Terror Fusion Center

Posted in Uncategorized by chamblee54 on September 22, 2010

Snitching has a long, if not honorable, history in our republic. If your neighbor is a communist or a pothead, inquiring minds want to know. It should be no surprise that the war on terror is being fought with the same rules. BoingBoing and wired combine forces to inform the public of the latest opportunity to help your government.
The Department of Homeland Security has issued a pamphlet, Identifying Homegrown
Violent Extremists Before They Strike.
It is labeled ” unclassified for official use only”. Continuing the official meme, the document states
“L)”67$” *&2′,$”&0″&00 (*(+1″+*6(.(6($,C”+)-“6&”67$”$=6$)6” 4$’5 (6 6$-“> /”1+%C”+3 $)*($,”+’$”$) *&2’+3$-“6&” 0&’%+’-” 6&”D6+6$”+)-“M&*+1″N2,(&)”O $)6$’,C “P&()6″: +,B”N&’* $ ,C” +)-” N; L”N ($1-“Q00(*$,”()0& ‘5 +6(&) “&)”$)6(6 ($,”67+6″ +’$”41 +)) ()3″&'” *&55  (66()3″+*6,”& 0″ +”,2,4(*(&2,”) + 62’$C”* ‘(5()+ 1″& ‘”&67$’%(,$C”67+6″5+/” ()-(*+6 $”+”4&6$)6(+1″ 67’$+6″6&”R9 D9″()6$’$,6,”+)-“%+”+ )6″02’67$'”().$,6(3+6(&)9″”:7(,”()0& ;’5+6 & ) “,7&21-“)& 6″> $”*&11$*6$-” ,&1$1/ “&)”N(‘,6″85$)- 5$)6″4’&6$*6$-“+*6(.(6($,”&'”&) “67$”> +,(,”&0″+)/”‘+* (+ 1C”$ 67) (* C” $1(3(&2,C”&'”&67$'” 4’&0(1$9″
Oh my. The first edition of this report was not copy friendly. Not to worry, there is a download here. The site also has a download of Homeland Security Guidance for Response to a Nuclear Detonation.
Now, where were we? Oh yes, the document was telling us what to do with our snitching.
“In the course of official activities, and to the extent permitted by law, agencies are encouraged to forward to State and Local Fusion Centers, Joint Task Forces, and FBI Field Offices information on entities that are planning or committing acts of a suspicious nature, criminal or otherwise, that may indicate a potential threat to U.S. interests and warrant further investigation. This information should not be collected solely on First Amendment protected activities or on the basis of any racial, ethnic, religious, or other profile.”
Does a “fusion center” have anything to do with alternative energy or asian food?
Ok, so your neighbor takes mysterious boxes into the basement, and never smiles. Should you report her? That is a tough call to make sometime. The helpful DHS offers a few tips. Think of Jeff Foxworthy saying, you might be a terrorist if…

Indicators of Possible Terrorist Activity
-New or increased advocacy of violence including providing material support or recruiting others to commit criminal acts.
-Adoption of new life styles and segregation from normal peer and family groups in association with advocating criminal or terrorist activity.
-The adoption of a new name.
-Behavior that could indicate participation in surveillance of potential targets.
-Acquisition of excessive quantities of weapons or materials that could be used to produce explosives such as ammonium nitrate-based fertilizers or hydrogen peroxide.
-Travel to or interest in traveling overseas to attend violent extremist institutions or paramilitary training camps.
-New or increased interest in Websites and reading materials that advocate violence and then initiating action in support of this activity.
-New or increased interest in critical infrastructure locations and landmarks, including obtaining aerial views of these locations.
Any reporting should include all of the information that factored into the decision to report the activities.

These agencies are rather responsible by government standards.
“Note: DHS, FBI, and NCTC are not advocating interference with the rights of law-abiding citizens. There may be a legitimate reason why some of the indicators described in this document are present; it is up to you to determine when that is not the case. If you observe suspicious activities that warrant the attention of federal law enforcement entities, please contact your nearest State and Local Fusion Center and your local FBI Field Office or Joint Terrorism Task Force.”
On the last page of this document, two web addresses are given.
“For a listing of information needs related to terrorism and Homegrown Violent Extremist radicalization, please see the following websites to view the Intelligence Community coordinated Terrorism Information Needs (TINs) and FBI and DHS reporting guidance.”
One of these addresses is for something called LEO, or Law Enforcement Online. When you log onto LEO , you are greeted with a warning.
“You are accessing a U.S. Government information system, which includes this computer, this computer network, all computers connected to this network, and all devices and/or storage media attached to this network or to a computer on this network. This information system is provided for U.S. Government-authorized use only. Unauthorized or improper use of this system may result in disciplinary action, and civil and criminal penalties. By using this information system, you understand and consent to the following: You have no reasonable expectation of privacy regarding any communications transmitted through or data stored on this information system. At any time, the government may monitor, intercept, search and/or seize data transiting or stored on this information system. Any communications transmitted through or data stored on this information system may be disclosed or used for any U.S. Government-authorized purpose.”
The other address is from HSIN, the homeland security information network. ( Is acronym abuse a terror activity?) When you try to connect to the address given, you get this message:
“This Connection is Untrusted. You have asked Firefox to connect securely to, but we can’t confirm that your connection is secure. Normally, when you try to connect securely, sites will present trusted identification to prove that you are going to the right place. However, this site’s identity can’t be verified.” The fusion center will have to get it’s TINs somewhere else.
Pictures for tonight’s entertainment are from ” The Special Collections and Archives,Georgia State University Library”.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: