Unity One Inc. Investigations
Criminal Intelligence Report
September 15, 2014
ATTENTION: Nevada Citizens
Counter-Terrorism Tips for the 21st Century Citizen
By John P. Kelleher
In January of this year, a dust covered laptop computer was found by Syrian rebels in northern Syria in an ISIS (Islamic State of Iraq and Syria) hiding place in the Syrian province of Idlib, near the Turkish border. The computer detailed the terrorist group’s plans to develop and use chemical and biological weapons against its enemies, including weaponizing the bubonic plague.
Also included on the laptop is a 26-page “fatwa,” or Islamic ruling, pronounced by Saudi jihadi cleric Nasir al-Fahd, who is currently in prison in Saudi Arabia, calling for the use of weapons of mass destruction against its enemies. As the recent horrendous video tapes showing the brutal decapitations of two American journalists by ISIS terrorists clearly demonstrate, America and its citizens are at the top of the list of ISIS enemies.
Specifically, the fatwa states:
“If Muslims cannot defeat the kafir [unbelievers] in a different way, it is permissible to use weapons of mass destruction… “Even if it kills all of them and wipes them and their descendants off the face of the Earth.”
Inside the computer was also found a 19-page instruction manual in Arabic on how to develop, test and deploy biological weapons, including the bubonic plague. The terrorist’s instruction manual instructs its readers to…"Use small grenades with the virus, and throw them in closed areas like metros, soccer stadiums, or entertainment centers," … adding further instructions such as, "Best to do it next to the air-conditioning. It also can be used during suicide operations." It goes on to note, “The advantage of biological weapons is that they do not cost a lot of money, while the human casualties can be huge.”
Astonishingly, the laptop apparently was not even password protected. Overall, the computer contained almost 1,000,000 pages of text stored under “hidden files” containing a total of 2,367 folders and 35,347 files written in English, Arabic, and French. The laptop information reveals that a Tunisian national, calling himself “Muhammad S,’’ prepared the files after joining ISIS in Syria. He is believed to have studied physics and chemistry at two Tunisian universities.
While it remains to be seen whether terrorist groups like ISIS will be able to develop a viable distribution system for large scale deployment of such weapons, the discovery of this information clearly reveals that use of biological and chemical weapons on a mass scale is not only on their priority list but worse, they have the funding and scientific personnel to actually produce such weapons.
The deployment of a small biological or chemical weapon containing contagious air-born agents could rapidly and effectively kill and injure large population centers in the U.S. and around the world. A small grenade-sized weapon deployed in a crowded area would create a medical catastrophe of epic proportions.
For these reasons, it is time that every American citizen takes responsibility for arming themselves with the skills to notice and report suspicious activities and persons that may be planning or facilitating these kinds of attacks at home and around the globe.
Since its creation in 1948, the nation of Israel has been at the pinnacle of developing and perfecting anti-terrorism strategies and tactics to protect its citizens. The Israeli Defense Force (IDF), Israel’s military defense, developed a list of common and specific traits and activities that can be used to identify a potential terrorist before he or she actually strikes. For example, suicide bombers typically display the following signs:
- Rigid staring straight ahead;
- Robotic walk, (due to weight of bomb vest);
- Low and controlled breathing or panting similar to child birth breathing;
- Nervous behavior or Tics- people in last moments of life may be scared, anxious, or on drugs;
- Freshly shaved men, with pale skin on lower half of face indicating evidence of recent beard removal;
- Heavy or oversized clothing used to hide a bomb jacket or other weapon, especially when inappropriate for environment;
- Carrying a large bag or backpack (for dynamite, explosives, and grenade).
- Hands in the bag;
- Mumbling prayers, chants or songs (Many terrorist attacks to date have been inspired, motivated by, or validated by religion, the most predominant of which in recent decades is fundamentalist Islam, the religion of terrorist groups like ISIS, Hamas and Hezbollah).
- Leaving a bag, backpack or brief case unattended in a crowded area and then walking away
One of the US Department of Homeland Security’s mottos for citizen reporting is “If You See Something, Say Something.” In order for citizens to effectively deter future attacks like the ones found in the ISIS laptop in Syria, it is vital that we all learn basic counterterrorism skills. These skills include knowing what to look for, how to train our observational skills to remember specific information, and knowing where and how to report suspicious activity if we see something that doesn’t look right.
Some common activities that may fall under the suspicious category and worthy of reporting include:
- Surveillance activities, such as recording or monitoring activities by use of cameras, note-taking, drawing diagrams and/or maps;
- Security testing, including attempts to measure reaction times of security, penetrate physical barriers, monitor procedures, and assess security capabilities;
- Acquiring supplies, including purchasing or stealing weapons, explosives, ammunition, equipment, uniforms, decals, badges, passes and flight manuals;
- Information elicitation, including attempts to gather information about operations, infrastructure, or people by mail, email, phone, or in person;
- Staging and rehearsal, including positioning people in strategic locations and moving them around according to their plan in order to practice the terrorist act;
- Deployment of people and supplies, including positioning them to actually commit the act. This would be the last opportunity to alert authorities before the terrorist act occurs.
Other suspicious things to look out for and report include:
- People who don't seem to belong in the workplace, neighborhood, or in a particular building or area;
- Suspicious large cash transactions, payments, deposits, or withdrawals;
- Unauthorized personnel entering a restricted area or impersonating authorized personnel such as police, security, or maintenance;
- Presenting false or misusing documents and/or identification to hide a person’s true identity or affiliation;
- Stealing uniforms, badges, identification passes, emergency vehicles, technology, or documents which are proprietary to a facility;
- Cyber-attacks on computer technology or infrastructure.
It is crucially important that if you observe any of these types of activities or behavior, you report it as quickly as you can to the FBI, Homeland Security and/or local law enforcement. All of these agencies are networked to combat terrorism and have hotlines and websites available to report suspicious activity. However, under no circumstance should you ever attempt to engage with or stop such people on your own. Leave that to the professionals and remember, your safety comes first.
Since 9-11, we live in a world where terrorism is a daily reality. Every citizen must accept this sad fact and learn to combat the threat of international and domestic terrorism by learning what to look for and how and where to report suspicious activity when it occurs. By doing this, we will not only assist our law enforcement agencies by providing vital information but we may even thwart a terroristic attack in the future by arming ourselves with tools to notice and report such activity before it’s too late. Stay diligent. Stay safe. Remember, if you see something, say something.
- Death on a Laptop– by Dr. Steve Elwart