February 2, 2010
CIA boss Leon Panetta told Congress today that “homegrown extremists” working for al-Qaeda will strike America in three to six months. The recruits will be “clean” and have no traces to the phantom terrorist organization, according to Panetta and other intelligence officials.
“The biggest threat is not so much that we face an attack like 9/11. It is that al-Qaeda is adapting its methods in ways that oftentimes make it difficult to detect,” Panetta told the Senate Intelligence Committee. “It’s the lone-wolf strategy that I think we have to pay attention to as the main threat to this country,” he said.
National Intelligence Director Dennis Blair said changes made since the ludicrous Christmas non-bombing over Detroit “would he able to identify and stop someone like the Detroit bomber before he got on the plane. But he warned a more careful and skilled would-be terrorist might not be detected,” reports the Associated Press.
Within hours of the hyped non-bombing evidence emerged revealing the incident was a false flag attack. “Eyewitness testimony pointing to a man helping the accused terrorist board without a passport, along with an unusual cameraman documenting the attempted attack on board the plane raise more than red flagsâ€“ they point towards an intelligence operation, run as a drill, meant to conjure up public support for a number of fronts in the continuing â€˜War on Terror,'” Aaron Dykes wrote for Infowars.com on December 29, 2009.
Over the weekend British “spies” (as described by the New York Post) reportedly found evidence al-Qaeda is planning to insert “surgical bombs” inside suicide bombers. “Male bombers would have the explosive implanted near their appendix or in their buttocks; women would have them inside their breasts, Britain’s Daily Mail reported over the weekend.”
MI5 said the development was triggered by the introduction of body scanners at airports
Hundreds of terror suspects (read: patsies and mental deficients) have been convicted in civilian federal courts, including convicted shoe bomber Richard Reid who attended the Finsbury Park Mosque in North London. The Finsbury imam at the time was Abu Hamza al-Masri who began working with British Security Services in 1997. A large number of the supposed terrorists convicted in American courts were entrapped by the FBI in classic COINTELPRO fashion and did not have links to the CIA-created al-Qaeda. The entrapped were often fuzzy on al-Qaeda or what it represents.
In 2009, supposed terrorists in New York were so reluctant to participate in an FBI arranged undercover operation they had to be enticed with piles of cash, gifts, and bags of marijuana.
In the media lauded Miami terror case in 2007, the supposed ringleader Narseal “Prince Marina” Batiste “had heard of al-Qaida, but wasn’t sure what it stood for. The FBI instigators made Batiste swear loyalty to al-Qaida; then had him call on his local buddies to form an ‘Islamic army’ in Miami. None had military training. Some could barely read. But Batiste assured the group in the midst of its collective marijuana buzz of greatness ahead,” writes Saul Landau.
During the Senate “terror assessment hearing,” Blair also warned of the growing cyberthreat, saying computer-related attacks have become “dynamic and malicious.”
Blair warned the United States faces a “cyber Pearl Harbor” that will have devastating consequences for America’s technological infrastructure. Blair said an increasingly sophisticated group of enemies has “severely threatened” the country’s information systems and he said the recent cyber attacks against Google should be treated as a “wake up call,” reports Channel 4 News.
The Google attacks, according to an American internet security firm, came from China or its proxies, not al-Qaeda.
The government also expects us to believe the sophisticated and coordinated attack occurring on September 11, 2001, was also the work of medieval terrorists located in remote caves. It was never explained how Osama bin Laden made NORAD stand down.
Likewise, Blair does not tell us how al-Qaeda will take down the most advanced and complex computer networks in the world, presumably from the backwaters of Pakistan’s tribal region.