Category Archives: Terrorism

Cali Cops Arrest Muslim With IEDs During Routine Traffic Stop

A Salinas man was charged with four felony counts after being found with two homemade bombs in his vehicle at a traffic stop in Brea on Tuesday night, authorities said.

https://tribktla.files.wordpress.com/2018/09/image1.jpeg?quality=85&strip=allSaleh Ali is seen in a photo posted to Facebook by Brea police on Sept. 20, 2018.

Saleh Ali, 47, was charged Thursday with intent to unlawfully make a destructive device, two counts of possession of a destructive device, and the sale and transportation of a destructive device, the Orange County District Attorney’s Office announced Friday.

Brea Police Department officers pulled Ali over for having expired registration at a traffic stop in the area of South Orange Ave and Imperial Highway. Police say they found the two bombs when they checked his black Toyota Corolla.

The DA’s office described the bombs as “improvised explosive devices,” and said they were “containers covered in shrapnel.”

The devices were taken by an Orange County sheriff’s bomb squad and Ali was arrested and put in Orange County Jail. Police said Thursday his bail was set at $500,000.

If convicted as charged, Ali will receive a maximum sentence of 10 years in state prison.

He is due in court for a pre-trial hearing on Friday, Sept. 28.

https://whiskeytangotexas.files.wordpress.com/2016/12/muslim-child-bomber.jpg?w=559&h=371&zoom=2

Source: by Angela Rose Bickmann | KCAL5

Advertisements

They Hate You And Your Family, Want To Destroy You.

https://westernrifleshooters.files.wordpress.com/2018/09/screen-shot-2018-09-19-at-9-47-22-am.png?w=623&h=561

Your tax dollars at work.

Above and below via Gab.

https://westernrifleshooters.files.wordpress.com/2018/09/screen-shot-2018-09-19-at-9-51-57-am.png?w=620&h=125

Source: by Concerned American | Western Rifle Shooters Association

 

Visualizing World Arms Sales: US Vs Russia, 1950-Present

Via MishTalk,

The U.S. and Russia are the world’s largest weapons dealers. Will Geary , @wgeary mapped the flows of arms exports leaving the U.S. and USSR/Russia from 1950 to 2017 to produce this fascinating video…


Arms Sales: USA vs Russia from Will Geary on Vimeo.

This won’t end well.

Source: ZeroHedge

‘Known Wolf’ New Mexico Terror Camp Walk Through

NBC Journalist Gadi Schwartz filed a remarkable ground report about the New Mexico terror camp. While reporting on the compound in Northern New Mexico, where children were believed to have been trained on how to carry out school shootings, Mr. Schwartz was given rare access and permission to tour the area by the rightful owner of the property.

We often find ourselves critical of MSM; however, this is one of those examples of a journalist filing a great report. See his twitter thread here for more pictures:

This is a raw, unedited video that I hope will help give people who are following this story some context. Will also build a thread @GadiNBC on Twitter to fill in more details.

https://theconservativetreehouse.files.wordpress.com/2018/08/new-mexico-terror-camp.jpg?w=1024&h=768Source: The Conservative Tree House

***

Unbelievable: New Mexico Judge Allows Jihadis Released on Signature Bond…

https://theconservativetreehouse.files.wordpress.com/2018/08/new-mexico-terror-camp-2.jpg?w=621&h=325

Unbelievable. Just unbelievable. The five extremists of the New Mexico jihadist compound, where a 3-year-old was murdered, are being released from custody pending trail without any bail whatsoever. They are free on a a mere signature bond; a promise to return for trial.

***

Father Of New Mexico Islamist Compound Leader Is Linda Sarsour’s ‘Mentor’

.

Maine USA: Somali Muslim “Refugees” Freely Roam Streets Randomly Attacking Americans

https://triggerreset.files.wordpress.com/2018/05/somalifeature3.jpg?w=621&h=173

Going out on a limb here, but perhaps importing hordes of third-world people with an average IQ of 68 who adhere to a violent, murderous “religion” into a civilized, Christian nation was, shall we say… state sponsored genocide.

USA.gov is supposed to PROTECT their citizens, not INFECT them.

Watch

(LEWISTON) – In the early evening on the first day of summer, a large group of Somali boys approached a woman on the corner of Ash and Pierce streets.

According to police reports, they intimidated the woman and slapped her in the back of the head before scattering into the downtown.

Five days later, shortly after midnight, a man was accosted by a group of Somali boys outside the Big Apple on Main Street. Police reports say several members of the group punched the man and took money from him. They then fled in a car.

Later that night, a woman in her late 60s was beaten by a group of Somali boys and relieved of cash while walking in Kennedy Park.

Five nights later, another man was jumped by a group of similar description. He resisted the gang and was beaten badly. He required surgery.

Throughout the summer, similar reports have come into the Police Department. Witnesses and investigators say swarms of Somali boys, some as young as 8, others in their late teens, overwhelm solitary victims through sheer numbers.

“It’s not gang activity in the traditional sense,” Deputy Chief James Minkowsky said. “We’re not seeing the colors or the monikers, but it’s still a gang mentality.”

Often, these gang members carry sticks and rocks with which to intimidate their victims. There are often four or five of them, sometimes as many as a dozen. Typically, they threaten or beat their victims until they give up the goods: money, bicycles, cell phones, prescription drugs, or other items of value.

Then they scatter.

“By the time the call gets to us, the group has dispersed,” Minkowsky said.

The attacks continued all summer; more than a dozen were reported to police. There were more in the fall and a series of them in recent weeks. In each attack, the victim is one who may have appeared weak to the group that descended on them.

“They single out a person who is walking alone. The victim is often intoxicated,” Minkowsky said. “Or he might be small. They look for someone who is not likely to fight back or present much of a challenge.”

On the first day of December, a man walking through Kennedy Park after leaving a Park Street club said he was attacked by four Somali males. The group came at him from behind, knocked him down and stole prescription drugs and $150 in cash. That man told police it was the second time he was attacked in such a fashion. The first time, he was able to escape.

On the last day of November, there were three such attacks reported in Lewiston: one in the area of Central Maine Medical Center, another on Bartlett Street, the third in Kennedy Park.

In another attack, a woman walking a dog in the park was set upon. The assailants, a group of Somali males, beat her dog with a stick. Police later tracked down one of the attackers. He was a 10-year-old boy.

In late summer, an off-duty civilian police employee was eating at a local restaurant. A local boy ran to the window, screaming for help. The police employee ran outside and found a group — roughly a half-dozen — of Somali boys. When confronted, they ran off.

Police say they are investigating the attacks on several fronts. They are using new technology and new techniques. A bigger break came in recent weeks when they were approached by a group that wants to help.

“Members of the Somali community came to us,” Minkowsky says. “They set up a meeting with us and came in to talk about it. They want to help us combat it.”

Police Chief Michael Bussiere pointed out that the attackers do not appear to involve large segments of the Somali population. It seems to be a select group that has organized to carry out the attacks.

Police say group robberies are almost unheard of in Lewiston. In the past, when multiple people have attacked a lone victim, two or three assailants were reported and the assault was typically prompted by intoxication or old rivalries.

Not so with the Somali attacks.

“We haven’t seen that it’s been fueled by alcohol or drugs,” Minkowsky said. He added that robbery appears to be a primary motivation among the Somali gangs. “But in some cases, they seem to do it for the thrill of it.”

Stephen Wessler, director of the Center for the Prevention of Hate Violence, said he was not aware of the Somali assaults in Lewiston. After hearing the nature of them, he said the attacks likely were not the type that involve his group. The motive appears to be robbery, rather than race.

While investigating the ambush-style attacks, police have little to compare them with, at least locally. A search of assaults dating back to spring revealed no incidents of a similar nature involving non-Somalis.

“This is unique,” Minkowsky said.

There have been a few arrests since the attacks began. Minkowsky said many of the suspects had dropped out of school. Their parents seemed to have no idea that their children had become part of a roving gang.

Seeing children as young as 8 running the streets with teens closing in on 20 is something police are not used to seeing. There is a lot about the attacks investigators have not seen before.

Source: Trigger Reset

Austin Bomber Case Study in Surveillance Tactics

Surveillance State? Nah, Can’t Happen…Because it Happened Already

https://i1.wp.com/shtfplan.com/wp-content/uploads/2017/09/mass-survey-e1505413842127.jpg

Many have argued that there is neither a surveillance state, nor a concerted effort to disarm the public door-to-door, house by house, etc. Some of these are far-leftists, masquerading as conservatives…trying to appear “skeptically cynical.” We’ll “game” the thought, to bring everyone back from opacity to transparency.

  1. The Communists, Marxists, Leftists, Progressives, Liberals, Democrats, and their ilk deliberately try to disguise the true objectives as outlined in the Planks of the Communist Party…passing themselves off as “middle-ground” in their stances.
  2. By denigrating the concept of an imminent surveillance state and ridiculing it, they draw conservatives who are still undecided (“fringe elements”) out of being proponents of the idea…further weakening and obfuscating people’s awareness.
  3. The movement of the groups mentioned never ceases: It hasn’t ceased with the fall of the Berlin Wall and subsequent reunification of Germany in 1990, nor the fall of the Soviet Union…more a “restructuring” than a fall…in 1992. The Communists are alive and well, operating within the United States at the lowest levels of society, and at the highest levels of government. We’ll stay with “Communists” as the label, as they are the end-state and will purge all the others who aren’t in complete lock step with them. They are Communists.

That being mentioned, as they craft their narratives and lie openly upon the television, radio, and within the newspapers, there is a subtle, devious operation going on right before your eyes:

“The emplacement of a complete surveillance state of cameras and listening devices, all a part of the “wondrous internet of things.”

For that last paraphrase, thank David Petraeus…former head of the CIA (in name only) yet without the technical alacrity to avoid the very thing he lauded…and hence, his downfall via Paula Bridewell. Thanks, Dave, for your erstwhile contribution to crafting the surveillance state. Dave serves as the prime example: no matter how much of a “big hitter” toward the NWO (New World Order) a globalist or establishmentarian one is, they are always expendable.

The surveillance state has just been proven with the recent string of bombings in Austin, Texas where the protagonist blew himself up when he was tailed and cornered. This article was released by AP, written by Paul J. Weber on 3/22/18, and it seems to have escaped much notice. I am providing an excerpt that is almost the full article. When you read it, you will see why it is so important. Here it is:

How Police Finally Found the Austin Bomber

AUSTIN, Texas (AP) — The suspected Austin bomber is dead after terrorizing Texas’ capital city for three weeks. And in the end the manhunt wasn’t cracked by hundreds of phoned-in tips, the big pot of reward money or police pleading to the bomber through TV.

One of the largest bombing investigations in the U.S. since the Boston Marathon attacks in 2013 came to an intense close early Wednesday when authorities say they moved in on Mark Anthony Conditt at an interstate hotel. Austin Police Chief Brian Manley said Conditt blew himself up after running his sport utility vehicle into a ditch.

Here is what’s known about how authorities finally zeroed in on the suspected bomber after 19 days, two dead victims and more than 1,000 calls of suspicious packages around the city:

___

GETTING THE BOMBER ON CAMERA

Conditt had been careful to avoid cameras before entering a FedEx store in southwest Austin this week disguised in a blond wig and gloves, said U.S. House Homeland Security chairman Michael McCaul. The Austin congressman had been briefed by police, the FBI and the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives.

McCaul said going into the store was Conditt’s “fatal mistake.” He said authorities previously had leads on a red truck and that the surveillance video from the FedEx store — where Conditt is believed to have dropped off an explosive package destined for an Austin address — allowed investigators to identify him and the truck.

Said Texas Gov. Greg Abbott, “I’m not sure how much they narrowed him down to an exact person of who he was before he went into that FedEx store.”

___

TRACKING THE CELLPHONE

At the FedEx store, McCaul said investigators got from surveillance the truck license plate that linked the vehicle to Conditt, which in turn gave authorities a cellphone number they could track. McCaul said Conditt had powered down his phone for “quite some time” but that police closed in when he switched it back on.

“He turned it on, it pinged, and then the chased ensued,” McCaul said.

Abbott said police were able to closely monitor Conditt and his movements for about 24 hours before his death. The governor said the phone number was used to tie Conditt to bombing sites around Austin.

“The suspect’s cellphone number showed up at each of the bombing sites as well as some key locations that helped them connect him to the crime,” Abbott said.

___

BUYING BOMB-MAKING MATERIALS

Authorities say they also tracked down Conditt, a 23-year-old unemployed college dropout, through witness accounts and other purchases, including at a Home Depot where McCaul said the suspect bought nails and other bomb-making materials.

Abbott said Conditt’s purchases at the Home Depot also included five “CHILDREN AT PLAY” signs, one of which was used to rig a tripwire that was set off by two men Sunday in a southwest Austin neighborhood. One of them was walking and the other was riding a bike.

William Grote told The Associated Press that his grandson was one of the victims and had nails embedded in his legs from Sunday’s explosion.

The batteries to power the bomb were purchased through the internet, McCaul said.

___

STILL PUTTING TOGETHER A PROFILE

The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male, McCaul said. And while that part was right, the congressman said, a full psychological profile won’t come together until investigators have time to comb through Conditt’s writings and social media posts.

Conditt’s motive is not clear. But on Wednesday, police discovered a 25-minute video recording on a cellphone found with Conditt, which Manley said he considers a “confession” to the bombings. Manley said it described the differences among the bombs in great detail.”

Obviously, someone made a big mistake in revealing this information to the stultified, oblivious public…that selfsame public of “We the People” that has the right to know, and yet doesn’t understand what is happening.  Worse: The public doesn’t care what’s happening. Let’s summarize what these main points mean, for those of you who do care:

  1. The cellular telephone is nothing more than a tracking device…as mentioned, it “pings” its position and gives away the location of the owner…along with all of his vital information in the file… every four seconds.
  2. The cell phone’s location is tied into the location of every camera, public and private that has a tie-in to the CCTV system monitored by law enforcement in the fusion centers…from the Happy Burger parking lot cameras to the cameras mounted at the intersections in cities, towns, and suburbs. As the happy cell phone passes these locations, the movement is tracked in real time, and recorded.
  3. Granted, they had a suspect, but they can review all of the cameras at any business at any given time…to show what Joe the Plumber-turned-bomber may be purchasing at the friendly store…and they can tie that film in with real-time with the cell phone.
  4. The vehicle is also the “buddy” of the police and the surveillance establishment. They take pictures and film of the license plate, the car, and glimpses of Joe the Plumber driving it…corroborated by the happy, ever-pinging cellular telephone (the tracking device).
  5. All this data for everyone’s movements is recorded, catalogued, and stored…stored away for an indefinite period of time (forever) until the information is needed as evidence or in an investigation. Investigation!  Doesn’t that sound exciting?  Guess what?  Everyone is being investigated, and all of the data on everyone is kept.
  6. Purchases! Everybody has to buy things, stuff, etc.  Every time you pull up to the gas pump, the car is photographed.  The POS (point of sale) at the register tabulates and inventories everything, tying it in to the gas pump, with a picture of Joe and whatever form of fiat he used to pay for the gas and bag of chips.  Purchases track in real time, access whatever form of payment you use, tying you in with others…if you use your spouse’s credit card, for example.
  7. Cops have license plate/tag readers that can read hundreds of different plates, categorizing all of them in accordance with sensitive data that may have nothing to do with driving upon the roads or their record with the vehicle.
  8. Every Internet search, every purchase, every query, every e-mail is saved and read/tabulated into the overall matrix that assesses the potential for an individual to be “harmful” and stored…to be matched against the subject’s behavior and movements at a later date. Systems are already in place that analyze keystrokes for the comparison and narrowing down of who the typist is.
  9. Every library sign-out…film, music, or book…is saved and kept for future reference.
  10. Biometrics are making the “fingerprint” even more specific…with eye to eye distances, ear shapes, and gaits measured.  Any exposed portion of the skin, and the movement and function of the limbs is analyzed and recorded.
  11. Every piece of mail is scanned to save sender and recipient’s addresses and (of course) purchases are recorded within the company and matched against what is sent out and to whom.
  12. Satellites can target and surveil in real time and tie in to all of the little devices just mentioned.
  13. Laptop computers can be traced in accordance with the purchaser’s information from the POS and onward…and the laptops record, photograph, and film as well as putting forth a “ping” of their own…especially when connected to the Internet. All laptop use is matched and corresponded to other places of business (their cameras, etc.)
  14. Association: when you’re on your laptop, and here come Smiling Sam and Brother Bob, each with pinging cell phones…letting the authorities know that in that moment of time (Whitney Houston’s “One Moment in Time”) Sam and Bob were right in front of you. Later they can haul both of them in to corroborate that you were on your laptop in front of Happy Burger at whatever date or time they have on record.

This excerpt shows that all of these items are in place. Yes, they are surveilling you… are watching all of us. The surveillance is not ubiquitous yet. Not yet. It will be, and soon. They utilized every feature mentioned above to find the bomber. The Great Society has triumphed, and the mad bomber has met his end.

But has society really triumphed? That article gives you insight into how the cage is almost completed…the construction is just about finished. What requires further thought is what they will do with this surveillance once it is in place and ubiquitous. Just a few further thoughts for your consideration. You may want to watch what you place into your e-mails and comments. There are techies in the Puzzle Palace and at Ft. Meade whose function is identifying the commenters.

Don’t place anything on the Internet that can come back and bite you later. The most effective means of exchange are not on the Internet when it comes to information. Blogs, writers, and commenters have already been “marginalized” and their effectiveness diminished because it is an open source. Your true effectiveness in getting things done is at the “grass roots” level…locally, in small groups for discussion. Your “tool of transmission” is a manual typewriter.  Need copies?  Get back to Carbon paper. There won’t be a recording of what you copied at your Friendly Copy center…the one with your information in real-time, right under the eye of the happy surveillance camera in the corner.

The one that superficially is to make sure you don’t take more than 1 or 2 paper clips… but manages to send the fusion centers every bit of data they need to match up their culprit (the copier) to the scene of the crime. They’ll also match up his credit card at the register, tally up his total purchases and copies over a period of time, and get plenty of information as it films him walking through the store and out the door.

Bottom line: we’re all “guilty” according to laws they haven’t even written yet. It is all about building a case against the average citizen. If you’re not the wolves, then you’re one of the cattle, in their eyes. It will become worse. Much, much worse. If you doubt it and do not take necessary precautions, you may find out it exists when they come knocking on the door. It may already be too late, and their song is “We’ve Only Just Begun,” by Karen Carpenter…. but not to smile. They’ve been doing that for years, as they have taken our taxes to craft the very cages that are almost completed. The next step? Not hard to figure out, and it has happened before…as history repeats itself. Think “Solzhenitsyn,” and think of tomorrow.

Also read How They Hunt

Source: By Jeremiah Johnson | SHTFplan

Pulse Nightclub Killer’s Father Was Decade-Long FBI Informant who Planned Terrorist Attacks Against Pakistan

No wonder he got primo seating at that Hillary rally

Testimony and court documents from the trial of Noor Salman – the widow of Pulse nightclub shooter Omar Mateen, reveals that Omar’s father – who sat right behind Hillary Clinton at an August, 2016 campaign rally, was an FBI informant for over a decade.

https://www.zerohedge.com/sites/default/files/inline-images/1matt_0.JPG?itok=ubSDZYBd

https://www.zerohedge.com/sites/default/files/inline-images/matteen_0.jpg?itok=x_4e-p8Q

Jurors in Salman’s trial heard from Miami-based FBI Special Agent Juvenal Martin – Seddique Mateen’s contact within the agency, while documents show the senior Mateen was trying to raise $50,000 – $100,000 through donations in order to conduct a terrorist attack against the government of Pakistan – a discovery made by the FBI following the June 12, 2016 massacre at the Pulse gay nightclub by 29-year-old Omar Mateen, killing 49 people before dying in a shoot out with police. 

Disturbingly, Omar Mateen was such a threat that his co-workers reported him to the FBI – who had his supervisor wear a wire to try and capture Omar bragging about connections to terrorism

Martin also testified about investigating Omar Mateen, after co-workers at the security firm G4S reported in 2013 that Mateen had made comments about being connected to Al Qaeda, Hezbollah and the Muslim Brotherhood. Martin had Mateen’s supervisor wear a concealed recording device. –Orlando Sentinel

The elder Mateen also made several money transfers to Turkey and Afghanistan between March 16, 2016 and June 5, 2016 – a week before the Pulse attack. 

A motion filed by Salman’s defense team on Sunday argued that the case against her should be dismissed because prosecutors didn’t share the fact that the senior Mateen was an FBI asset.

It is apparent from the Government’s belated disclosure that Ms. Salman has been defending a case without a complete set of facts and evidence that the Government was required to disclose,” attorney Fritz Scheller argued in the court filing.

U.S. District Judge Paul Byron said he would deal with the motion later. “I’m not going to address it right now,” he said. “It’s gonna take too much time.”

Did the FBI lie?

Journalist Jack Posobiec makes some interesting observations about the FBI response to the Pulse shooting, noting that in hindsight James Comey may have been lying through his teeth about what they knew. 

So much for a “scandal free” Obama administration…

Source: ZeroHedge