Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 6-Aug-2013
6-Aug-13 World View -- Fears grow of a next-generation 'underwear bomber'

Web Log - August, 2013

6-Aug-13 World View -- Fears grow of a next-generation 'underwear bomber'

Pakistan accused over terrorist attack on Indian Consulate in Afghanistan

This morning's key headlines from GenerationalDynamics.com

Fears grow of a next-generation 'underwear bomber'


Underwear bomber Umar Farouk Abdul Mutallab serving life sentence
Underwear bomber Umar Farouk Abdul Mutallab serving life sentence

With a number of American embassies closed because of feared al-Qaeda attacks, there are unconfirmed reports that the feared attack could use the next generation of the underwear bomb that was used in the failed Christmas day bombing in 2009. This and other technologies are thought to be developed by Ibrahim al-Asiri, a senior terrorist in Al-Qaeda in the Arabian Peninsula (AQAP), the original developer of the underwear bomb. One technology is a new liquid explosive that absorbed into ordinary clothing that becomes explosive once the liquid dries. Another is a surgically implanted body bomb. It's not thought that current Transportation Security Administration (TSA) measures can detect either of these kinds of bombs, though a TSA official says, "As always, our security posture, which at all times includes a number of measures both seen and unseen, will continue to respond appropriately to protect the American people from an ever evolving threat picture." ABC News

AQAP may be planning attack for Wednesday

There are several reasons why Al-Qaeda in the Arabian Peninsula (AQAP) may be planning a spectacular attack on Wednesday, August 7:

American Enterprise Institute

Pakistan accused over terrorist attack on Indian Consulate in Afghanistan

On Saturday, a suicide bomber attack in Jalalabad, Afghanistan, blue up a marketplace, killed 8 children, killing and wounding dozens of other Afghans. However, this was actually a foiled terrorist attack on the Indian Consulate in Jalalabad. According to an Indian analysis, a range of Indian interests in Afghanistan are being systematically targeted by Pakistan-based terror groups, such Lashkar-e-Taiba (LeT) and the Haqqani Network, and Pakistan's Inter-Services Intelligence (ISI) is directly involved. Afghan officials are openly blaming Pakistan for attacks on Indian targets. Afghan Foreign Minister Zalmai Rassoul stated:

"[Those responsible for the Jalalabad assault] and their financial, ideological and logistical sponsors must realize that they cannot shake the close and strong bond of friendship and partnership between Afghanistan and India through terrorism. Afghanistan will leave no stone unturned to ensure the safety of Indian diplomatic personnel and the Afghan Government is determined to counter the efforts of those inimical to India's friendship with Afghanistan."

India is strengthening its age-old relations with Afghanistan, which is significantly shaking the Pakistan government, where the hope was that Afghanistan could be annexed as a vassal state after the 2014 U.S. withdrawal. From the point of view of Generational Dynamics, as I've written many times over the past several years, Afghanistan is headed for a proxy war between India and Pakistan as part of a major re-fighting of the genocidal war between Sunni Muslims versus Hindus and Shia Muslims that followed Partition, the 1947 partitioning of the Indian subcontinent into Pakistan and India. South Asia Terrorism Portal

(Comments: For reader comments, questions and discussion, see the 6-Aug-13 World View -- Fears grow of a next-generation 'underwear bomber' thread of the Generational Dynamics forum. Comments may be posted anonymously.) (6-Aug-2013) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.