Printer Bomber UPS and FEDEX by Gerald (War Anthropologist)

It seems that the UPS/FEDEX attack has historical roots and much more sinister tactics than have been disclosed.

The address names on the UPS and FEDEX package were Pierre l’Ermite and Diego Gelmírez and the street address was that of only one synagogue in Chicago. ( ERROR IT WAS TWO,G ) Whom are they?

Pierre l’Ermite, is AKA Peter the Hermit, 1050-1115, a French monk. In 1095 he instigated the First Crusade.  With help from the Byzantine emperor Alexius I he and his irregular band took Jerusalem.

Diego Gelmírez of Santiago de Compostela conceived of a N African invasion route intending to unite the reconquest of Spain (from Muslims) with the Crusades to the Holy Land, forming a single Mediterranean-wide crusading theatre.  He was one of the most famous Spanish monk-warriors leading the expulsion of Muslims from Spain.

Why a package on two different carriers?   To increase the chance of success in case one was discovered, and, to double the potential effect of a tactic that would likely be closed off after the attack.

There were three layers of detonation.

SIM card Nokia phones were programmed to answer a call and detonate.  With both packages sent simultaneously by different carriers, they would arrive in the skies over Chicago on two different planes.  Knowing the packages “tracking number” and with online, easy access to arrival times, it would be easy for a caller to keep calling the detonator phone while the two planes flew into Chicago, hoping to down them over the city, causing great destruction below.

They knew approximately when the onboard package-carrying planes would be landing.  By simple calculation, the plotters walked that time backward to the final approach time over Chicago and programmed/wired the phones to detonate using the alarm clock feature.

Finally, if both of those methods failed, detonation would occur at the delivery site, a Jewish synagogue, as soon as the printer was plugged in. ( We reported this feature form our Paradign Intel, G )

No way to stop the attack, no exposure to operatives, no hijackers needed, brilliant and efficient tactics, low cost with massive results.  The attack would be thought of as an accident until the second plane blew up, allowing operatives to escape.

Obviously we have a highly capable, educated and thinking enemy.  The Jihadists are highly aware of their place in history and seek muslim hero status. The current media portrayal of inept amateurs, driven by our government sources is, to say the least, highly underspoken.

We fail to understand the historical context and haven’t even developed a data base of historic enemies of Islam that could be cross checked against passenger lists and shippers.  How could we not have an overwatch that sounds alarms when anything is sent from Yemen to any synagogue in the US?

Clearly the Jihadist are much more nimble and creative than we are.  We continue to be unable to put ourselves into the minds of Jihadists and we remain reactive rather than proactive.  This attack could have worked, attack by proxy.  We can’t keep counting on luck or self-serving allies to save us

END OF FILE END OF FILE.

CARTON CONTENTS INCLUDE:
– personal clothing, ornaments, compact discs and papers.
– one HP Laserjet printer containing an improvised explosive device.

IF DETECTED, ASSUME THAT THE DEVICE IS FULLY FUNCTIONAL AND CAPABLE OF EXPLODING AT ANY TIME. CALL EOD.

If detected, PETN and all other explosive material should be addressed by Explosive Ordnance Disposal (EOD). Pure PETN should be handled in accordance with an official Material Safety Data Sheet or Chemical Sampling Information (CSI) for PETN. An example can be found on: http://www.osha.gov/dts/chemicalsampling/data/CH_260110.html

Security structure of this Cell: New paradigm very dangerous.

Our analysis:

This threat is new, Using new paradigms,  its multiple phased and in-depth, and is backed by redundant systems.

First Paradigm:

NO suicide bomber to screw up this time, automated with redundant triggers. At least two bombs, same target, But multiple targets of opportunity, phone call any time or where, timed ignition, plug in at destination, ignition.

They went to great efforts and this is the first attack with this level of depth and redundancy.

They wanted a “good” strike against the US and this plan assured them of success. Some place two bombs were going to go off, or so they thought. With the expectation of a very high probability of success the package will be laden with finger prints and other forensic evidence.

Somebody is very angry and depressed. And their assurances for success are now a major embarrassment. Just another Epic FAIL on a long line of attempted attacks.

Second Paradigm:

It still looks like they were using money mules to ship goods. And that maybe their weakness.

RBN Russian Business Net, and the FSB are on them, and they don’t adhere to the niceties the US forces do.

The Internet has turned out to be al qaedas Achilles heel. I still expect the bomber arrest with in weeks.

This is al Qaedas Stuxnet equivalent.

The BEST they could do. It involved  the best minds al qaeda has, in terms of bombing technology and Internet savvy. Binny was assured of a success. And just got burned again. Given Bin Ladens personality disorders I expect the next attempt to be sooner rather than later, and more straight forward, and simple, they are desperate for some success. Binny’s little cult has run up a disappointing string of failures. Seems they can’t do anything right. But then they are heavy on psychotics on the HR level.

Internet Anthropologist Think Tank: Bin Laden, Psy disorder
Gerald (War Anthropologist)

About these ads

@surflightroy

Error: Twitter did not respond. Please wait a few minutes and refresh this page.

Flickr

More Photos