Homeland Security Network Blog

The information source for first responders.

Isis send warning message to US

5825 Hits


ISIS camps have now been discovered directly across the U.S. border with Mexico by MICHAEL SNYDER | ECONOMIC COLLAPSE | APRIL 15, 2015 ISIS camps have now been discovered directly across the U.S. border with Mexico, ISIS operatives have been captured illegally entering the United States, and ISIS is threatening to conduct a massive campaign of terror against U.S. targets, and yet Barack Obama and his underlings continue to insist that “right-wing extremists” are the greatest terror threat that this nation is facing. One recent survey found that 84 percent of all Americans believe that ISIS is a “direct threat to the USA”, but Obama refuses to secure our borders and he is even allowing dozens of American citizens that fought for ISIS overseas to come back into this country. What in the world is Obama thinking?  Even though ISIS has promised to drown all of us in our own blood, the Obama administrationhas purged virtually all references...

Continue reading
6513 Hits



WIN A MACBOOK PRO!   WIN A MACBOOK PRO: Raffle to be held on May 25th 2015 * Subject to having 100 participants   There are two ways to be among the first 100 people – automatically entered into a grand raffle which will be held in our Office on May 25th 2015.     Sign up and register for the Counter Terrorist Magazine’s Homeland Security Conference and Expo that takes place on November 3-4th 2015 in Orlando at the Florida Hotel and Conference Center – Get the discounted rate of only $199.00 if you do this before April 30th.  Register Here More information on this year’s conference: Click Here OR Help us get the word out to your colleagues by forwarding this email to at least 100 of your contacts. Once you have done that please send me an email This email address is being protected from spambots. You need JavaScript enabled to view it.  and you will be entered into the raffle automatically, Looking forward to seeing you or...

Continue reading
9337 Hits

GLOCK Releases Single Stack 9mm Concealed Carry – The New G43


  FOR IMMEDIATE RELEASE   Mar. 20, 2015   Media Contact: Kie Wagner, GLOCK, Inc. 770-432-1202 or This email address is being protected from spambots. You need JavaScript enabled to view it.   GLOCK Releases Single Stack 9mm Concealed Carry – The New G43   SMYRNA, Ga – (Mar. 20, 2015)  - Today GLOCK, Inc. announced the release of the new GLOCK single stack slimline 9mm pistol, the GLOCK 43. The G43 is the most highly desired and anticipated pistol release in GLOCKs history. Designed to be the answer to everyday concealed carry needs, the G43 is ultra-concealable, accurate, and comfortable for all shooters, regardless of hand size.   “The G43 is the most exciting product release to date because it addresses a variety of issues that many shooters face with pistols in the concealed carry category,” stated GLOCK, Inc., VP Josh Dorsey. “It will be the pistol of choice for law enforcement and civilians. The G43 sets a new standard for concealed carry pistols.”...

Continue reading
6510 Hits

ISIS death-cult tells Aussie supporters how to sidestep government internet scrutiny

Death wish ... Melbourne suicide bomber Jake Bilardi (centre) was killed while fighting i
Global threat ... experts describe the guide as “what you’d learn in a basic intro traini
Recruited ... Melbourne teen Jake Bilardi became radicalised after watching Islamic State

By News.com.au AUSTRALIAN terror supporters have been handed explicit instructions on how to avoid leaving a digital fingerprint. Days after the Federal Government passed contentious new laws, allowing security agencies to access two years of an individual’s metadata, News Corp Australia has sighted documents on recommended internet behaviours for “pro-IS sympathisers”. The 60 text files, uploaded in Arabic by a Twitter user which News Corp has verified but chosen not to name for legal reasons, contain instructions on how to dodge online government security apparatuses monitoring people linked to the death cult. “It’s almost like a stay safe online guide for jihadists,” said Lee Mansfield, the practising manager for Cyber Security for Thales Group. “These are standard things that have always been a problem for organisations trying to get information.”   Death wish ... Melbourne suicide bomber Jake Bilardi (centre) was killed while fighting in the Iraqi city of Ramadi.Source: Supplied Islamic...

Continue reading
5757 Hits

In Good Faith? No Nukes for Iran!

5249 Hits


ISSN 2334-3745 115 February 2015 PERSPECTIVES ON TERRORISM Volume 9, Issue 1 Counterterrorism Bookshelf: 16 Books on Terrorism & Counter-Terrorism-related Subjects Reviewed by Joshua Sinai This column consists of capsule reviews of books published by various publishers, with the authors listed in alphabetical order. Please note that most of these books were recently published, with several published over the past several years but deserving renewed interest. Yaniv Barzilai, 102 Days of War: How Osama bin Laden, Al Qaeda & the Taliban Survived 2001 (Washington, DC: Potomac Books, 2013). 194 pp., US $ 19.96 [Hardcover], ISBN: 978-1612345338. A detailed, authoritative and extensively footnoted account of how al Qaida, led by Osama bin Laden, succeeded in escaping from Afghanistan into Pakistan, following the United States-led intervention that overthrew the Taliban regime in late 2001. The book also chronicles the Pakistani government’s efforts to assist the Taliban’s retreat into Pakistan. Al Qaida and the...

Continue reading
5649 Hits

Free Webinar: The Convergence of Physical and Cyber Security: attacks, threat vectors and responses

Cover 2

REGISTER   The Convergence of Physical and Cyber Security: attacks, threat vectors and responses With the hottest thing being the “Internet of things”, and cyber control of physical devices escalating, a new era of vulnerability is being created where a cyber attack will be more than an attack on computers. It will increasingly consist of taking over devices. No one is more vulnerable to that than your security implementation: access control, cameras, alarms, bio metric identification and other security hardware. David Wallace of Surveillance One, in conjunction with physical security specialist Security Solutions International SSItm will deliver an overview of the full two-day program.Topics include how hard security devices at critical infrastructure and other sites can be compromised through Cyber-Attack and revealing the vulnerability of IT Networks via an attack through the physical security hardware.  Current examples include breaches of airport access controls, pipeline disruptions, power outages, and critical infrastructure SCADA control devices seized by foreign...

Continue reading
5526 Hits

Measuring the Effectiveness of Israel’s ‘Targeted Killing’ Campaign

Measuring the Effectiveness of Israel’s ‘Targeted Killing’ Campaign by Ophir Falk ISSN 2334-3745 2 February 2015 PERSPECTIVES ON TERRORISM Volume 9, Issue 1 I. Articles Measuring the Effectiveness of Israel’s ‘Targeted Killing’ Campaign by Ophir Falk Abstract With targeted killing long becoming a key and perhaps primary counterterrorism measure used by a number of States in their confrontation with lethal terror, this article looks at the pros and cons of this method of warfare while focusing on the underlying justification for its use–namely its objective driven effectiveness. Israel’s use of targeted killing, intended to mitigate Palestinian suicide terrorism during the first decade of the 21st century, serves as the key case study in this article. A quantitative approach was adopted, using growth model analysis, and isolation of designated area, to demonstrate the effectiveness of targeted killing in reducing fatalities caused by suicide bombings. The period examined was from 2000 to 2010,...

Continue reading
4508 Hits

Most Cyber Attacks Occur From This Common Vulnerability

Time Clark As you read this, hackers are working diligently to uncover avenues, inroads and byroads to get into your confidential corporate data. I know what you’re thinking. You’ve heard this all before, your company isn’t vulnerable and you already took care of it. Are you sure? Time for a reality check. Even if you figured out how to plug holes in your networks, the hackers may be gaining access through applications and solutions. Sure, many organizations have significant network security in place but it’s not enough as 84% of all cyber-attacks are happening on the application layer. This final security frontier, the application layer, was a hot topic during a recent SAP Radio broadcast where three security experts weighed in on the threat of cyber-attacks and offered ideas on how to prevent them. While software is enabling really exciting and cool things, like connected cars and robotic vacuums, this pervasiveness...

Continue reading
4673 Hits

Testimony turns to MIT officer’s death in bombing trial


By Milton J. Valencia Nathan Harman , recounting his story publicly for the first time on Wednesday, told a federal jury that he was riding his bike through the MIT campus in Cambridge one night two years ago when he came upon a strange figure. The man was leaning into a police cruiser. The driver’s-side door was open, and the window down. “He sort of popped up, stood up, and turned around. He looked startled,” said Harman, a 24-year-old graduate student. The person was thin, and tall, but not as tall as Harman, who is six feet. He had a sweater with an emblem on the front, was wearing a hat, and something about his nose was remarkable. In federal court in Boston Wednesday, a visibly nervous Harman saw that man again: Dzhokhar Tsarnaev, the surviving Boston Marathon bomber. Harman pointed and declared, “That’s him, he has a blue shirt on.”...

Continue reading
4901 Hits

Hear the Chilling Audio From an Islamic State Terror Suspect Captured in the U.S.

By: Zach Noble The Islamic State’s supporters have a message for America: They’re in your country, in your state, ready to wage jihad on American soil. One Islamic State supporter, Christopher Cornell, called three times from jail to make sure that message was heard in an unexpected interview with WXIX-TV. The 20-year-old Cornell, who refers to himself as Raheel Mahrus Ubaydah, was arrested as part of an undercover FBI investigation in January after he bought two rifles and 600 rounds of ammunition for a planned attack on the U.S. Capitol, authorities said. The Ohio man is being held at the Boone County Jail in Kentucky, and on Thursday he got in touch with WXIX reporter Tricia Macke after calling the television station three times from his cell. What Cornell said in the interview was so blunt and disturbing, his attorney tried to get a judge to prevent WXIX from airing the...

Continue reading
5616 Hits

MEMRI TV, Egyptian Muslim Cleric, "Boston Bombs A Message" (Supporters Of Terrorism)

5145 Hits

Online HLS Master's or Certificates from Penn State

Penn State World Campus

    Friend, Did you know that Penn State has been offering quality online education in Homeland Security for the past 9 years? The program has grown to become the nation's most comprehensive online homeland security portfolio with master's degree options and graduate certificates in 5 areas of specialization: homeland security base programagricultural biosecurity and food defensegeospatial intelligenceinformation security and forensicspublic health preparedness Whether you choose to start with a single online course or begin working on a certificate or master's degree right away, there are many advantages to our program, such as: Online courses — Our courses are 100% online, allowing you to study wherever and whenever you want.Flexibility — If you choose, you can continue to work in your current job and apply your newly acquired knowledge along the way, allowing for a richer learning experience. Or, schedule more classes and finish your degree faster. Read more about all...

Continue reading
7669 Hits

ISIS goes global

By Peter Bergen, CNN National Security Analyst (CNN)In the past eight months, ISIS has seeded itself in some dozen countries around the globe. Indicative of this was the announcement on Saturday that the Nigerian terrorist group Boko Haram had pledged its "allegiance to the Caliph of the Muslims," ISIS leader Abu Bakr al Baghdadi. The global spread of ISIS raises key questions about whether these new affiliates signal an intensification of the threat of terror. It also has important implications for the debate in Congress over Obama's request for a new authorization to fight ISIS. Lt. Col. Michael Waltz, a U.S. Special Forces reserve officer who has just returned to the States after advising the Nigerian Ministry of Defence in its fight against Boko Haram, told me, "So far the pledge (to ISIS) seems to be legit." Waltz says there is some debate about the timing of the pledge, because Boko...

Continue reading
5683 Hits

Ohio Muslim says he would have shot Obama, attacked Israeli embassy


BY ROBERT SPENCER An earlier Associated Press story says that he “wanted to be addressed by his Muslim name, Raheel Mahrus Ubaydah, and to have access to a prayer mat and a clock in jail so he could continue his religious practices.” But the headline of this one calls him Christopher Lee Cornell, in keeping with the constant mainstream media practice of minimizing and downplaying the Islamic character of Islamic jihad terrorism. Note also that in this story he also says that “support of the Islamic State group is widespread. ‘We’re here in Ohio, we’re in every state,’ he said. ‘We’re more organized than you think.'” This is because mainstream analysts are too busy denying that the Islamic State is Islamic to study why it has so much appeal among young Muslims in the West. “Christopher Lee Cornell, Ohio Terrorism Suspect, Says He Would Have Shot Obama,” by Lisa Cornwall and...

Continue reading
4705 Hits

Win a MACBOOK Pro!

So we are making it fun for you to come and join us by offering up the following amazing Raffle Prize. A MACBOOK PRO will be raffled off on the 15th of March to the first 100 people that do the following:  1. Download the Alexa toolbar a month. Here are the instructions  2. Create an automatic open in the Browser for the Homeland Security Network or make it your favorite for a month.  3. Like us on Facebook! Click Here 4. Send us an email to say you have taken those steps! This email address is being protected from spambots. You need JavaScript enabled to view it.   That’s it, we will place your name in a Raffle for the MACBOOK PRO, a $1300.00 valueand you HAVE A 1 to 100 chance of winning. Even if you have never won a raffle before, you can win this one!  

6753 Hits

It’s the Chicken watching the Fox when it comes to the Obama administrations negotiations with IRAN

By Henry Morgenstern- Homeland Security Network. Yesterday’s speech by Benjamin Netanyahu served to reinforce what we all know – Iran cannot be trusted. Netanyahu’s insistence that they need the deal more than the US does and that the US should leave the table until they comply.  That just like in a Persian Bazaar if  you walk out of the store while haggling you will get a better deal ( Iranians/Persians invented haggling in their bazaars) and all who have been to the Middle East know this but no-one in Washington seems to, least of all the woman entrusted with these most dangerous talks. We have not asked if we can trust our own US administrators with such a perilous negotiation that could lead to a Global war if botched. Put aside the legacy issue of a lame duck President, trying with all his power to circumvent the big majority his opponents...

Continue reading
5949 Hits

ISIS Chemical Weapons Libya: Military Warns Islamic State Might Have Mustard Gas, Sarin


By Cristina Silva   Islamic State fighters in Libya allegedly have seized large amounts of chemical weapons, including mustard gas and the nerve agent Sarin, the Libyan military charged. “Unfortunately [chemical weapons] exist in locations known to the militias, who have seized large amounts of them to use in their war against the [Libyan] army,” a Libyan military official told the London daily Asharq al-Awsat. ISIS fighters near Tripoli have begun testing the weapons that reportedly once belonged to the former regime of Moammar Gadhafi. “Before his death, Gadhafi left approximately 1,000 cubic tons worth of material used for manufacturing chemical weapons and about 20,000 cubic tons of mustard gas,” the military official said. The weapons are likely 10 years old and in a degraded state, but remain dangerous, former British Army officer Hamish de Bretton-Gordon told The Daily Mail Sunday. "While we don’t know how much IS has acquired, and...

Continue reading
6227 Hits

Mall Terror: Lone Wolf Threat Is Real, Say Officials

BY TOM WINTER AND ROBERT WINDREM ficials say publicly there is no "credible threat" of an attack on America's shopping malls, despite an on-line "call to action" by terror group al Shabab -- but behind the scenes authorities are taking the threat seriously, because previous calls to action have been heeded by violent "lone wolves." Last October a soldier was shot and killed in Ottawa just steps from Parliament in what Canadian officials called a terrorist act. The FBI says a bloody hatchet attack on NYPD officers the same month was also terrorism. Both attacks came after ISIS urged lone offenders in the West to attack "soldiers, patrons and troops" and members of law enforcement. "Calls to action are a way a terrorist group like al Shabab can project itself without expending resources," said a U.S. counterterrorism official. "It's a way to awaken and embolden those who may not be in...

Continue reading
5147 Hits