HEADLINES

USA: Army Says ‘Kill list’ Example Of Terrorist Use Of Personal Info

By Alistair Reign, August 4, 2016. Alistair Reign News Blog.

Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data. Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data. (Photo By Terrance Bell).

The month of August is the ninth annual “Anti-terrorism Awareness Month” in the United States. And the extremist groups are also keeping with tradition, as the “Cyber Caliphate” have issued a new kill list. The Wahhabi-cyber-network has claimed to have hacked Department of Defense networks to gain personal information, however, the US Army reports that much of the information came from social media websites.

Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks.

Sergeant Major Timothy Fitzgerald, Department of the Army, Provost Sergeant Major on Anti-terrorism Awareness Month released this video today.

Sergeant Major Fitzgerald said, “Terrorist-related threats during this past year and the recent attack in Orlando, Florida, demonstrates the realities of the risks we face. Terrorist tactics are persistent and evolving. To prevent and respond to terrorist activities, we must produce “vigilance” and “awareness” through our individual and collective action.

“Army leaders should encourage all community members to sustain vigilance, report suspicious activity, understand the indicators of radicalization and violent extremism, and be prepared to respond to an active shooter. Awareness of the terrorist threat and an understanding of individual protective measures are the hallmarks of our defense.

Every person is a sensor – if you See Something Suspicious, Say Something (REPORT IT) so military police and law enforcement can investigate.”

U.S. Army Garrison Fort Lee reports that: “Several times a year, the ISIS “Cyber Caliphate” releases a “kill list” with the names of law enforcement officers, firefighters, military personnel and other individuals who represent the strength and resiliency of America.”

Patrick Buffett’s article in the U.S. Army Garrison Fort Lee newsletter said, “The intent, as its title implies, is to eliminate those people through any means available gun, knife, baseball bat, bomb or running over them with a vehicle. If that’s not frightening enough, the list also includes addresses, places of employment and other personally identifiable information that could lead a potential killer to someone’s front door.

“The terrorist organization claims it hacked DOD networks to obtain the data, but it’s fairly obvious much of the information came from social media. That’s right, individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Quite surreal, but tragically true.

“In an effort to counter this threat, force protection experts across the DOD continue the push for social media discipline. “It has become a mainstay of the ongoing anti-terrorism awareness campaign,” noted a representative from the Protection Office – Directorate of Plans, Training, Mobilization and Security at Fort Lee.

““We’re urging all members of our community – particularly military personnel, government workers and their families – to use caution whenever they’re online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data,the DPTMS representative said.Social media is the apex of vulnerability. ISIS and other criminal entities are mining that information and using it to instigate attacks and carry out identify theft and other illegal activities.””

Patrick Buffett’s article continues, “State and federal law enforcement and intelligence analysts concur with that assessment. Experts have long-observed the false sense of anonymity and security that tends to exist among internet and computer network users. While online, most people don’t exercise the same level of caution they would when meeting someone in person.

““Even a single instance of dropping your guard and providing information without careful consideration can make you vulnerable,” the DPTMS representative said.As we say often in our business, ‘once it’s posted, it’s public.’ Even closed groups and password-protected sites are capable of being hacked. So, the message is simple … think about the information before hitting the ‘send’ button.””

U.S. Army Major General Mark Inch, Provost Marshal General, talks about Anti-terrorism Awareness Month.

The Fort Lee Protection Office recommends using the information found at the following websites to assess one’s social media and internet safety:

Staying Safe on Social Networking Sites.
Keeping Children Safe Online.

🔝


Send inquiries and request to re-blog article to Alistair.Reign@Gmail.com, thank you.


We welcome comments and conversation. Scroll down page to use the comment box.

Click Picture for a Popular Article

  • A 29-year-old woman who was raped in October 2015 by peacekeepers stationed in Bambari, Central African Republic. © 2015 Lewis Mudge/Human Rights Watch
  • Two homeless brothers try to survive on the streets of India.
  • A U.S. Marine Corps recruit with Company F, 2d Recruit Training Battalion, Recruit Training Regiment, provides security aboard Edson Range, Marine Corps Base Camp Pendleton, Calif., May 25, 2016. The recruit simulated providing security while the rest of the recruits carried ammo cans to their fighting holes to simulate combat preparation. (Photo: U.S. Marine Corps by Lance Cpl. Erick J. ClarosVillalta).
  • Ronald Reagan meets Afghan Mujahideen Commanders at the White House in 1985.
  • Operation Mesoamerica human trafficking operation conducted in Panama City, Panama.
  • Yemen woman in bright scarf and hat, "War humiliated my daughter." Aunt Khemissa argument.
  • Russia's Foreign Minister Lavrov listens to U.S. Secretary of State Kerry during a press conference at the United Nations Headquarters in Manhattan, New York
  • Although the ISIS terrorist network has claimed to have hacked Department of Defense networks to gain personal information, it is fairly obvious much of the information came from social media websites. Individuals who are becoming targeted victims handed the required details over to the individuals calling for the attacks. Users of social media websites are urged to use caution whenever they are online to avoid attracting attention to themselves or inadvertently providing easily accessible information that could be turned into targeting data.
  • Souhayla, a 16-year-old girl who escaped the Islamic State after three years of captivity, at her uncle’s home in Shariya Camp, Iraq. Credit Alex Potter for The New York Times
  • A Palestinian girl and women figth to free a Palestinian boy (bottom) held by an Israeli soldier (C) during clashes between Israeli security forces and Palestinian protesters following a march against Palestinian land confiscation to expand the nearby Jewish Hallamish settlement on August 28, 2015 in the West Bank village of Nabi Saleh near Ramallah. AFP PHOTO / ABBAS MOMANI
  • Mona Relief Charity on Go Fund Me makes it easy and safe to donate. No amount is too small, or too large.
  • The May 18-21 festival appeared to be a Saudi charm offensive aimed at federal policy makers as the Trudeau government fields questions about its decision to grant export permits for the armoured vehicles to a country that U.S. watchdog Freedom House regularly ranks among “the worst of the worst” on human rights. The Saudi embassy blamed “logistical reasons” for its last-minute change of plans when contacted Monday and a spokesperson said the country’s decision was not motivated by fear of protesters. Foreign Affairs Minister Stéphane Dion’s office had already said he would not be attending the “Saudi Cultural Days in Canada.” The embassy was adamant the event “had nothing to do” with the $15-billion arms deal and said it had been planned for years. Canada’s Department of Global Affairs, however, said it was notified of the “Cultural Days” on Jan. 14. That date was nearly two weeks after mass executions in Saudi Arabia drew public condemnation from the Trudeau government.
  • Many children in the street killed from a Saudi-led airstrike on a Yemen refugee camp.

Click Picture for a Popular Cartoon

  • Donald Trump for President
  • Britney Spears Looking Hot in black leather in Toxic music video. who was sexiest? Britney in Toxic or Taylor Swift in Bad Blood
  • GOP Caption winner first place on AlistairReignBlog.com
  • Trump Trudeau State Dinner.
  • Satire: USA Denies Whites Can Be Terrorist
  • What Donald Would Do!
  • Benjamin Netanyahu unveiled files stolen from Iran,
  • Tune in to the Putin and Obama Old-Timey Show ~*~ Vaudeville Style!! Brought to you by Alistair Reign News Blog: AlistairReignBlog.com
  • Take Our Poll: Come on in and tell us who haunted your nightmares! Which vampire had the most ferocious fangs?
  • Victoria's 'Homeless' Drug Addicts
  • Way-back Machine: Who Vogue'd It Best? Take our poll at Alistair Reign News Blog: AlistairReignBlog.com
  • Where's Steve - Satire Cartoon

Start a Conversation or Write a Caption This joke.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.