Islam Invasion: Europe’s New Nightmare – “Baby Muhammad Jihad”

 

If Muhammad cannot beat the infidels on the battlefield, he’ll outbreed them—literally: “Mohammed most popular name for newborn boys in the Netherlands for second year in a row,” is the title of a recent report.  Muhammadis apparently also the most popular name in England. In fact, Muhammad is one of the most popular names throughout Northwest Europe.

While this may seem innocuous enough—what’s in a name?—the fact is many Muslims see their offspring as their contribution to the jihad—literally, the “struggle” to make Islam supreme—since more numbers equate more influence and power.   Nor is the naming of “Muhammad” a coincidence but rather a cryptic reminder from the parents (usually father) of whom they most revere and hope their sons emulate—namely, the founder of Islam/jihad.

Although the original, historic jihad was straightforward warfare on the infidel to make Islam supreme, the ulemaarticulated a variety of other jihads, all of which work to the same end: as with jihad al-lisan (literally tongue, meaning propaganda, apologias, polemics, etc.), jihad al-mal (monetarily or materially supporting jihadis, including through zakat), jihad al-wilada (or childbearing) is seen as a way to contribute to the “struggle” to make Islam supreme.

This can be achieved with either infidel or Muslim women.  As an example of the first, a Muslim imam was videotaped saying that, because European men lack virility, their women seek fertility among Muslim men.  Accordingly, “We will give them fertility! We will breed children with them, because we will conquer their countries!  Whether you like it or not, you Germans, Americans, French, and Italians and all those akin to you [Western people]—take in the refugees.  For soon we will call them [and their European born sons] in the name of the coming caliphate!  And we will say to you, ‘These are our sons.’”

Read the Remainder at FrontPage Mag

Civilian Operator 101: How to Create and Distribute Disinformation

In short, TROLL your opponent and let their eagerness to assign blame take over the narrative. They will then go out of their way to distribute the lie and in doing so, reveal their own prejudices and biases to the world.

 

 

The mainstream media was quick to jump on a claim that the Florida school shooter belonged to a white nationalist organization. In the process, the media revealed its bias.

What happened?

On Thursday, the day after the tragic shooting, the Associated Press and ABC News, among many other outlets, reported that the Florida school shooter belong to a white supremacist organization called the “Republic of Florida.”

 However, the claim was just too good to be true.

Hours after major news outlets published the claim, Florida law enforcement agencies said they had no evidence to confirm the shooter was associated with white supremacist organizations but was still investigating. They later said there was no connection between the shooter and ROF.

Read the Remainder at The Blaze

 

 

Deconstructing Terrorism: Are Hospitals Targets for Terror Attacks?

theblaze

In the Crosshairs: Are Our Hospitals Targets for Terrorist Attacks?

(click on the above title to be re-directed to Original Site)

A very in-depth study on the types of Hospital terrorist attacks throughout History.

Stay Alert, Stay Armed and Stay Dangerous!

Examining Terrorist Tactics: The Jihadist Comms Toolkit

Comms

A new report documents how extremist groups’ use of secure digital tools software has evolved.

“I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use of various messaging services and platforms to communicate and distribute propaganda. A new report from cybersecurity group Flashpoint makes an attempt to catalog the digital tools in common use by jihadists, and when they started using them.

Here’s the shortlist:

Tor: Developed by the U.S. Naval Research Laboratory in the 1990s to help installations and military units keep contact during a global conflict, TOR anonymizes connections to the internet, making it harder for snoops to know who is visiting a given site. Throughout the last decade, “Tor’s popularity grew sharply within jihadist Deep and Dark Web forums,” the Flashpoint reports says.

In 2012, the Snowden revelations showed that the NSA could snoop on TOR traffic with a program called XKEYSCORE. In 2014, the German news service Tagesschau poked aroundTOR’s source code and found that the NSA was watching nineTOR servers that allowed it to do  deep packet inspection on basically anyone accessing TOR outside of Australia, Britain, Canada, New Zealand, and the United States (the so-called Five Eyes surveillance partners).

Extremist groups have also begun using virtual private networks, or VPNs, which encrypt traffic between computers. As early as 2012, Al Qaeda was discussing the use of the free CyberGhostVPN, the report notes. But today’s savvy suicide bomber is likely to go in for a paid subscription to a better VPN service. “Some safer VPNs require monthly subscription,” the Pro-ISIS United Cyber Caliphate wrote earlier this year, warning loyalists to stay away from cheap VPNs.

Secure messaging apps, such as Telegram, and other services are proliferating and getting easier to use every day. “It used to be that you had to be pretty technically astute to use encryption on a device or for personal communications,” Leggett said. “That’s become very user friendly, very easy to use and now very unsophisticated actors can install very high-grade encryption on their devices, so ISIL, like many other targets, use that to hide their activities from us.”

Read the Remainder at Defense One

Learning From Terrorist Tactics: Employing the “Israeli Triple-D” System to Stop Vehicles From Becoming Weapons

PJ2

Aaron Cohen, a counterterrorism expert and former member of the elite Israeli special forces unit, said on CNN early Friday that the Bastille Day attack in Nice, France, was a “colossal” security failure that could have been stopped. At least 80 people were killed on Thursday when a truck barreled through a crowd of people celebrating on Nice’s Promenade des Anglais.

Cohen said, “This is a security failure on a colossal level. This is a colossal failure on a basic security level for event planning. There should have been some kind of physical barrier, where armed, present, properly trained, heavily-armed police officers were checking vehicles. There were grenades in the car. There was an AK-47 in the car. There was somebody who was about to commit an act of of murder.”

He said that if the vehicle had been checked and the driver screened, “with a proper physical barricade in place, they would have been stopped.”

Cohen said that an Israeli-style triple security layering needs to be in place for events like the Bastille Day celebration in France. “That truck was moving in slowly, which leads me to believe that the person was going to a specific place for a specific reason,” he said. “There was surveillance that was being conducted for the terrorist to inflict the most damage.”

“Israelis deploy a Triple-D system, which stands for deter, detect, and deny.” He said if a similar event had been held in Israel, cars would have had limited access to the street. “The deterrence would also involve heavier armed security personnel.”

“There is already a heavy military feel to feel to France, I don’t know how much more you can get,” he said. But he suggested that assault weapon-carrying police officers should be placed anywhere you have massive crowds. “That’s where terrorists go.”

He said the final step of the Israeli layering system is “denial,” which is an important part of training for law enforcement. “If you look what happened recently in Turkey, in Istanbul, a Turkish police officer ended up firing at that terrorist who went in with an AK-47 who was firing openly in the center-mass, the thoracic area. The terrorist went down.” Cohen said Israeli police are trained to fire a round into the center of the head. “It’s not personal, we’re not trying to kill the terrorist, we’re trying to keep his hands from moving. Had [the Turkish police officer] shot that terrorist in the head, that explosion we saw moments afterwards wouldn’t have been able to happen because they wouldn’t have hit the button.”

When asked what could have been done to stop the large panel truck as it rolled down the Promenade des Anglais, Cohen didn’t mince words: “My Israeli answer? Stop and check the truck. You’ve got AK-47s in the truck. I’ll tell you in Israel what we learned from El Al Airlines which is protected by the Israeli FBI. The body language of somebody who is about to commit an act of murder is just as red-flagged as someone who has just committed an act of murder.”

Cohen advocates “anti-terror specific training” similar to the Israeli Triple-D system to prevent future attacks.

Read the Original Article at PJ Media