HEADLINES

USA: Army Says ‘Kill list’ Example Of Terrorist Use Of Personal Info

By Alistair Reign, August 4, 2016. Alistair Reign News Blog.

Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data. Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data. (Photo By Terrance Bell).

The month of August is the ninth annual “Anti-terrorism Awareness Month” in the United States. And the extremist groups are also keeping with tradition, as the “Cyber Caliphate” have issued a new kill list. The Wahhabi-cyber-network has claimed to have hacked Department of Defense networks to gain personal information, however, the US Army reports that much of the information came from social media websites.

Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks.

Sergeant Major Timothy Fitzgerald, Department of the Army, Provost Sergeant Major on Anti-terrorism Awareness Month released this video today.

Sergeant Major Fitzgerald said, “Terrorist-related threats during this past year and the recent attack in Orlando, Florida, demonstrates the realities of the risks we face. Terrorist tactics are persistent and evolving. To prevent and respond to terrorist activities, we must produce “vigilance” and “awareness” through our individual and collective action.

“Army leaders should encourage all community members to sustain vigilance, report suspicious activity, understand the indicators of radicalization and violent extremism, and be prepared to respond to an active shooter. Awareness of the terrorist threat and an understanding of individual protective measures are the hallmarks of our defense.

Every person is a sensor – if you See Something Suspicious, Say Something (REPORT IT) so military police and law enforcement can investigate.”

U.S. Army Garrison Fort Lee reports that: “Several times a year, the ISIS “Cyber Caliphate” releases a “kill list” with the names of law enforcement officers, firefighters, military personnel and other individuals who represent the strength and resiliency of America.”

Patrick Buffett’s article in the U.S. Army Garrison Fort Lee newsletter said, “The intent, as its title implies, is to eliminate those people through any means available gun, knife, baseball bat, bomb or running over them with a vehicle. If that’s not frightening enough, the list also includes addresses, places of employment and other personally identifiable information that could lead a potential killer to someone’s front door.

“The terrorist organization claims it hacked DOD networks to obtain the data, but it’s fairly obvious much of the information came from social media. That’s right, individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Quite surreal, but tragically true.

“In an effort to counter this threat, force protection experts across the DOD continue the push for social media discipline. “It has become a mainstay of the ongoing anti-terrorism awareness campaign,” noted a representative from the Protection Office – Directorate of Plans, Training, Mobilization and Security at Fort Lee.

““We’re urging all members of our community – particularly military personnel, government workers and their families – to use caution whenever they’re online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data,the DPTMS representative said.Social media is the apex of vulnerability. ISIS and other criminal entities are mining that information and using it to instigate attacks and carry out identify theft and other illegal activities.””

Patrick Buffett’s article continues, “State and federal law enforcement and intelligence analysts concur with that assessment. Experts have long-observed the false sense of anonymity and security that tends to exist among internet and computer network users. While online, most people don’t exercise the same level of caution they would when meeting someone in person.

““Even a single instance of dropping your guard and providing information without careful consideration can make you vulnerable,” the DPTMS representative said.As we say often in our business, ‘once it’s posted, it’s public.’ Even closed groups and password-protected sites are capable of being hacked. So, the message is simple … think about the information before hitting the ‘send’ button.””

U.S. Army Major General Mark Inch, Provost Marshal General, talks about Anti-terrorism Awareness Month.

The Fort Lee Protection Office recommends using the information found at the following websites to assess one’s social media and internet safety:

Staying Safe on Social Networking Sites.
Keeping Children Safe Online.

🔝


Send inquiries and request to re-blog article to Alistair.Reign@Gmail.com, thank you.


We welcome comments and conversation. Scroll down page to use the comment box.

Click Picture for a Popular Article

  • Yemen woman in bright scarf and hat, "War humiliated my daughter." Aunt Khemissa argument.
  • A 29-year-old woman who was raped in October 2015 by peacekeepers stationed in Bambari, Central African Republic. © 2015 Lewis Mudge/Human Rights Watch
  • The Prime Minister, Justin Trudeau, today announced that the Centre for Commercialization of Regenerative Medicine (CCRM) will receive $20 million – under the Advanced Manufacturing Fund (AMF) – to establish and operate the Centre for Advanced Therapeutic Cell Technologies. January 13, 2006. (Photo: Adam Scotti). AlistairReignBlog.com
  • Yemen is the poorest country in the Arabian peninsula, with more than 40 percent of people living below the poverty line Reuters
  • Yesterday I re-blogged two article's suggesting that Donald Trump announced his candidacy as a ruse to help Hillary Clinton secure the title of President of The United States. When a friend first emailed me a link to the article by J.K. Trotter published in the Gawker, I brushed it off as too far-fetched, However, I recently changed my mind, and I will explain why I doubt Donald Trump's campaign started as a legit quest for the presidency.
  • Paramedics rush to the scene at the capital of Faso terrorist attack by Al-Qiada on January 15, 2016. The attack comes less than two months after a terrorist attack at the Radisson Blu Hotel in the Malian capital Bamako on November 20 in which 20 people died including 14 foreigners.
  • Documentary: Part One - A Year In Space With Scott Kelly
  • Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data.
  • Mission The Islamic State are trying to create 'a state that does not recognise the previous borders of Iraq or Syria,' said Dr. Anne Aly, a Research Fellow at Curtin University. (Photo/source: Daily Mail Australia).
  • The Center for Inquiry (CFI) is amongst 17 organizations and two individuals that sent a letter to U.S. Secretary of State John Kerry today (January 5, 2016) urging him to press Saudi Arabian King Salman bin Abdulaziz Al Saud to halt the execution of Sheikh Nimr Baqir al-Nimr and several other demonstrators from the country’s marginalized Eastern Province. On October 24 2015, the Saudi Supreme Court ratified the death sentence issued to Sheikh Nimr in October 2014. Since September, the Saudi criminal justice system has also ratified the death sentences of Ali al-Nimr, Dawood al-Marhoon, and Abdullah al-Zaher, three men arrested as minors in 2012 for their protest activity.
  • A question I have been asked many times since I began covering the humanitarian crisis in Yemen; who is taking care of the war orphans in Yemen? It appears the world has forgotten them, perhaps because they are not considered refugee orphans, nobody is paying attention to the gross crimes against these little ones - committed at the hands of an invading regime - Saudi Arabia.. children isleep nside a pitt in the ground, it is now normal for adults to put children to sleep in a large hole to ptotect child from snipers andcluster bombs that spray shrapnel Yemen.
  • Prime Minister Justin Trudeau welcomes Syrian refugees to Canada late Thursday night at Pearson International airport
  • American socialist organisation, the BPP, which at its height reached around 5,000 members, before disintegrating due to a campaign of state terror and internal problems.. Free Huey Newton, Black Panther Rally San Francisco, May 1, 1969.
  • Ronald Reagan meets Afghan Mujahideen Commanders at the White House in 1985.

Click Picture for a Popular Cartoon

  • Who is PM Stephen Harper
  • Includes Meryl Streep's full Golden Globe speech, a peek at her stage performance where she play Donald Trump, SAG Speeches: Ashton Kutcher, Julia Louis-Dreyfus, Kerry Washington, Natalie Portman, Lily Tomlin and others, as well as talk show host's comments and interviews. Tied together with indie music and skits of Peter Griffin of Family Guy playing Donald Trump.
  • Take Our Poll: Come on in and tell us who haunted your nightmares! Which vampire had the most ferocious fangs?
  • Donald Trump for President
  • Where's Steve - Satire Cartoon
  • Way-Back Machine: Who Owned It Best? Come on in and pick out your favorite Dracula cape! Who flaunted the full-length cape better than the rest?
  • What Donald Would Do!
  • Britney Spears Looking Hot in black leather in Toxic music video. who was sexiest? Britney in Toxic or Taylor Swift in Bad Blood
  • GOP Caption winner first place on AlistairReignBlog.com
  • Donald Trump will save the day
  • Donald Trump and I Lama Crazy. alistairreignblog.com
  • Benjamin Netanyahu unveiled files stolen from Iran,

Start a Conversation or Write a Caption This joke.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.