Thursday, June 28, 2012

Dearborn No-Go Zone: Where Islam Rules and Christians Are Stoned

Have you seen this video yet?  It's going absolutely viral on the Internet - can't keep up w/the numbers, now over 250,000 - Christian street preachers were stoned on the streets of Dearborn, MI on Father's Day while police directly and repeatedly refused protection to them.


See here:


Dearborn No-Go Zone: Where Islam Rules and Christians Are Stoned

Thu, June 28, 2012


Clare Lopez    

By now, close to 200,000 viewers have seen the video (see below) of the Christian street preachers being assaulted on the streets of Dearborn, Michigan. They were walking in public areas of the annual Dearborn Arab Festival on Sunday 17 June 2012 (Father's Day), carrying placards and wearing T-shirts bearing mild statements of their belief in Jesus Christ.

An unruly crowd of many dozens of Arab Muslim Festival-goers, both men and women, old and young, and including children became verbally abusive and then physically violent with the Christians, pushing, shoving, and hurling objects at them that included bottles, eggs, and rocks.

Clearly visible on the video are images of dozens of these projectiles that came flying at the Christians, whose grunts of pain at being struck are as clearly audible as the shrieking mob's chants of "Allahu Akbar."

Repeatedly, the Christians asked for protection from Wayne County Sheriff's Department (WCSD) officers who were present at the melee and, repeatedly, they were denied that protection. WCSD Deputy Chief Mike Jaafar, whose implausible excuses for inaction were caught in their entirety on the video, steadfastly refused to provide even one or two law enforcement officers to defend American citizens who were clearly in imminent danger of physical injury.

Assault and battery are the least of the possibly applicable charges that could have been and ought to be brought against numerous individuals among that mob; dereliction of duty and misprision of assault and battery are among the potential charges that come to mind for Deputy Chief Jaafar and Ms. Ursula K. Henry, Director of Legal Affairs for the WCSD, who was also present. This was as clear-cut an example of law enforcement failure to defend the First Amendment rights of American citizens as will ever exist.

This incident crystallized in a single afternoon what happens when a sovereign nation relinquishes legal control of portions of its territory. So-called "No Go Zones" have become ominously commonplace across Europe: These are places that are effectively off-limits not only to non-Muslims but to the law enforcement and security forces of the country as well. In France, they go by the anodyne name of "Zones Urbaines Sensibles" (ZUS).

By 2006, there were already over 750 of them and they were helpfully published on the internet, complete with town, neighborhood and street information. In Britain, where Islamic law has been enforceable nationwide since 2008, there are dozens of No Go Zones, including all-Muslim enclaves in the London boroughs of Tower Hamlets, Waltham Forest and Bradford where "Shariah Zone" stickers went up on utility poles and lamp posts in July 2011.

A group called "Muslims Against the Crusades" openly campaigns for the establishment of autonomous Muslim enclaves ruled entirely by Islamic law outside the reach of the British legal system. In Belgium, Germany, Italy, Netherlands and Sweden, the governments have allowed unassimilated Muslim immigrants to carve out sharia law zones in numerous cities where local law no longer is enforced, even for violent crimes such as murder.

As Daniel Pipes has noted, the most accurate name for such places is Dar al-Islam, meaning a place governed by Islamic law (sharia). In this case, the No Go Zone, perhaps America's first, is located in the 45% Muslim city of Dearborn, Michigan. The pattern of behavior seen on this video at the Arab Festival and in Dearborn was spontaneous in one sense, but also follows a plan, one that is well-known to the intelligence and security services of the Western world.

There is a Muslim Brotherhood document, dubbed "The Project," that was discovered in a November 2001 raid by Swiss authorities on a villa in Campione, Switzerland, that was owned by Youssef Nada, director of the Al-Taqwa Bank of Lugano and one of the top international leaders of the Muslim Brotherhood for more than 50 years.

The 14-page plan seized at Nada's villa was written in Arabic and dated December 1, 1982. It is nothing less than the Muslim Brotherhood's 12-point strategy paper for the establishment of "an Islamic government on earth."

By contrast with the spectacular, violent attacks mounted by jihadist groups like al-Qa'eda, the Muslim Brotherhood plan is flexible, multi-phased and long-term in concept. Immigration and societal infiltration are described as key components of a "cultural invasion" of the West and deception and propaganda are emphasized to ensure the authorities don't catch on too quickly.

The success of Brotherhood infiltration and influence operations at the top levels of U.S. national security, incredibly, has delivered what used to be the leader of the free world to open support of Brotherhood takeovers in country after country in the Middle East.

Now, with the stoning of Christians in broad daylight in Dearborn while local law enforcement officers stood by refusing to protect them, "The Project" is coming to America. No Go Zones are territories where American constitutional law no longer is enforced.

In the case of Dearborn, the legal system of sharia, in effect, was enforced by default by officers who are sworn to defend American law, not Islamic law. Sharia law says that any speech a Muslim finds offensive is slanderous, a crime that can be punishable by death under sharia.

In this case, the Christians were "only" pelted with stones. If the U.S. permits Muslim No Go Zones to exist or proliferate across this country, our cities soon could resemble not just Brussels, Malmo or Rotterdam, but Cairo and Gaza.


Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

Re: INTENSE: Death in Combat (Video)

our God-Blessed military
speculation noted

For over 40 years, there has been a war in Colombia between FARC
rebels and
the Colombian Army. The war has, for all intents and purposes, turned
a "War on Drugs"--financed by the USA.
US financing terrorism is nothing new or something to be proud of.

their country ... their problem

On Jun 27, 11:02 pm, Travis <> wrote:
> **
>            New post on **
> <>  INTENSE: Death in Combat
> (Video)<>by
> Sard <>
> You know, our God-Blessed military has been involved in over 10 years of
> continuous combat operations, while Obama--the C-n-C--is more worried about
> "gays in the military"--no offense "gays." BTW, gay-pride
> oreos<>are
> now available (lots of creamy filling ...
> **snicker**).
> So, I thought I'd post a riveting video about REAL combat. See, soldiers
> have guns--they should be well-trained--but there is NO guarantee.
> The following video is over 45 minutes, but I guarantee, if you give a f*ck
> about human life, it should "move" you.
> For over 40 years, there has been a war in Colombia between FARC rebels and
> the Colombian Army. The war has, for all intents and purposes, turned into
> a "War on Drugs"--financed by the USA.  For crying out loud, I could not
> think of a more nebulous strategy than a "War on Drugs"--which will never
> end, in my opinion.
> Anyway, I digress ... in the following video you will see a French
> journalist embedded with Colombian Army commandos. He was captured and was
> shot in the arm during the engagement with FARC forces. The Columbian Army
> sergeant assigned to protect said journalist was KIA in the field--all
> captured on film.
> Remember, our warriors who deal with this sort of terror and fear EVERY
> DAY. And, once again, for what?
> Don't get me wrong! I want us to ANNIHILATE and CRUSH our enemy, but when
> one has NO strategy, and NO clear definition of who your enemy is, it just
> goes on and on and on and on and on and on and and on ...
> <>
> *Related:*
> January, 2002: FARC Daisy Chain IED takes out Colombian Army Forces
> (WARNING: Graphic)
>  *Sard <>* | June 27, 2012 at 8:49
> pm | Categories: American Culture <>,
> American Patriotism <>, American
> Sovereignty <>,
> Conservatism<>,
> Foreign Policy <>,
> History<>,
> National Defense <>, National
> Security <>,
> Terrorism<>,
> Totalitarianism <>, U.S.
> Military<>,
> War <> | URL:
>   Comment<>
>    See all comments<>
>   Unsubscribe or change your email settings at Manage
> Subscriptions<>.
> *Trouble clicking?* Copy and paste this URL into your browser:

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see

* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

Re: SCOTUS Rules on Obamacare: It’s a Cook Book!!!

and you expected what from 3 jews and 6 catholics?

socialism is an integral part of their religious beliefs.

Christian socialism is a socialist ideology that regards capitalism as
a faith or ideology to be rooted in the mortal sin of avarice and
claim it is a form of mammon worship. Christian socialists identify
the cause of inequality to be associated with greed that they
associate with capitalism.

Jews have a rich history of involvement in socialism, Marxism, and
Western liberalism. Many well-known figures "on the left" have been of
Jews, for instance, Karl Marx, Moses Hess, Herbert Marcuse, Murray
Bookchin, Saul Alinsky, Tristan Tzara, Leon Trotsky, Leon Blum, Judith
Butler, Noam Chomsky, Eric Hobsbawm, Harold Laski, Betty Friedan,
Abbie Hoffman, or Howard Zinn.
A range of left-wing values vis-à-vis social justice can be traced to
Jewish religious texts, including the Tanakh and later texts, which
include a strong endorsement of hospitality to "the stranger" and the
principle of redistribution of wealth in the Biblical idea of Jubilee
— as well as a tradition of challenging authority, as exemplified by
the Biblical Prophets.

On Jun 28, 9:28 am, Travis <> wrote:
> **
>            New post on *Doctor Bulldog & Ronin*
> <>  SCOTUS Rules on
> Obamacare: It's a Cook
> Book!!!<>by
> doctorbulldog <>
> My first thought was, anyone who was taught Constitutional law by Barack
> Obama while in college should demand a refund! My second though was, a 5-4
> ruling is pathetic when it is so clear that Obamacare was highly
> unconstitutional.   Just furthers my resolve to get all the commies out of
> office before another Supreme [...]
> Read more of this
> post<>
>  *doctorbulldog
> <>*| 28 June,
> 2012 at 8:24 am | Categories: Obama
> Sucks <>,
> politics<>,
> Supreme Court <> | URL:
>   Comment<>
>    See all comments<>
>   Unsubscribe or change your email settings at Manage
> Subscriptions<>.
> *Trouble clicking?* Copy and paste this URL into your browser:
>     Thanks for flying with <>

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see

* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

Supreme Ct upholds Obamacare’s Individual Mandate

New post on Fellowship of the Minds

Supreme Ct upholds Obamacare's Individual Mandate

by Dr. Eowyn

Briefly, as I have morning chores to do --

The Supreme Court just handed down their ruling on Obamacare. They're upholding the most controversial part of the "health care" law -- individual mandate.

SCOTUS's reasoning is that the Individual Mandate is a tax, and it is within Congress' power to tax (and spend).

This means that if you refuse to get health care coverage, the IRS can come after you and you'll be subject to a fine, if not imprisonment.

However, being a tax, this also means that the Individual Mandate can be challenged in Congress, as it is Congress that has the Constitutional power over tax and spending.

So, in short, before I find out about the details of SCOTUS' ruling, Obamacare will continue to be litigated and it will just drag on forever.

Thanks, Supreme Court justices, for nothing.


Dr. Eowyn | June 28, 2012 at 7:33 am | Categories: Congress, Constitution, Health Care, United States, US Presidents | URL:

Comment    See all comments

Unsubscribe or change your email settings at Manage Subscriptions.

Trouble clicking? Copy and paste this URL into your browser:

Thanks for flying with

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

SCOTUS Rules on Obamacare: It’s a Cook Book!!!

New post on Doctor Bulldog & Ronin

SCOTUS Rules on Obamacare: It's a Cook Book!!!

by doctorbulldog

My first thought was, anyone who was taught Constitutional law by Barack Obama while in college should demand a refund! My second though was, a 5-4 ruling is pathetic when it is so clear that Obamacare was highly unconstitutional.   Just furthers my resolve to get all the commies out of office before another Supreme [...]

Read more of this post

doctorbulldog | 28 June, 2012 at 8:24 am | Categories: Obama Sucks, politics, Supreme Court | URL:

Comment    See all comments

Unsubscribe or change your email settings at Manage Subscriptions.

Trouble clicking? Copy and paste this URL into your browser:

Thanks for flying with

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

We’re Hosed As A Country!

New post on Fellowship of the Minds

We're Hosed As A Country!

by catscanner150

Supreme Court Dumps on the Majority of the United States!

Obama's economic collapse is now complete.

Tom in NC

Comment    See all comments

Unsubscribe or change your email settings at Manage Subscriptions.

Trouble clicking? Copy and paste this URL into your browser:

Thanks for flying with

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

The New Obama Doctrine: A Six-Point Plan for Global War (long)

The New Obama Doctrine, A Six-Point Plan for Global War

Special Ops, Drones, Spy Games, Civilian Soldiers, Proxy Fighters, and Cyber Warfare
By Nick Turse

It looked like a scene out of a Hollywood movie.  In the inky darkness, men in full combat gear, armed with automatic weapons and wearing night-vision goggles, grabbed hold of a thick, woven cable hanging from a MH-47 Chinook helicopter.  Then, in a flash, each "fast-roped" down onto a ship below.  Afterward, "Mike," a Navy SEAL who would not give his last name, bragged to an Army public affairs sergeant that, when they were on their game, the SEALs could put 15 men on a ship this way in 30 seconds or less.

Once on the aft deck, the special ops troops broke into squads and methodically searched the ship as it bobbed in Jinhae Harbor, South Korea.  Below deck and on the bridge, the commandos located several men and trained their weapons on them, but nobody fired a shot.  It was,  after all, a training exercise.

All of those ship-searchers were SEALs, but not all of them were American.  Some were from Naval Special Warfare Group 1 out of Coronado,  California; others hailed from South Korea's Naval Special Brigade.   The drill was part of Foal Eagle 2012, a multinational, joint-service exercise.  It was also a model for—and one small part of—a much publicized U.S. military "pivot" from the Greater Middle East to Asia, a move that includes sending an initial contingent of 250 Marines to Darwin, Australia, basing littoral combat ships in Singapore,  strengthening military ties with Vietnam and India,  staging war games in the Philippines (as well as a drone strike there),  and shifting the majority of the Navy's ships to the Pacific by the end of the decade.

That modest training exercise also reflected another kind of pivot.  The face of American-style war-fighting is once again changing.  Forget full-scale invasions and large-footprint occupations on the Eurasian mainland; instead, think: special operations forces working on their own but also training or fighting beside allied militaries (if not outright proxy armies) in hot spots around the world.  And along with those special ops advisors, trainers, and commandos expect ever more funds and efforts to flow into the militarization of spying and intelligence, the use of drone aircraft, the launching of cyber-attacks, and joint Pentagon operations with increasingly militarized "civilian" government agencies. 

Much of this has been noted in the media, but how it all fits together into what could be called the new global face of empire has escaped attention.  And yet this represents nothing short of a new Obama doctrine, a six-point program for twenty-first-century war, American-style, that the administration is now carefully developing and honing.  Its global scope is already breathtaking, if little recognized, and like Donald Rumsfeld's military lite and David Petraeus's counterinsurgency operations, it is evidently going to have its day in the sun—and like them, it will undoubtedly disappoint in ways that will surprise its creators.

The Blur-ness

For many years, the U.S. military has been talking up and promoting the concept of "jointness."  An Army helicopter landing Navy SEALs on a Korean ship catches some of this ethos at the tactical level.  But the future, it seems, has something else in store.  Think of it as "blur-ness," a kind of organizational version of war-fighting in which a dominant Pentagon fuses its forces with other government agencies—especially the CIA, the State Department, and the Drug Enforcement Administration—in complex, overlapping missions around the globe. 

In 2001, Secretary of Defense Donald Rumsfeld began his "revolution in military affairs," steering the Pentagon toward a military-lite model of high-tech, agile forces.  The concept came to a grim end in Iraq's embattled cities.  A decade later, the last vestiges of its many failures continue to play out in a stalemated war in Afghanistan against a rag-tag minority insurgency that can't be beaten.  In the years since, two secretaries of defense and a new president have presided over another transformation—this one geared toward avoiding ruinous, large-scale land wars which the U.S. has consistently proven unable to win.

Under President Obama, the U.S. has expanded or launched numerous military campaigns—most of them utilizing a mix of the six elements of twenty-first-century American war.  Take the American war in Pakistan—a poster-child for what might now be called the Obama formula, if not doctrine.  Beginning as a highly-circumscribed drone assassination campaign backed by limited cross-border commando raids under the Bush administration, U.S. operations in Pakistan have expanded into something close to a full-scale robotic air war, complemented by cross-border helicopter attacks, CIA-funded "kill teams" of Afghan proxy forces, as well as boots-on-the-ground missions by elite special operations forces, including the SEAL raid that killed Osama bin Laden. 

The CIA has conducted clandestine intelligence and surveillance missions in Pakistan, too, though its role may, in the future, be less important, thanks to Pentagon mission creep.  In April, in fact, Secretary of Defense Leon Panetta announced the creation of a new CIA-like espionage agency within the Pentagon called the Defense Clandestine Service. According to the Washington Post, its aim is to expand "the military's espionage efforts beyond war zones." 

Over the last decade, the very notion of war zones has become remarkably muddled, mirroring the blurring of the missions and activities of the CIA and Pentagon.  Analyzing the new agency and the "broader convergence trend" between Department of Defense and CIA missions, the Post noted that the "blurring is also evident in the organizations' upper ranks. Panetta previously served as CIA director, and that post is currently held by retired four-star Army Gen. David H. Petraeus." 

Not to be outdone, last year the State Department, once the seat of diplomacy, continued on its long march to militarization (and marginalization) when it agreed to pool some of its resources with the Pentagon to create the Global Security Contingency Fund.  That program will allow the Defense Department even greater say in how aid from Washington will flow to proxy forces in places like Yemen and the Horn of Africa.  

One thing is certain: American war-making (along with its spies and its diplomats) is heading ever deeper into "the shadows."  Expect yet more clandestine operations in ever more places with, of course, ever more potential for blowback in the years ahead.

Shedding Light on "the Dark Continent"

One locale likely to see an influx of Pentagon spies in the coming years is Africa.  Under President Obama, operations on the continent have accelerated far beyond the more limited interventions of the Bush years.  Last year's war in Libya; a regional drone campaign with missions run out of airports and bases in Djibouti, Ethiopia, and the Indian Ocean archipelago nation of Seychelles; a flotilla of 30 ships in that ocean supporting regional operations; a multi-pronged military and CIA campaign against militants in Somalia, including intelligence operations, training for Somali agents, secret prisons, helicopter attacks, and U.S. commando raids; a massive influx of cash for counterterrorism operations across East Africa; a possible old-fashioned air war, carried out on the sly in the region using manned aircraft; tens of millions of dollars in arms for allied mercenaries and African troops; and a special ops expeditionary force (bolstered by State Department experts) dispatched to help capture or kill Lord's Resistance Army leader Joseph Kony and his senior commanders, operating in Uganda, South Sudan, the Democratic Republic of the Congo, and the Central African Republic (where U.S. Special Forces now have a new base) only begins to scratch the surface of Washington's fast-expanding plans and activities in the region.

Even less well known are other U.S. military efforts designed to train African forces for operations now considered integral to American interests on the continent.  These include, for example, a mission by elite Force Recon Marines from the Special Purpose Marine Air Ground Task Force 12 (SPMAGTF-12) to train soldiers from the Uganda People's Defense Force, which supplies the majority of troops to the African Union Mission in Somalia.

Earlier this year, Marines from SPMAGTF-12 also trained soldiers from the Burundi National Defense Force, the second-largest contingent in Somalia; sent trainers into Djibouti (where the U.S. already maintains a major Horn of Africa base at Camp Lemonier); and traveled to Liberia where they focused on teaching riot-control techniques to Liberia's military as part of an otherwise State Department spearheaded effort to rebuild that force.

The U.S. is also conducting counterterrorism training and equipping militaries in Algeria, Burkina Faso, Chad, Mauritania, Niger, and Tunisia.  In addition, U.S. Africa Command (Africom) has 14 major joint-training exercises planned for 2012, including operations in Morocco, Cameroon, Gabon, Botswana, South Africa, Lesotho, Senegal, and what may become the Pakistan of Africa, Nigeria. 

Even this, however, doesn't encompass the full breadth of U.S. training and advising missions in Africa.  To take an example not on Africom's list, this spring the U.S. brought together 11 nations, including Cote d'Ivoire, The Gambia, Liberia, Mauritania, and Sierra Leone to take part in a maritime training exercise code-named Saharan Express 2012.

Back in the Backyard

Since its founding, the United States has often meddled close to home, treating the Caribbean as its private lake and intervening at will throughout Latin America.  During the Bush years, with some notable exceptions, Washington's interest in America's "backyard" took a backseat to wars farther from home.  Recently, however, the Obama administration has been ramping up operations south of the border using its new formula.  This has meant Pentagon drone missions deep inside Mexico to aid that country's battle against the drug cartels, while CIA agents and civilian operatives from the Department of Defense were dispatched to Mexican military bases to take part in the country's drug war. 

In 2012, the Pentagon has also ramped up its anti-drug operations in Honduras. Working out of Forward Operating Base Mocoron and other remote camps there, the U.S. military is supporting Honduran operations by way of the methods it honed in Iraq and Afghanistan.  In addition, U.S. forces have taken part in joint operations with Honduran troops as part of a training mission dubbed Beyond the Horizon 2012; Green Berets have been assisting Honduran Special Operations forces in anti-smuggling operations; and a Drug Enforcement Administration Foreign-deployed Advisory Support Team, originally created to disrupt the poppy trade in Afghanistan, has joined forces with Honduras's Tactical Response Team, that country's most elite counternarcotics unit.  A glimpse of these operations made the news recently when DEA agents, flying in an American helicopter, were involved in an aerial attack on civilians that killed two men and two pregnant women in the remote Mosquito Coast region.   

Less visible have been U.S. efforts in Guyana, where Special Operation Forces have been training local troops in heliborne air assault techniques.  "This is the first time we have had this type of exercise involving Special Operations Forces of the United States on such a grand scale," Colonel Bruce Lovell of the Guyana Defense Force told a U.S. public affairs official earlier this year.  "It gives us a chance to validate ourselves and see where we are, what are our shortcomings."

The U.S. military has been similarly active elsewhere in Latin America, concluding training exercises in Guatemala, sponsoring "partnership-building" missions in the Dominican Republic, El Salvador, Peru, and Panama, and reaching an agreement to carry out 19 "activities" with the Colombian army over the next year, including joint military exercises.

Still in the Middle of the Middle East

Despite the end of the Iraq and Libyan wars, a coming drawdown of forces in Afghanistan, and copious public announcements about its national security pivot toward Asia, Washington is by no means withdrawing from the Greater Middle East.  In addition to continuing operations in Afghanistan, the U.S. has consistently been at work training allied troops, building up military bases, and brokering weapons sales and arms transfers to despots in the region from Bahrain to Yemen.

In fact, Yemen, like its neighbor, Somalia, across the Gulf of Aden, has become a laboratory for Obama's wars.  There, the U.S. is carrying out its signature new brand of warfare with "black ops" troops like the SEALs and the Army's Delta Force undoubtedly conducting kill/capture missions, while "white" forces like the Green Berets and Rangers are training indigenous troops, and robot planes hunt and kill members of al-Qaeda and its affiliates, possibly assisted by an even more secret contingent of manned aircraft.

The Middle East has also become the somewhat unlikely poster-region for another emerging facet of the Obama doctrine: cyberwar efforts.  In a category-blurring speaking engagement, Secretary of State Hillary Clinton surfaced at the recent Special Operations Forces Industry Conference in Florida where she gave a speech talking up her department's eagerness to join in the new American way of war.  "We need Special Operations Forces who are as comfortable drinking tea with tribal leaders as raiding a terrorist compound,'' she told the crowd. "We also need diplomats and development experts who are up to the job of being your partners."

Clinton then took the opportunity to tout her agency's online efforts, aimed at websites used by al-Qaeda's affiliate in Yemen.  When al-Qaeda recruitment messages appeared on the latter, she said, "our team plastered the same sites with altered versions… that showed the toll al-Qaeda attacks have taken on the Yemeni people."  She further noted that this information-warfare mission was carried out by experts at State's Center for Strategic Counterterrorism Communications with assistance, not surprisingly, from the military and the U.S. Intelligence Community. 

These modest on-line efforts join more potent methods of cyberwar being employed by the Pentagon and the CIA, including the recently revealed "Olympic Games," a program of sophisticated attacks on computers in Iran's nuclear enrichment facilities engineered and unleashed by the National Security Agency (NSA) and Unit 8200, Israeli's equivalent of the NSA.  As with other facets of the new way of war, these efforts were begun under the Bush administration but significantly accelerated under the current president, who became the first American commander-in-chief to order sustained cyberattacks designed to cripple another country's infrastructure.

From Brushfires to Wildfires

Across the globe from Central and South America to Africa, the Middle East, and Asia, the Obama administration is working out its formula for a new American way of war.  In its pursuit, the Pentagon and its increasingly militarized government partners are drawing on everything from classic precepts of colonial warfare to the latest technologies.

The United States is an imperial power chastened by more than 10 years of failed, heavy-footprint wars.  It is hobbled by a hollowing-out economy, and inundated with hundreds of thousands of recent veterans—a staggering 45% of the troops who fought in Afghanistan and Iraq—suffering from service-related disabilities who will require ever more expensive care.  No wonder the current combination of special ops, drones, spy games, civilian soldiers, cyberwarfare, and proxy fighters sounds like a safer, saner brand of war-fighting.  At first blush, it may even look like a panacea for America's national security ills.  In reality, it may be anything but. 

The new light-footprint Obama doctrine actually seems to be making war an ever more attractive and seemingly easy option—a point emphasized recently by former Chairman of the Joint Chiefs of Staff General Peter Pace.  "I worry about speed making it too easy to employ force," said Pace when asked about recent efforts to make it simpler to deploy Special Operations Forces abroad.  "I worry about speed making it too easy to take the easy answer—let's go whack them with special operations—as opposed to perhaps a more laborious answer for perhaps a better long-term solution."

As a result, the new American way of war holds great potential for unforeseen entanglements and serial blowback.  Starting or fanning brushfire wars on several continents could lead to raging wildfires that spread unpredictably and prove difficult, if not impossible, to quench. 

By their very nature, small military engagements tend to get larger, and wars tend to spread beyond borders.  By definition, military action tends to have unforeseen consequences.  Those who doubt this need only look back to 2001, when three low-tech attacks on a single day set in motion a decade-plus of war that has spread across the globe.  The response to that one day began with a war in Afghanistan, that spread to Pakistan, detoured to Iraq, popped up in Somalia and Yemen, and so on.  Today, veterans of those Ur-interventions find themselves trying to replicate their dubious successes in places like Mexico and Honduras, the Central Africa Republic and the Congo.   

History demonstrates that the U.S. is not very good at winning wars, having gone without victory in any major conflict since 1945.  Smaller interventions have been a mixed bag with modest victories in places like Panama and Grenada and ignominious outcomes in Lebanon (in the 1980s) and Somalia (in the 1990s), to name a few. 

The trouble is, it's hard to tell what an intervention will grow up to be—until it's too late.  While they followed different paths, Vietnam, Afghanistan, and Iraq all began relatively small, before growing large and ruinous.  Already, the outlook for the new Obama doctrine seems far from rosy, despite the good press it's getting inside Washington's Beltway. 

What looks today like a formula for easy power projection that will further U.S. imperial interests on the cheap could soon prove to be an unmitigated disaster—one that likely won't be apparent until it's too late. 

To stay on top of important articles like these, sign up to receive the latest updates from

SOURCE: Tomgram: Nick Turse, The Changing Face of Empire | TomDispatch


Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.

: 51 Free Tools to Stay Informed and Invisible on the Internet

If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."

-Google CEO Eric Schmidt

Without a Trace

If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.

  1. Big String. Big String offers self-destructing IMs and emails for those who don't want any evidence of their online communications. Use with many popular IM clients.
  2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
  3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
  4. If you've ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
  5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
  6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
  7. GrandCentral. Here's another phone option when you don't want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
  8. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
  9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
  10. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.

Browsing Security

If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.

  1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
  2. Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a "network of virtual tunnels." Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
  3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
  4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
  5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
  6. ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
  7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
  8. What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
  9. Clusty. Use this search engine when browsing. Clusty doesn't save your information or track you at all when you use it.
  10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.

Computer Security

Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.

  1. Malwarebytes' Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
  2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
  3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
  4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the "sandbox," you can just clear it out.
  5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
  6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
  7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
  8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to "hijackings, malware attacks and critical changes made to your computer without your permission."
  9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
  10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
  11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
  12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
  13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
  14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.

Laptop Tracking

If someone makes off with your laptop, know how to stop them with these tools.

  1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
  2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.

Spying on Those Out to Get You

If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.

  1. GotVoice. Take advantage of the 14 day free trial to have your target's voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
  2. Decoding Social Security Numbers in One Step. You can't get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
  3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn't know you are tracking him.
  4. Decode Your License. This article describes how you can get a driver's license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
  5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn't the only use for this–you can also use it in your home to see who comes by when you are gone.

Maps for Monitoring Occurrences

Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.

  1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
  2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
  3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You'll be able to track any type of outbreaks with this tool.
  4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
  5. Incidentlog. If you live in the northeast and couldn't find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
  6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don't want to see the world view.
  7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
  8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
  9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
  10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.

Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see
* Visit our other community at
* It's active and moderated. Register and vote in our polls.
* Read the latest breaking news, and more.