramento. Meanwhile, the governor and lieutenant governor of Texas praised the arrest in Houston of what Lt. Gov. Dan Patrick called a terror suspect.

    "Based on the facts, as we know them, today's action may have prevented a catastrophic terror related event in the making and saved countless lives," Patrick said in a statement.

    Federal officials in Houston did not immediately provide more details. Federal officials say a separate arrest in Milwaukee that grew out of the Sacramento investigation is not related to national security


    http://www.mercurynews.com/nation-wo...amento-houston
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  7. The Following User Says Thank You to Jolie Rouge For This Useful Post:

    boopster (01-07-2016)

  8. #83

    Join Date
    Apr 2007
    Posts
    2,400
    Thanks
    849
    Thanked 444 Times in 312 Posts
    is that one of O's refugees that he has hailed as innocent and mocked the gop for being afraid of widows and orphans? perhaps this refugee should be allowed to live with the o's......

  9. The Following User Says Thank You to boopster For This Useful Post:

    Jolie Rouge (01-07-2016)

  10. #84
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    ISIS supporter tries to shoot up church in this US city,
    but look what his FATHER did…


    Written by Michelle Jesse, Associate Editor on February 6, 2016


    The FBI has just revealed another chilling plot of ISIS-inspired terrorism within our own borders.

    Khalil Abu-Rayyan was allegedly talking planning to shoot up a Detroit, Michigan church with nearly 6,000 parishioners, but was foiled by his own father.

    Via Fox News:

    A Michigan man allegedly threatened to kill police and churchgoers to show support for Islamic State, according to a federal criminal complaint unsealed on Thursday.

    Khalil Abu-Rayyan, 21, of Dearborn Heights, was allegedly talking to an undercover FBI agent about his support for the terror group and how he wanted to shoot up a church that has nearly 6,000 parishioners, according to the Detroit Free Press.

    The newspaper, citing the affidavit, reported Abu-Rayyan planned to shoot up the church one day, but he was stopped by his father.

    “I tried to shoot up a church one day. I don’t know the name of it, but it’s close to my job,” Abu-Rayyan told the agent, according to the complaint. “It’s one of the biggest ones in Detroit. Ya. I had it planned out. I brought a bunch of bullets. I practice a lot with it. But my dad searched my car one day and he found everything. He found the gun and the bullets and a mask.”

    Another chilling detail of this foiled plot is the reason why Abu-Rayyan had chosen a church for his target: because it was an easy target, in part, because “people are not allowed to carry guns in church.”

    The man had wanted to shoot up the church because it would’ve been an easy target, the complaint said.

    “It’s easy and a lot of people go there. Plus people are not allowed to carry guns in church. Plus, it would make the news. I regret not doing it. If I can’t do jihad in the Middle East, I would do my jihad over here.”
    This chilling detail brings to mind one church shooting in which parishioner saved untold lives — and reminds us of the fallacy of so-called “gun-free zones.”

    The agency had been investigated since May 2015. Agents were tracking him through social media, phone calls and surveillance. The FBI said in the complaint he had two Twitter accounts on which he expressed support for ISIS, according to the Free Press.

    Abu-Rayyan has not received any terror charges. According to Click On Detroit, he’s being held on gun and drug charges. He was stopped on Oct. 7, 205 for speeding when a Detroit police officer found a gun, sleeping pills and marijuana in his car.

    He’s scheduled for a hearing on Monday.

    Thankfully, this particular plot was averted and the suspect is in custody. But you have to wonder, how many others are out there plotting atrocities in our U.S. cities? Moreover, how many lives might be lost without armed citizens who can help fend off such a plot being carried out?

    http://www.allenbwest.com/2016/02/is...is-father-did/
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  11. The Following User Says Thank You to Jolie Rouge For This Useful Post:

    boopster (02-07-2016)

  12. #85
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    Mohammed Attacked Ohio Christian Restaurant Flying Israeli Flag w/Machete
    February 12, 2016 - Daniel Greenfield

    Why would a Somali Muslim named Mohammed Barry attack Americans with a machete? It must have been the lack of jobs or maybe global warming. Or airborne PTSD. Or aliens. Can't be Islam. http://www.10tv.com/content/stories/...-columbus.html

    “He looked straight at me, but he went over to the booths and just started going down the booths. It all seemed to happen in slow motion,” the waitress said.

    Karen Bass who was in the restaurant said she had only been inside about half an hour before the man started attacking. “He came to each table and just started hitting them,” she said. “There were tables and chairs overturned there was a man on the floor bleeding there was blood on the floor.”

    Bass said it was like a scene from a horror film down to her stumbling escape.

    “I fell like five times. My legs felt like jelly. I just thought he was going to come behind me and slash me up.”

    Witnesses say about 20 people, including two babies, were inside at the time of the attack.
    It's a mystery alright. But the upside of bringing lots of Somali Muslims to America is that we get to be enriched with the occasional Christmas tree bombing plot or machete attack.

    Nazareth Restaurant has been in business for two decades. The restaurant has a community reputation for its multiculturalism.

    It is too early to say whether there was any political motive to this attack, but it struck a restaurant known for its embrace of both Israeli, Jewish and Arab Muslim culture.

    Inside the restaurant, guests are greeted by two things near the entrance: A small Israeli flag and a Arabic phrase of greeting: it read "Ahlan Wa Shalan" which roughly translates to "You are my family, take it easy."

    No doubt that had nothing to do with it. The owner appears to be an Israeli Arab Christian. There are reports that the killer asked where he was from before the attack and he answered, Israel. http://www.jpost.com/Diaspora/Machet...Israeli-444718


    The incident happened at the Nazareth Restaurant & Deli on North Hamilton Road just after 6:00 p.m. on Thursday.

    Police said the man walked into the restaurant, had a conversation with an employee and then left. He returned about a half hour later. That's when police said he approached a man and a woman who were sitting just inside the door at a booth and started the attack.

    After the attacks, the suspect fled in his car southwest toward the Easton area. Officers attempted a PIT maneuver during the escape, but were unsuccessful. A short time later, a successful attempt was made, and the suspect slammed into a curb near Montclair Drive.

    As officers converged on the suspect, he exited the vehicle with a knife in one hand and a machete in the other, according to police. After unsuccessfully firing a taser at the man, he lunged across the hood at the officers and was shot dead.
    Another job for #BlackLivesMatter. "We demand answers why our child Mohammed Barry was shot!" I'm sure the DOJ and Obama will be investigating the local police shortly.

    http://www.frontpagemag.com/point/26...iel-greenfield
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  13. The Following User Says Thank You to Jolie Rouge For This Useful Post:

    boopster (02-12-2016)

  14. #86

    Join Date
    Apr 2007
    Posts
    2,400
    Thanks
    849
    Thanked 444 Times in 312 Posts
    if the police officer was white, i would not be surprised to see the doj investigate

  15. #87
    Jolie Rouge's Avatar
    Join Date
    Oct 2000
    Location
    Lan astaslem !
    Posts
    60,656
    Thanks
    2,750
    Thanked 5,510 Times in 3,654 Posts
    Portland-bound combat missiles found on plane
    The plane landed in Serbia from Lebanon

    The Associated Press - Published: March 13, 2016


    Video at http://koin.com/2016/03/13/serbia-po...ound-on-plane/

    BELGRADE, Serbia (AP) — Serbia’s authorities are investigating reports that a cargo package bound for the U.S. containing two missiles with explosive warheads was found on a passenger flight from Lebanon to Serbia.

    N1 television said the package with two guided armor-piercing missiles was discovered Saturday by a sniffer dog after an Air Serbia flight from Beirut landed at Belgrade airport.

    Serbian media say documents listed the final destination for the AGM-114 Hellfire missiles as Portland, Oregon. The American-made projectiles can be fired from air, sea or ground platforms.

    N1 reported Sunday that Air Serbia is helping in the investigation. The Serbian flag carrier says “security and safety are the main priorities for Air Serbia.”

    In a statement to KOIN 6 News, Jennifer Adams with the Portland office of the FBI said, “The FBI is aware of the report and is looking into it. No further information is available at this time.”

    Scott Winegar, the director of Homeland Security Education at Concordia University, told KOIN 6 News these have been heavily used by drones to fire on targets over the past few years.

    He said the investigation as to where these came from needs to start with the Defense Department.

    “The other organizations that we have in the US are not responsible for distributing Hellfire missiles. That’s a Department of Defense asset so, wherever it came from, it would have to have come through the Department of Defense’s logistical chain,” Winegar said. “If it came from the US, if it came from our allies, that’s going to muddy the waters.”

    http://koin.com/2016/03/13/serbia-po...ound-on-plane/



    Were these among the armament "lost" at Benghazi ??
    Laissez les bon temps rouler! Going to church doesn't make you a Christian any more than standing in a garage makes you a car.** a 4 day work week & sex slaves ~ I say Tyt for PRESIDENT! Not to be taken internally, literally or seriously ....Suki ebaynni IS THAT BETTER ?

  16. The Following User Says Thank You to Jolie Rouge For This Useful Post:

    boopster (03-13-2016)

  17. #88

    Join Date
    Apr 2007
    Posts
    2,400
    Thanks
    849
    Thanked 444 Times in 312 Posts
    any word from the wh regarding this? the dysfunctionality of this admin is getting more and more obvious

    coming from lebanon - lebanon is controlled by hezbollah which is a terrorist org supported by iran - obamas newest friend, ally, cohort or whatever you want to call them. the same iran that never signed this controversial agreement brokered by obama's buddy kerry which gives to iran and iran gives nothing in return...that shoots ballistic missiles, chants death to america, tortures americans, humiliates the US etc.
    Last edited by boopster; 03-13-2016 at 09:44 PM.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Log in

Log in