Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 23-Sep-2010
23-Sep-10 News -- France raises alert level for al-Qaeda terrorism

Web Log - September, 2010

23-Sep-10 News -- France raises alert level for al-Qaeda terrorism

China makes stronger retaliation threats to Japan for arrest of fishing captain

France raises alert level for al-Qaeda suicide attacks

Security measures in France have been stepped up since last week, when evidence came to light that al-Qaeda linked militants are planning an attack.

Frederic Pechenard, director general of police and domestic intelligence services, is quoted by Agence France Presse (AFP) as saying, "I'm not here to frighten people, but we have serious evidence coming from reliable intelligence sources telling us that there is a risk of a major attack."

He indicated that the most likely threats were an assassination bid on an important figure or a bombing of a subway train or department store.

Although security measures have been stepped up, the official alert level remains at "reinforced red." If it were to be increased to the top level, "scarlet," it would mean closing airports and railway stations.

Nigerian kidnappings

The terror threat may be connected to the "fully mobilizing" to free French hostages in Nigeria kidnapped by the north African branch of al-Qaeda, known as Al-Qaeda in the Islamic Maghreb (AQIM).

AQIM has taken credit for kinapping seven oil industry workers in Niger, five of whom are French, according to Bloomberg.

According to Debka, Algeria's intelligence agency has reported to France that AQIM has sent to France and Europe a number of Algerian jihadist women trained to carry out suicide bombings on trains and railway stations.

I've written about AQIM in the past in conjunction with regional terrorist threats carried out in Algeria and Morocco. (See my 2007 article, "Algeria bombings are from new generation of young al-Qaeda terrorists.")

But now AQIM is extending its reach into Europe for two reasons, according to the Debka article:

Because of the conflict with France and the influx of jihadists, AQIM is preparing terrorist attacks targeting France and the rest of western Europe.

Homeland Security: Al-Qaeda terror threat increasing

On the same day that France raised its terror alert, US Director of Homeland Security Janet Napolitano testified before Congress on the increased threat of terrorism.

According to her testimony:

"Today I would like to highlight the main ways in which the terrorist threat to our country is changing - ways that increasingly challenge law enforcement and the intelligence community. I would also like to highlight some specific - though not exhaustive - ways that the Department of Homeland Security is moving to address this evolving threat.

The terrorist threat changes quickly, and we have observed important changes in the threat even since this Committee convened a similar hearing last year. The threat is evolving in several ways that make it more difficult for law enforcement or the intelligence community to detect and disrupt plots.

One overarching theme of this evolution is the diversification of the terrorist threat on many levels. These include the sources of the threat, the methods that terrorists use, and the targets that they seek to attack."

Among the affiliates of al-Qaeda, she mentioned al-Shabaab in Somalia, Tehrik-e Taliban (TTP), headquartered in Pakistan, and al Qaeda in the Arabian Peninsula (AQAP), headquartered in Yemen.

She also indicated increasing danger from "homegrown terrorists" -- terrorist operators who are US citizens, but have been trained in terror tactics by al-Qaeda.

Additional links

China is making stronger threats of retaliation against the Japanese for the arrest of a boat captain fishing in waters around islands claimed by Japan. Chinese Premier Wen Jiabao said: "The Japanese side has paid no heed to China's numerous serious representations, and so China cannot but take necessary countermeasures. If Japan acts wilfully despite advice to the contrary, China will take further actions, and Japan must accept full responsibility for all the severe consequences. Wen called the islands "China's sacred territory." Reuters

In the past four months, the computer virus Stuxnet has infected at least 45,000 industrial control computer systems around the world. These are the computer systems that control things like factories, refineries, and power plants, and there are concerns that the objective of the virus is to control or destroy some particular target. Experts around the world have been trying to reverse engineer the highly encrypted code to determine its intended target. One speculation is that it's already completely its mission by forcing the shutdown of Iran's Bushehr nuclear power plant in August. CS Monitor

Hamas has arrested an unknown number of Palestinians in the Gaza, giving rise to rumors that they'll all be executed for the crime of collaborating with Israel. Media Line (Paragraph corrected, 23-Sep)

How do you amend a country's Constitution? Nicaragua's President Daniel Ortega took advantage of last week's public holiday, when almost the entire country was on vacation, to reprint the constitution, and in doing to made some modifications that he favored. CS Monitor

About 400 people -- researchers, exterminators, vendors, and government housing bureaucrats -- have gathered in Rosemont, Ill., for the first of its kind Bed Bug Summit. Chicago Tribune

(Comments: For reader comments, questions and discussion, see the 23-Sep-10 News -- France raises alert level for al-Qaeda terrorism thread of the Generational Dynamics forum. Comments may be posted anonymously.) (23-Sep-2010) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.