Money As A Weapon System-Afghanistan

September 7, 2012

  1. Purpose.

The aim of reintegration is to stabilize local areas by convincing insurgents, their leaders and their supporters to cease active and/or passive support for the insurgency and to become peaceful members of Afghan society. Reintegration will supplement the continuing lethal and non-lethal activities that form a part of counterinsurgency operations. Reintegration will complement efforts to support political, governance, social and economic opportunity within communities. U.S. support for the Afghan Reintegration Programs must be attuned to Afghan culture. The guidance shall refer to a former fighter who has been accepted into ARP as a ―reintegree.

  1. Definitions.
  2. A formal reintegree is defined as an Afghan who has:
  3. Recorded a pledge to cease all support for insurgency in Afghanistan, to live in accordance with the Constitution of Afghanistan, cease violence against the Government of Afghanistan and its international partners, and no longer have material ties to Al Qaeda or affiliated transnational terrorist organizations, and
  4. Been sponsored by a responsible community member, or a government official in cases where the reintegree cannot return to their community.
  5. Reintegration refers to efforts to assimilate fighters and leaders peacefully into Afghan society. Among the individuals to whom this applies are fighters who have been removed from the battlefield as well as those who are detained or incarcerated in U.S. or Afghan facilities, respectively. Although some reintegration programs involve modest stipends for relocation or compensation for services, these stipends will be subject to appropriate safeguards, and in no event will payments be made to reward insurgents for cessation of hostilities.
  6. Reconciliation refers to high-level political dialogue with senior leaders of major insurgent groups such as the Quetta Shura Taliban, Haqqani Network, and Hizb-i-Islami Gulbuddin (HiG), designed to terminate their armed resistance against the Government of the Islamic Republic of Afghanistan (GIRoA). Higher-level reconciliation efforts may allow relatively senior leaders to join a peaceful political process under the Afghan Constitution under the auspices of GIRoA, which should continue to manage these efforts. Funding for the ARP will not be used to support reconciliation requirements.
  7. Key ARP Concepts.
  8. Reintegration programs are Afghan led programs that have the outward appearance of an Afghan driven program consistent with the Afghan constitution and the Afghanistan Peace and Reintegration Program (APRP).
  9. Many Afghan fighters are not ideologically committed to the insurgency; rather they are motivated by grievances, issues of security and/or financial incentives. It is believed that many of these Afghans, along with their communities, will cut their ties to the insurgency, abandon violence, and accept the Afghan Constitution, including respect for human rights once being offered the opportunity to participate in a reintegration program. In addition, Afghan fighters who have been placed in detention or correction facilities may take part in reintegration programs. Motives for reintegration may include initiation of effective grievance resolution processes with the community and individual, the belief in a better life, incentives to pursue that better-life, and disincentives to participate in insurgent or terrorist acts.
  10. The community is viewed as the center-of-gravity for successful and lasting reintegration. As such, the community will be responsible for accepting back reintegrees who wish to reintegrate, and will take responsibility for their progress.
  11. Reintegration efforts should benefit and be provided to peaceful members of a community as well, not just reintegrees, in order to avoid perverse incentives. For example, measures should be taken to ensure peaceful members of a community are able to partake in the dividends of the peace process in order to avoid resentment of reintegree’s who are also benefiting from the reintegration program.
  12. Reintegrees receiving support under the ARP are sponsored by a responsible community member or government official in cases where the reintegree cannot return to their community. In addition, pledges made by reintegrees must be recorded, and the community must accept that the consequence for acts of recidivism will be discontinuation of ARP support in that community.
  13. Effective support for the GIRoA reintegration program will require coordination between Afghanistan’s national and sub-national levels and will require proper oversight. U.S. support must be flexible enough to allow the U.S. Government to respond quickly with resources and policy decisions to field personnel and enable the GIRoA’s reintegration program to capitalize on emerging opportunities. It is imperative that both district and village leadership, as well as the local population, support the proposed project in order to increase the likelihood for success, and that GIRoA is kept informed of all such programs.
  14. Material incentives in the form of transition assistance, job training, and support for grievance resolution are likely to be part of a final GIRoA led reintegration program, and will require international community support for implementation. Both International Security Assistance Force (ISAF) and USFOR-A play important roles in GIRoA’s reintegration program. A robust civilian contribution from the international community of both material and political support will also be important for the overall success of the program.
  15. Vetting is the process by which potential reintegrees are assessed as to whether they will be accepted back into the community. Vetting will be conducted at the community level by local elders and/or village leaders, in coordination with Ministry of Interior (MOI) and National Directorate of Security (NDS). All reintegrees seeking reintegration will have their biometric and identifying data collected by MOI and submitted to the Afghan National Security Force (ANSF), ISAF and UN databases to run background checks and create a record in order to prevent more than one attempt at reintegration. In cases where the reintegree will not be accepted into a specific community, the MOI will process and coordinate moving the reintegree, along with their family if applicable, to a different community within Afghanistan that will support reintegration. The MOI will be the lead agency for collecting biometric and other identifying data with the support of NDS, MOD, ISAF and UN as deemed necessary.
  16. GIRoA is developing an approach to provide amnesty for reintegration candidates. GIRoA is responsible for ensuring it does so in full conformity with local law, international law, treaties and established agreements. This amnesty may be retroactive and probationary in nature. If the participant deviates from the program, the amnesty will be void. If it is determined that a reintegree has committed severe criminal acts, MOI, supported by the NDS, Ministry of Defense (MOD), and ISAF, will deal with the criminal in accordance with Afghan law. A criminal is defined as a person charged with and convicted of a crime, under Afghan law.
  17. In order to support national unity, reintegration efforts should not favor a particular ethnicity. There will be no power-sharing or other arrangements that would offer extra-constitutional governmental authority as a reward for reintegration (effectively rewarding insurgent violence and undermining constitutional processes), and there will be no arrangements that would undermine the authority of GIRoA.
  18. Critical to attracting insurgents to participate in reintegration is a more capable and credible GIRoA, seen as effective by its people, and capable of providing effective security and justice.
  19. The Afghan Reintegration Program, and our support to the APRP using ARP funds, must be transparent and the administrators of the program must be accountable to the Afghan people and GIRoA, and international community.
  20. Although NDAA funds in support of reintegration utilize many of the same delivery mechanisms as the Commander’s Emergency Response Program (CERP), they differ in that the ARP’s primary objective is to support the reintegration of reintegrees. Activities such as vocational training, works projects, education or other projects should only be funded by ARP if they are in support of the peaceful assimilation of reintegrees, leaders, their supporters and their communities who have officially renounced support for the insurgency.
  21. Reintegration does not support any deal that violates the Afghan Constitution, nor does it involve paying potential reintegrees to stop fighting.
  22. Reintegration may involve low-level political and dispute negotiations, but it should not undermine constitutional processes by establishing power-sharing or other arrangements that would offer extra-constitutional government authority as a reward for reintegration, effectively rewarding insurgent violence. Additionally, there should be no arrangements that would undermine the authority of the GIRoA.

Money As A Weapon System

Posted in COUNTER TERRORISM, Uncategorized | Leave a comment


SOURCE: THE KHALIFA– Healthcare in America is a catastrophe. A 2014 survey of the healthcare systems of 11 developed countries found the US healthcare system to be the most expensive and worst-performing in terms of health access, efficiency, and equity. According to the World Health Organization (WHO), the United States spent more on health care per capita ($8,608), and more on health care as percentage of its GDP (17%) than any other nation in 2011. Furthermore, healthcare in America is mostly a private sector of big business, forcing Americans to take out expensive medical insurance even when healthy in order to avoid the risk of huge medical bills when ill.

Yet, even this current level of service is unsustainable. This is because, despite the emphasis on the private sector in America, the government is still responsible for massive healthcare and ‘social’ payments, far outspending other areas of government funding. The Medicare programme alone, which subsidises healthcare spending for the elderly, now exceeds $600 billion in annual government spending whereas, for example, the US military budget, the largest in the world, is just touching the figure of $600 billion. America faces, on one hand, the anger of its people for not doing enough in healthcare and, on the other hand, the prospect of collapse of its financial system for spending far more than it can afford. Democrat and Republican politicians struggle with each other over whether to improve healthcare for the people or whether to safeguard the financial system.

The world should reflect on the predicament of the global superpower being unable to solve for itself this most basic issues. But all Western governments face the challenge of unsustainable ‘social’ payments and this is expected to only worsen with time as the present demographic shift in Western countries is projected to result in a far greater proportion of the older people in society. This is why it is thought that the real reason for the continued calls for ‘austerity’ in recent years has less to do with the 2008 financial crisis than with spiralling, unsustainable ‘social’ costs.

In fact, the budgetary crisis in Western countries is due to a single reason which is the adoption of the Capitalist ideology which promotes freedom of the individual and economic freedom. According to this ideology, man is not responsible for others, and should pay his own way in life. This ideology contradicts reality; all people are not the same as some need to be cared for by others. If individuals were to be left to look after themselves only, then the poor would die off and even the rich would not be able to survive alone. Naturally, Western politicians realise this, so they treated Capitalism with patchwork from the failed Socialist ideology. Socialism also sanctifies freedom of the individual but places the entire burden of supporting the individual upon the state. Hence, the current calamity in Western countries is that government budgets are close to collapsing under the weight of ‘social’ payments for their citizens. The West will be unable to solve these issues as long as they adhere to the idea of freedom of the individual.

Islam, revealed to us by the Creator of man, is beyond the imperfections of man-made ideologies. The rules of the sharia, taken without modification from the detailed evidences of the Qur’an and the Sunnah, provide the correct solutions for man’s problems, fully in accordance with human nature. Allah says in the noble Qur’an:

لَّيْسَ الْبِرَّ أَن تُوَلُّواْ وُجُوهَكُمْ قِبَلَ الْمَشْرِقِ وَالْمَغْرِبِ وَلَـكِنَّ الْبِرَّ مَنْ آمَنَ بِاللّهِ وَالْيَوْمِ الآخِرِ وَالْمَلآئِكَةِ وَالْكِتَابِ وَالنَّبِيِّينَ وَآتَى الْمَالَ عَلَى حُبِّهِ ذَوِي الْقُرْبَى وَالْيَتَامَى وَالْمَسَاكِينَ وَابْنَ السَّبِيلِ وَالسَّآئِلِينَ وَفِي الرِّقَابِ وَأَقَامَ الصَّلاةَ وَآتَى الزَّكَاةَ وَالْمُوفُونَ بِعَهْدِهِمْ إِذَا عَاهَدُواْ وَالصَّابِرِينَ فِي الْبَأْسَاء والضَّرَّاء وَحِينَ الْبَأْسِ أُولَـئِكَ الَّذِينَ صَدَقُوا وَأُولَـئِكَ هُمُ الْمُتَّقُونَ

“Righteousness does not consist in turning your faces towards the east or towards the west; true righteousness consists in believing in Allah and the Last Day, the angels, the Book and the Prophets, and in giving away one’s property in love of Him to one’s kinsmen, the orphans, the poor and the wayfarer, and to those who ask for help, and in freeing the necks of slaves, and in establishing Prayer and dispensing the Zakah. True righteousness is attained by those who are faithful to their promise once they have made it and by those who remain steadfast in adversity and affliction and at the time of battle (between Truth and falsehood). Such are the truthful ones; such are the God-fearing.”

(Surah al-Baqara, 177)

Furthermore, the mujtahidoon have extracted numerous rules from the texts obliging man to provide for others; an obligation that is enforced by the Islamic State. Sheikh Taqiuddin an-Nabahani says in the book, Economic System in Islam, regarding the one who is miserly in his spending:

“So, if someone has property and was miserly when spending on himself, he would be sinful in the sight of Allah. But if he was miserly towards those he is responsible to support, then beside his sin in the sight of Allah, he must be obliged by the State to spend on his relatives whom he is responsible to spend on, and to make sure that his spending on them is ample so that they are provided with a good standard of living.”

Furthermore, he writes:

“If the person was miserly towards those whom he was responsible to support, then those who are entitled for financial support (Nafaqah) have the right to take from his property the amount which normally meets their needs. Bukhari and Ahmad both narrated from Aisha that Hind bint Utbah said:

يَا رَسُولَ اللَّهِ إِنَّ أَبَا سُفْيَانَ رَجُلٌ شَحِيحٌ وَلَيْسَ يُعْطِينِي مَا يَكْفِينِي وَوَلَدِي إِلَّا مَا أَخَذْتُ مِنْهُ وَهُوَ لَا يَعْلَمُ فَقَالَ: «خُذِي مَا يَكْفِيكِ وَوَلَدَكِ بِالْمَعْرُوفِ»

“O Messenger of Allah, Abu Sufyan is a miserly person, and he does not give me that which is enough for me and my children except that which I take without his knowledge.” The Prophet said: ‘Take that which is normally enough for you and your children.”’

So, the Prophet made it a right for her to take that Nafaqah by herself without his knowledge if he did not give it to her because Nafaqah is a duty upon him. And the judge is bound to assign to her this Nafaqah. As it is obligatory that the person who is responsible to pay the Nafaqah, it is likewise obligatory upon the one who takes the nafaqah to spend it on the matters for which it was paid. So, if the Nafaqah was decided to the children, and it was paid to their guardian, whether a mother, grandmother or others, then she has to spend it on them; and if she did not do that then the judge would oblige her to spend it for that purpose.”

Therefore, in Islam, family members are required to provide financial support to each other and the individual is not left to pay for himself. This is fully in accordance with human nature as can be witnessed even in Capitalist societies where many families do still support each other despite this not being mandated by an ideology or  a state. In Islam, it is only when the family as a whole is not able to manage its expenses that the State Treasury, Bait al-Maal, is tasked with their provision. This degree of government spending is wholly manageable, especially given the zakah funds collected by the state and expressly set aside for this and other defined expenditures.

If one wishes to remain sincere to the detailed Islamic texts and not limit oneself to generalities propounded by compromising ‘modernists’, then one has no choice but to reject completely the concept of freedom of the individual, and replace ‘freedom’ with the idea of ‘responsibility’. Success in this life and the next will not come from paying only lip service to Islam while discarding the detailed shari’i rules that truly distinguish Islam from all other deens. The worship of Allah (swt) requires following the detailed rules revealed to His Messenger Muhammad ﷺ without trying to modify these rules through limited and deficient human reasoning. The true Islamic Khilafah State,(Caliphate) established on the method of the Prophet ﷺ, will implement the detailed sharia rules as they exist in the texts and as extracted by the sincere mujtahideen and reject the false fabrications of the disbelievers.

Posted in ISIS | Leave a comment

The EU Army and ISIS- Intelligence Perspective

The goal of allowing this to occur is to create a crisis which will artificially deepen the need for greater European integration into the EU, which is of course mostly controlled by Germany and allows them to control Europe without firing a single shot (so far).

Source: The EU Army and ISIS- Intelligence Perspective

Posted in Uncategorized | Leave a comment

The EU Army and ISIS- Intelligence Perspective


Angela Merkel and those within the EU and German government who are aligned with her are knowingly allowing ISIS operatives to infiltrate the EU, set up networks and stage attacks on European citizens. The goal of allowing this to occur is to create a crisis which will artificially deepen the need for greater European integration into the EU, which is of course mostly controlled by Germany and allows them to control Europe without firing a single shot (so far). Once the crisis has been created, Merkel will use it as an excuse to use the newly formed EU Army to occupy European nations. This army seems to currently be supplied by NATO and NATO officials who are in a position to discover this are showing up dead.

I. German Intelligence is knowingly neglecting to deal with ISIS operatives

In Wikileaks’ recent BND-NSA Inquiry Exhibit. (2014), there was a cache of files from the Bundesamt für Migration und Flüchtlinge (BAMF) or Federal Office for Migration and Refugees.

Firstly, the language of the original German in this document is highly un-PC, showing just how little Eurocrats really care about racial sensitivity behind closed doors. They prefer to use it as a foil to coerce others into submitting to their agendas. The document covers tips that BAMF gives to German intelligence agencies looking to recruit informants from among refugee populations:

The significant portions of this document are as follows:

On page 14:

>We’re looking for accomplices or candidates involved in terrorist activities that have not yet become perpetrators

They are specifically looking for Taliban defectors from Tajikistan, Turkmenistan, Uzbekistan as well as civilians born in Afghanistan and Egypt as well as a few other Middle Eastern countries.

On pages 15-16 they list tiers of individuals they are looking to recruit from:

Tier 1: Males with the following personal features: Aged 18-45, single, lower-middle-class to poor background, lived in refugee camps for a while, poor occupational and societal prospects, sketchy CV, Muslim belief, doesn’t support UMMA (collective community of Islamic peoples).

Tier 2: Individuals with knowledge about suspected terrorist organizations

Tier 3: Individuals that resided in or have knowledge about Al-Azher University, Cairo or the El-Haramein Institute of Culture which is founded by Saudi Arabia and used to promote Wahabbism.

This is highly alarming, because it proves that German intelligence is aware of the fact that there are many individuals among the refugee population that have knowledge of terror organizations, are “defectors” from them or have been exposed to radical Islamic ideologies at certain educational institutions. Why are they not simply arresting these people and preventing them from 1) committing attacks and 2) radicalizing even more males from the refugee population?

Moroccan government officials have stated that they tipped Germany off to the fact that Berlin truck attacker Anis Amri was planning to execute a terror event on German soil:

The article explains that Spanish and French authorities has successfully dismantled terror cells based on information passed to them by Moroccan intelligence. Why did Germany not act? It is because Angela Merkel has a vested interested in creating a crisis by allowing ISIS attacks to occur in the EU.

This apparent policy of letting a wild dog like ISIS run rampant does come back to bite them occasionally however. An German intelligence official working for ISIS was  arrested for helping plot an attack the headquarters of Germany’s domestic intelligence agency, the Bundesverfassungsschutz (BfV):

It is very strange that Germany would be allowing this kind of thing to happen. Unless of course, one views it from the perspective that they might want incidents to occur as a result of neglecting to crack down on known and potential extremists.

II. Germany allows ISIS events to occur to justify occupying Europe with the EU Army

A. The EU Army

Merkel was already trying to form an EU Army before Brexit occurred and accelerated the need to create some kind of force that would allow them to militarily pressure countries into abandoning plans to leave as well. European Union allies of Merkel were lobbying for this force to exist even before Brexit. What people do not realize is that it has already been partially set up:

Already EU technocrats are letting on to the public that the EU Army will be formed “much faster than people think”:

Just a few months ago, Jean Claude Juncker was requesting the establishment of a headquarters for the EU Army to operate out of. An operations center is unnecessary if there is not already a military force to run out of it:

B. NATO arms/vehicles are being used to covertly equip the EU Army

There has been quite a bit of media attention given to recent NATO efforts to posture itself militarily to “stand up to Russian aggression.” A lot of weaponry and heavily machinery has been moved into the EU and Eastern Europe/the V4 (Visegrad Group):

Here is another example of German military assets being moved into Eastern Europe to “counter Russian aggression.” Notice how they mention Trump’s election as an incentive to form an EU Army? Merkel was hoping her friend Hillary Clinton would win power and collaborate to make this project easier:

The Russia narrative is a cover story for the formation and equipping of the EU Army. NATO’s shipments of weapons and vehicles to Europe are not for the purpose of arming the alliance against Russia, but to give that gear to Merkel for her new EU force. Most of this stuff is surplus American military gear, think for example about how many unused tanks we have sitting around due to supposed Congressional incompetence.

There is ample indication that NATO is indeed engaging in this covert supply operation with the EU. The current Secretary General of NATO is Jens Stoltenberg, who allegedly was bought the position by a $584 million bribe from Norway to the Clinton Foundation. He is also alleged to be connected to the recent corruption scandal uncovered in part by the FBI. Here are some sources on that:

Given his ties to corruption and the Clintons, it is plausible that Stoltenberg is willing to collaborate with Angela Merkel, another ally of the Clintons. He is responsible for massively increasing NATO’s budget over the last few years:

**Most damning** is the reported death at that time of Yves Chandelon, the Head Auditor of NATO. He was found dead 140 kilometers from his work and 100 kilometers from his home in the Belgian city of Lens. Despite owning three registered weapons, the gun used to kill him was unregistered:

His death was ruled a “suicide” but his family refuses to believe that conclusion. He had told them that he had the feeling that he was being followed and had also received strange phone calls. His further revealed that he was a happy person and had made several plans for the new year. Not the profile of someone who kills themselves:

Why is his death significant? One of the jobs of an auditor is to make sure goods are actually delivered to their destination. Revenue cannot be recognized until service is performed. What did Chandelon find about weapons and vehicle deliveries that caused him to be murdered? Where would these lost shipments be going, if not to equip and supply another army? The EU Army?

III. How ISIS provides Merkel with an excuse to occupy Europe with her new army

With an EU army formed, Merkel would only need to look for a good excuse to deploy it. The most likely cover story would be to diffuse some kind of “humanitarian crisis.” What exactly might that crisis look like? There could be a number of reasons, such as fighting “far right racism” against minorities for example.

Given the evidence Germany’s complicity in allowing Islamic extremists to enter the EU, was uncovered, the evidence indicates that they are possibly hoping ISIS will stage a major terror incident in one or two locations in the EU, or perhaps across the entire Union. The militaries of multiple countries would inevitably engage in an immediate crackdown following such a severe event and this would most likely focus solely on migrant heavy areas and “no go zones” inhabited by the Muslim minorities in Europe. This would give the EU a perfect humanitarian excuse to justify violating the sovereignty of multiple European nations and centralize power with the EU government, which is mainly German controlled.

Posted in ISIS | Leave a comment

Our Duty Towards The Oppressed | Shk. Usama Abdulghani – DEARBORN USA

Why is the issue of Palestine the most important issue for the Muslim Ummah? Why is attending and supporting the Intentional Day of Quds strategically more important, and how will defeating the zionist regime lead to the end of oppression committed by the puppet regimes, in the Muslim World?


Shaykh Usama AbdulGhani was born in Washington DC. At the age of 20, he traveled to Iran, and began his Islamic education at the Islamic Seminary in Qum, and has studied there for over 20 years. His studies focused on Islamic Law and Principles of Islamic Jurisprudence. He teaches among other subjects Family Ethics in Islam.

Shaykh Usama currently resides in Dearborn, MI, USA with his family, where he is playing a leading role in various community building activities, family counseling while imparting the teachings of Ahlulbayt on a regular basis. He is frequently invited to major cities throughout the world to deliver his message of justice, unity, respect and family values.

Posted in Uncategorized | Leave a comment

Cyber Crime: Dont be a victim

Cyber crime is an unfortunate reality that can affect anyone at anytime. However, if you take steps to protect your information and utilize the latest Internet security technology available, you should be able to protect your information.

Source: Cyber Crime: Dont be a victim

Posted in Uncategorized | Leave a comment

Cyber Crime: Dont be a victim

Cyber crime is an unfortunate reality that can affect anyone at anytime. However, if you take steps to protect your information and utilize the latest Internet security technology available, you should be able to protect your information. The key is to be aware of the dangers and the most effective methods to protect yourself, your information and your money. It is worthwhile to look at the options that are available to enhance cyber security as if you leave it all to chance, you could easily fall victim to cyber crime.

Believe it or not, these criminals do their homework. I’m not talking about the broadly spread, fake bank e-mails you receive daily. These cyber-terrorists actually research your Web site, search for executive’s names, look at your press release page, identify events and refer to them in their messaging. A surprising number of executives click on the attachments or links … and the damage is done. The compromised system looks for other local machines, and because your system is behind your corporate firewall, which is now of no value, it attempts to exploit them through well-known vulnerabilities.

Eventually, the criminals end up infecting the controller’s or accountant’s computer. Once that occurs, they monitor traffic, log connections to your bank and capture your log-in credentials. At that point, you’re done for. Just before your bank’s closing time, the criminals log in to your account and set up a series of wire transfers.

By the time you get to work the next morning, your account is empty. Now you’re left struggling to figure out what happened, and how to get your funds back. Sometimes you catch a lucky break, but more often than not you lose everything.

  • Protect Your Devices 
    The safety of the devices that you use to go online should not be underestimated. Devices commonly used today include computers, mobile phones and tablets. These are all vulnerable to cyber crime. There is always the risk of your device being lost or stolen. Be careful where you keep them and how you carry the devices that are portable. If a thief gets their hands on any of your devices they can easily access your information in most cases, even if you have a password. Computers in particular are vulnerable to hackers and viruses that can break in and access your information without having any physical contact with your device. Make sure that you have powerful antivirus software installed on your computer/laptop and keep a back up of your important files.

  • High Quality Passwords

Studies show that many people choose their passwords carelessly. Your password should be strong enough to prevent other people guessing it but simple enough so that you can remember it. You should ideally use a password that is alphanumeric and it’s a good idea to also use a symbol. Too many people choose their password bearing in mind only their personal convenience. If you use your date of birth, place of birth or wedding anniversary as your password – you are heading for trouble. That is like keeping the doors to your house open at night, with all your valuable things just lying around in the front room of the house. Do you know that there are clever cyber criminals who can create password cracking programs designed to analyze thousands of password possibilities and guess them with reasonable accuracy? You always want to use a password that would be near impossible for someone (or some computer) to guess and never write it down or send it to anyone online.

  • Scam emails

Cyber criminals are wonderful creative artists. The only problem is that they use their creativity to take money from other people’s pocket. Be wary of unsolicited emails and phone calls. The emails are usually drafted so skillfully, that people will easily fall victim to their tricks. Authentic looking testimonials, real letter heads and true logos are used so that even the cleverest of guys will believe in them, but let’s be honest, how could you win the lottery when you didn’t even buy a ticket? You may not believe it but people who fall victim to cyber criminal’s tricks include even police officers and doctors who were relieved of thousands of dollars by these criminals. When it comes to emails that sound too good to be true – they usually are.

  • Check online identities for duplicates

Use a website like to check if your username or other information is being used online without your permission. This is a good way to catch cyber criminals in the act. If your username, mobile number or even your email is being used online by someone else, a simple search on can quickly bring this to your attention so that you can take the necessary steps to correct the situation. You should do this type of check regularly as you never know when someone is out to defraud you of your hard earned money.

  • Separate banking tasks.

Buy a cheap laptop and dedicate it to banking alone. Don’t use it for e-mail, and never browse the internet. Log on to your bank, do your banking, log off, disconnect it from the internet and power it off.

  • Establish secure confirmations.

Ask your bank to implement a positive mechanism, which ensures that unless a wire transfer is pre-notified to them, they must call you for voice confirmation. In the US, this is known as “positive pay.

  • Safeguard the internet.

Establish strict rules for employees regarding their use of the internet. Show them some of the real-world stories about cyber-terrorism and how it can affect their employment.

  • Keep your information safe.

Internet hygiene goes a long way in keeping your information safe. Keep anti-virus programs and patches up to date, and never click on attachments or links in e-mails you don’t absolutely trust.

Keeping your finances in check and your company’s important information under lock and key isn’t as hard as it seems. A few simple steps like those listed above can go a long way in ensuring you never experience the heartbreak of bankruptcy as a result of online vulnerabilities. In the end, the best way to stave off cyber- terrorism is to be armed with the right information and put in place processes that keep you and your company safe.

Posted in CYBER CRIME | Leave a comment

Israel’s All Seeing SkEye – Persistent Surveillance Countering Terror

The system known as SkEye performs Wide Area Persistent Surveillance (WAPS) video surveillance by airborne manned and unmanned platforms. SkEye is a unique, new system that enables security or military forces to constantly and closely monitor an area of interest up to 80 square kilometers large. (the actual size of the area is determined by the sensor’s height). The system uses a single payload integrating multiple cameras that together provides an image of one billion pixels in size.

Source: Israel’s All Seeing SkEye – Persistent Surveillance Countering Terror

Posted in Uncategorized | Leave a comment

Israel’s All Seeing SkEye – Persistent Surveillance Countering Terror

defetnsenews–Elbit Systems unveiled today an advanced capability that has been operational for several years with the military forces of several nations, in homeland security and the war on terror.

The system known as SkEye performs Wide Area Persistent Surveillance (WAPS) video surveillance by airborne manned and unmanned platforms. SkEye is a unique, new system that enables security or military forces to constantly and closely monitor an area of interest up to 80 square kilometers large. (the actual size of the area is determined by the sensor’s height). The system uses a single payload integrating multiple cameras that together provides an image of one billion pixels in size.

SkEye provides real-time, high-resolution monitoring of the entire area, providing up to ten simultaneous areas of interest in real time. In addition, it also provides operators and analysts ‘backtracking’ capability tracing events back in time to detect the origins of related movements and events.
Unlike conventional EO payloads that record and display imagery in specific resolution and magnification as it was obtained at the time of vision (real time) SkEye enables users to simultaneously look at up to 10 Regions of Interest (ROI), using different viewing angles and magnifications (zoom in or out). At any time they can ‘look back in time’ to analyze how a situation unfolds.

SkEye uses a single payload integrating multiple cameras that together provides an image of one billion pixels in size. Photo: Tamir Eshel, Defense-Update

“SkEye is not positioned to replace traditional payloads, but provide a new capability we know as WAPS – it provides a clearer picture in less time, thus exponentially increasing trust in the decision-making process” explain Yair Ganor, business development manager, for persistent surveillance and WAPS at Elbit Systems’ Intelligence & C4ISR division. “While looking over a large Area-of-Interest (AOI), operators can zoom into multiple Regions of Interest (ROI) simultaneously and understand the connection between them. This is achieved without neglecting the rest of the area, which is still being recorded and constantly analyzed.”

At the heart of the system is the airborne segment consisting of the EO sensor unit, an advanced image processing unit, a large mass-storage unit and analysis applications enhancing the imagery with geolocation anchoring of video imagery, video motion detection (VMD), adhering to safe zones and application of multiple target trackers.

Elbit Systems’ Hermes 900 carries the SkEye payload on a test flight. The system can also be operated on light manned aircraft and tactical UAVs such as the Hermes 450. Photo: Elbit Systems.

Via an embedded data link, the relevant information is transmitted from the aircraft to the SkEye, Control, and Management Center (SCMC) that can be located at a fixed site, or transported in a standard 20 foot ISO shelter. The ground segment includes the communications, processing and display systems, as well as a local database saving a short version of history. The fixed installation would have access to longer history for deeper analysis. The ground segment can operate independently or integrate with the customer’s other Command & Control (C2) solutions. The system can also operate with the Ground Eye surveillance system, that provides ground-level surveillance with multi-sensor units covering arcs of 70 to 90 degrees providing similar capabilities – a high resolution ‘all seeing eye’ supporting eight areas of interest and video backtracking capability through the entire area.

SkEye WAPS features a fully-programmable alerting system that allows commanders to be notified of specific/unusual events through a customized alert mechanism. These capabilities complement and enhance SkEye WAPS’ unparalleled persistent surveillance functions, providing operators with an exceptional solution for locating and monitoring different situations.

The solution is operational in several countries, utilizing unmanned platforms such as the Hermes 900 and Hermes 450, as well as various light manned aircraft including Cessna C208 Caravan and Viking Air Twin Otter DHC-6. The aircraft installations are often used over urban areas where access to unmanned systems is limited. Such platforms are more suitable for border and infrastructure security, as well as military persistent surveillance in combat theaters where permissive environment enable continuous loitering of drones.

Elbit Systems will reveal at the 2017 Paris Air Show in Le Bourget, taking place this week, an innovative wide area persistent surveillance solution – SkEye WAPS.

GroundEye persistent surveillance system can cover an arc of 70 degrees, providing continuous coverage of a wide area of interest. It can be operated by a single user. Photo: Elbit Systems
Posted in DEFENSE INDUSTRY | Leave a comment



Posted in Uncategorized | Leave a comment