Tag Archives: virus

Digital Culture Killed My Dog

anonymous-16114-400x250This week, aaronJacob and I examine the state of the digital world, wondering whether our state of technological growth is a good thing or a bad thing, much the same, or if that growth is perhaps a little overstated. Is it making us mentally unstable? Does it help us escape or confirm our biases? Does new technology annihilate old modalities? We’ll spend our electronically-scored time delving into as many aspects of our collective computer culture and online ouvre as we can in two hours, everything from viral videomemes and remix art to pitched copyright battles and very real cyberwars, piracy and hacktivism to censorship and surveillance. Not to mention the insidious, darkest corners of the web; conspiracy, violence, cyberbullies, trolls,  and even hauntings.

Stranger in a Strange Land 2013-01-19: Digital Culture Killed My Dog by The Stranger on Mixcloud

PLAYLIST
In the Hall of the Mountain King – Galaxee Trance
Katamari on the Swing – We Love Katamari Soundtrack
my favorite james taylor song – (8BitPeoples) yuppster
Hard Reset – Eats Tapes
Gimme the Mermaid – Negativland
Circumlocution – The Quiet American
Human After All (Alter Ego Remix) – Daft Punk
Scratch Bass – Lamb
Slow This Bird Down – Boards Of Canada
Verbal (Prefuse 73 Dipped Escalade mix) – Amon Tobin
Roboshuffle – Kid Koala
Spread Teamer – Yip-Yip
Super Mario Bros. Dirty Mix OC ReMix – A Scholar & A Physician
Spy vs Spy II (Drunk n’ Basement Mix) – 8-Bit Weapon
Lavender Town – Pokemon
Clocktown Backwards – Majora’s Mask
Wood Man Theme – Mega Man 2
Town (Day) – Castlevania 2
Hydrocity Zone Act 1 – Sonic the Hedgehog 3
no more memory – cyriak
Return of the God – Dreadnots
A Huge Ever Growing Pulsating Brain That Rules From The Centre Of The Ultraworld – The Orb
CHange FRom ONe FOrm TO ANother – The Royal You
Upgrade (A Brymar College Course) – Deltron
Sattellite Surfer – F/i

January 18 marks an online holiday: Internet Freedom Day, or#InternetFreedomDay. The day a massive online protest successfully defeated the Stop Online Piracy Act (SOPA) and the PROTECT-IP Act (PIPA). But as the EFF points out, we must remain ever-vigilant against such threats:

  • Stop the Trans Pacific Partnership
  • Demand Patent Reform
  • Reform Draconian Computer Crime Law
  • Protect Cell Phone Location Data
  • Stop new Internet Surveillance Laws

We recognize the value of fair use when artists are free to express their creative, political and social statements by repurposing and remixing such classics:

Whatever new aesthetic form our digital art takes, such as data moshing or augmented reality. Heck, there is even value to preserving the nature of piracy in some regard.

So while our leaders are trying to convince us that foreign entities and idealistic individuals are to blame for the viruses and espionage around the globe, but in reality our own massively overpowered governments are spying and prying into our personal affairs, unleashing damage and persecuting the free every day.

In response to a FOIA request, the FBI sent the ACLU of empty and redacted pages (PDF), providing zero insight into what this policy actually is. The FBI says that information is “private (privileged) and confidential.”

“The Justice Department’s unfortunate decision leaves Americans with no clear understanding of when we will be subjected to tracking—possibly for months at a time—or whether the government will first get a warrant” ~Catherine Crump, an ACLU staff attorney

All this while human rights monitors document the rise in surveillance and censorship technology being exported from America to other (arguably) more repressive nations.

Human rights monitors have documented the use of US-manufactured Internet surveillance and censorship gear in 21 countries, some with checkered human rights policies such as Syria, China, and Saudi Arabia. Afghanistan, Bahrain, China, India, Indonesia, Iraq, Kenya, Kuwait, Lebanon, Malaysia, Nigeria, Qatar, Russia, South Korea, Singapore, Thailand, Turkey, and Venezuela. Egypt, Kuwait, Qatar, and the United Arab Emirates. The technology isn’t subject to US State Department export restrictions except to countries such as Syria, Iran, and North Korea (all on an embargo list).

So while we idly worry about threats to our online privacy, diligent crusaders and information liberators are actively targeted by government prosecutors.

Reddit co-founder and internet freedom activist Aaron Swartz tragically committed suicide on January 11, 2013. He had been arrested and charged back in 2009 for having downloaded a massive cache of documents from JSTOR., and was facing up to 13 felony counts, 50 years in prison, and millions of dollars in fines. MIT and JSTOR had already settled over the ‘Terms of Use’ breach, but prosecutors only dropped the charges after his death.

Prosecutors allege that Swartz downloaded the articles because he intended to distribute them for free online, though Swartz was arrested before any articles were made public. He had often spoken publicly about the importance of making academic research freely available. His actions were criminalized under the federal Computer Fraud and Abuse Act (CFAA), an act was designed to prosecute hackers.

JSTOR did acknowledge it was “deeply saddened” by the Swartz tragedy.

“The case is one that we ourselves had regretted being drawn into from the outset, since JSTOR’s mission is to foster widespread access to the world’s body of scholarly knowledge,” the organization wrote in an unsigned, undated statement. “At the same time, as one of the largest archives of scholarly literature in the world, we must be careful stewards of the information entrusted to us by the owners and creators of that content. To that end, Aaron returned the data he had in his possession and JSTOR settled any civil claims we might have had against him in June 2011.”

Law professor Lawrence Lessig, a friend and mentor to Swartz, wrote a post called “Prosecutor as Bully”:

The question this government needs to answer is why it was so necessary that Aaron Swartz be labeled a “felon.” For in the 18 months of negotiations, that was what he was not willing to accept, and so that was the reason he was facing a million dollar trial in April — his wealth bled dry, yet unable to appeal openly to us for the financial help he needed to fund his defense, at least without risking the ire of a district court judge. And so as wrong and misguided and fucking sad as this is, I get how the prospect of this fight, defenseless, made it make sense to this brilliant but troubled boy to end it.

Fifty years in jail, charges our government. Somehow, we need to get beyond the “I’m right so I’m right to nuke you” ethics that dominates our time. That begins with one word: Shame.

They don’t prosecute Wall Street for destroying the world’s economy, they don’t prosecute HSBC for laundering billions for the drug cartels and terrorists, and they don’t prosecute war criminals. But they’ll prosecute Aaron Swartz, Bradley Manning and other activists.

Some Senators are demanding answers:

Rep. Zoe Lofgren (D-CA) introducedAaron’s law,” which would reform the Computer Fraud and Abuse Act that was used to prosecute Swartz. Another member of the House Judiciary Committee, Darrell Issa (R-CA), said he wanted to investigate the actions of the US Attorney who authorized the prosecution, Carmen Ortiz of Massachusetts.

Sen. John Cornyn (R-TX) sent a letter this morning to Attorney General Eric Holder, suggesting the case against Swartz may have been retaliation for prior investigations of Swartz, or his use of FOIA.

But US Attorney Carmen Ortiz released a statement defending her prosecution of Aaron Swartz, calling it an ‘appropriate handling of the case’, even though many are claiming that it may have prompted the 26-year-old’s suicide.

“At no time did this office ever seek – or ever tell Mr. Swartz’s attorneys that it intended to see – maximum penalties under the law,” Ortiz said. She claims she would have recommended that the judge offer a deal that came with six-month prison sentence in a low-security setting.

Elliot Peters, Swartz’s lawyer, said that prosecutors planned to argue for a seven to eight year prison sentence if their client had rejected the six-month offer.

So while Zoe Lofgren’s terrific changes are a good start, the EFF vowed to continue Aaron’s work and ‘attack‘ the obsolete, vague, and abused computer and communications laws:

EFF vows to continue his work to open up closed and entrenched systems that prevent ordinary people from having access to the world’s knowledge, especially the knowledge created with our tax dollars… to attack the computer crime laws that were so horribly misused in the prosecution of Aaron.

First, [to] ensure that when a user breaks a private contract like a terms of service or other contractual obligation or duty, the government can’t charge them criminally under the CFAA or wire fraud law—two statutes the Justice Department used against Aaron.

The second set of changes ensures that no criminal liability can attach to people who simply want to exercise their right to navigate online without wearing a digital nametag. It ensures that changing a device ID or IP address cannot by itself be the basis of a CFAA or wire fraud conviction.

Meanwhile, a group of online archivists released the “Aaron Swartz Memorial JSTOR Liberator.” The initiative is a JavaScript-based bookmarklet that lets Internet users “liberate” an article, already in the public domain, from the online academic archive JSTOR. This is in the hope that free knowledge can be taken from behind academic paywalls and put into the public domain, to liberate information and do to publishing what has already been done to other forms of media.

But as Swartz’s and other “hacktivist” cases demonstrate, you don’t necessarily have to be a hacker to be viewed as one under federal law. Are activists like Swartz committing civil disobedience, or online crimes?

  • Publishing Documents – Accessing and downloading documents from private servers or behind paywalls with the intent of making them publicly available.
  • Distributed Denial of Service  – Some web activists have pressed for DDoS to be legalized as a form of protest, claiming that disrupting web traffic by occupying a server is the same as clogging streets when staging a sit-in. A petition started on the White House’s “We the People” site a few days before Swartz’s death has garnered more than 5,000 signatures.

“Distributed denial-of-service (DDoS) is not any form of hacking in any way. It is the equivalent of repeatedly hitting the refresh button on a webpage. It is, in that way, no different than any ‘occupy’ protest.”

  • Doxing – Doxing involves finding and publishing a target’s personal or corporate information.
  • Website Defacement

As we’ve seen, hackers can be a lot more benefit than harm, and the internet, if it is to be the most democratizing system on the planet, must allow for radical transparency of information. Even if you disagree with much of it, or find the bulk of it stupid or offensive. Reactionary censorship and oppression are never righteous, or even permanently effective, solutions.

Stranger in a Strange Land 2013-01-19: Digital Culture Killed My Dog by The Stranger on Mixcloud

~The Stranger
thestranger@earthling.net

“whether we know it or not, all of us are being influenced by the net. The machines have changed everything in our lives. As you know, if you use the internet, there is a tremendous evil available at your fingertips. Do not- DO NOT allow the machines to take control over your lives. Don’t do that.”

~Bill O’Reilly

“the Internet is not something that you just dump something on. It’s not a big truck. It’s a series of tubes.”

~Ted Stevens

Advertisements

A Better Amercia

PLAYLIST
In The Hall of the Mountain King – Umphrey’s McGee
Dark End of The Street – The Flying Burrito Brothers
Shelcha – Yael Naim
Computer Games – Yellow Magic Orchestra
Clectric Café (Neotericz) – 8-Bit Operators
WTF? – OK Go
Super Brothers (Love Device Mix) – Guitar Vader
Rubber Band – Trammps
Brothers On The Slide – Cymande
Fascination – David Bowie
Strawberryfire – The Apples In Stereo
Raid (Instrumental) – Madvillain
Trouble (Eve of Destruction) – Blackalicious
The Evil that Pens Do – Extended Famm
White Flag (feat. Bashy, Kano and the National Orchestra for Arabic Music) – Gorillaz
One Day – RJD2
Golden Rule – Erin Anova & the Maroons
Funk Em – Hieroglyphics & Del The Funky Homosapien
Past Zero Time – Dark Matter
Sessomatto – Armando Trovaioli
The Sophisticated Hippie – Horace Silver (Easy Mo Bee)
Always True to You in My Fashion – George Shearing & Peggy Lee
La Vieille Meurt – Alain Goraguer
Waiting For The Worms/Stop/The Trial/Outside The Wall – Pink Floyd

Stranger in a Strange Land 2012-06-02: A Better Amercia by The Stranger onMixcloud

While the socialist-Maoist-Marxist-Trotskyite-Stalinist-communist-pinko-red-hippie John McCain badmouthed capitalism as ‘cruel’, and Bill Clinto went off-message on private equity, the old guard of Republicans (RINOs) futilely try to inject their reasonable wisdom into an insanely destructive party. Former Sen. Alan Simpson (R-WY) has lashed out at members of his party for their unyielding obstructionist opposition to new tax revenues.

“The only thing [SuperPAC money] can do to you, as an elected official, is defeat you for reelection. And if that means more to you than your country when we need patriots to come out in a situation when we’re in extremity, you shouldn’t even be in Congress.”

In America, a disturbing number of people seem to think that the impoverished are degenerates who deserve their fate and none of our society’s help. At least it’s encouraging to know that they also don’t believe the rich should get their unearned, undeserved bailouts. But these crooks don’t have anything to worry about.

Our police forces seem more interested in hauling away credentialed members of the media in cuffs. “Your First Amendment rights can be terminated,” was the warning issued by a Chicago Police Department officer caught on video. Our hypocritical Commander-in-Cheeba seems more interested in busting up medical marijuana stoners, than any cartels.

via OccupyWallSt

And even during the 2008 Republican National Convention, at which FBI informants Brandon Darby and Andrew Darst set up David McKay, Bradley Crowder, and Matthew DePalma on charges of possessing Molotov cocktails in two separate incidents. It’s important to note that the only Molotov cocktails that figured in the RNC protests at any point were the ones used to entrap these young men: the FBI were not responding to a threat, but inventing one.

Over the past month, the FBI have shifted into high gear with this approach. Immediately before May Day, five young men were set up on terrorism charges in Cleveland after an FBI infiltrator apparently guided them into planning to bomb a bridge, in what would have been the only such bombing carried out by anarchists in living memory. During the protests against the NATO summit in Chicago,three young men were arrested and charged with terrorist conspiracy once again involving the only Molotov cocktails within hundreds of miles, set up by at least two FBI informants.

None of the targets of these entrapment cases seem to be longtime anarchist organizers. None of the crimes they’re being charged with are representative of the tactics that anarchists have actually used over the past decade. All of the cases rest on the efforts of FBI informants to manufacture conspiracies. All of the arrests have taken place immediately before mass mobilizations, enabling the authorities to frame a narrative justifying their crackdowns on protest as thwarting terrorism. And in all of these cases, the defendants have been described as anarchists in the legal paperwork filed against them, setting precedents for criminalizing anarchism.

Smashing bank windows, for example, may be illegal, but it is increasingly understood as a meaningful political statement; it would be difficult to build a convincing terrorism case around broken glass.

And now the Obama Justice Department is trying to do what Richard Nixon couldn’t: indict a media organization. . . . Charging Julian Assange with ‘conspiracy to commit espionage’ would effectively be setting a precedent with a charge that more accurately could be characterized as ‘conspiracy to commit journalism‘”

Key Democratic Senators such as Senate Intelligence Committee Chairwoman Dianne Feinstein have publicly called for Assange’s prosecution for espionage (which in the case of both Assange and Manning may still carry a death sentence).

A group of journalists including Jeremy Scahill, Amy Goodman, Glenn Greenwald, and Kevin Gosztola joined WikiLeaks and their counsel, the Center for Constitutional Rights (CCR), insuing the federal government over the extreme secrecy in the trial of Bradley Manning. CCR asked the court “to grant the public and press access to the government’s motion papers, the court’s own orders, and transcripts of proceedings, none of which have been made public to date.” CCR argues that the trial has been “even less transparent than the controversial military commission proceedings ongoing at Guantánamo Bay.”

Considering that any vaguely named combatant or anyone standing near said “combatant” can be blown up by the president without due process, it does seem like something we should probably guard against, right? Now, similar to the ‘Do Not Call’ and ‘Do Not Track’ lists, a ‘Do Not Kill‘ petition has been started to counter the president’s ‘Kill List’. People are now (only half-mockingly) begging the government not to kill them.

via Salon:

Could Obama order the targeted killing of an American citizen, in a country with which the United States was not at war, in secret and without the benefit of a trial? The Justice Department’s Office of Legal Counsel prepared a lengthy memo justifying that extraordinary step, asserting thatwhile the Fifth Amendment’s guarantee of due process applied, it could be satisfied by internal deliberations in the executive branch. Despite an executive order banning assassinations, a federal law against murder, protections in the Bill of Rights and various strictures of the international laws of war”

Attorney General Eric Holder then publicly claimed: “‘Due process’ and ‘judicial process’ are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process.” Both of those episodes sparked controversy, because of how radical of a claim it is.

John Brennan, the president’s counter-terrorism adviser, said in a recent speech that not a single non-combatant had been killed in a year of drone strikes in Afghanistan and Pakistan. And today’s Times article quoted a senior administration official who said that civilian deaths were in the “single digits.”
But it turns out that even this hey-it’s-better-than-carpet-bombing justification is rather flimsy. The Times article says “Mr. Obama embraced a disputed method for counting civilian casualties …It in effect counts all military-age males in a strike zone as combatants, according to several administration officials, unless there is explicit intelligence posthumously proving them innocent.” This was the exact language used by George Zimmerman in his 911 call about Travyon Martin (“it looks like he’s up to no good”), classifying all males in the vicinity of suspected Terrorists in Pakistan, Yemen and Somalia — including teenagers — as “militants” and “combatants,” and deeming them fair game to be killed solely by virtue of their physical location, gender and age.

And of course, President Obama is creating a great recruiting tool for anti-American fundamentalist forces.

“These attacks are making people say, ‘We believe now that al-Qaeda is on the right side,’ ” said businessman Salim al-Barakani, adding that his two brothers — one a teacher, the other a cellphone repairman — were killed in a U.S. strike in March.

Who would have guessed that continually dropping bombs on a country using remote-controlled sky robots and killing their civilians would breed hatred and a desire to attack back? Not only do these constant Obama attacks extinguish the lives of innocent people, but they also exacerbate the very threat they are ostensibly designed to address.

Of course, if the president continues to utilize authoritarian methods of torture, profiling, surveillance, illegal wiretapping, terroristic war tactics,and  robotic death-from-the-sky, surely the conservatives will call him out on this big government tyranny! What’s that? They’re calling him a socialist, leftist, a Maoist, and a Muslim? And the left supports his Big Brother extremism as well? As the ACLU’s Jameel Jaffer asked: “Dems who think executive process is due process: Where were they when Bush‬ needed help with warrantless wiretapping?” or his indefinite detention scheme? Dianne Feinstein is more worried about stopping leaks and punishing whistleblowers than investigating the war crimes in the first place?

And WIRED gives us even more right-wing Nixonian extremism coming from the Obama White House:

The Obama administration is set to argue to a federal appeals court Friday that the government may breach, with impunity, domestic spying laws adopted in the wake of President Richard M. Nixon’s Watergate scandal.

The case tests whether Americans may seek recourse or monetary damages when a sitting U.S. president bypasses Congress’s ban on warrantless spying on Americans — in this instance when President George W. Bush authorized his secret, warrantless domestic spying program in the aftermath of the September 2001 terror attacks. A federal judge found in 2010 that two American lawyers’ telephone conversations with their clients in Saudi Arabia in 2004 were siphoned to the National Security Agency without warrants. The allegations were initially based on a classified document the government accidentally mailed to the former al-Haramain Islamic Foundation lawyers.

The document was later declared a state secret, removed from the long-running lawsuit and has never been made public. With that document ruled out as evidence, the lawyers instead cited a bevy of circumstantial evidence that a judge found showed the government illegally wiretapped the lawyers as they spoke on U.S. soil to Saudi Arabia.

Against the government’s objections, San Francisco U.S. District Court Judge Vaughn Walker awarded the two lawyers — Wendell Belew and Asim Ghafoor — $20,400 each in damages and their legal counsel $2.5 million in costs. It marked the first time anyone had prevailed in a lawsuit challenging Bush’s so-called Terrorist Surveillance Program.

The domestic spying program was first disclosed by The New York Times in December 2005, and the government subsequently admitted that the the National Security Agency was eavesdropping on Americans’ telephone calls without warrants if the government believed the person on the other line was overseas and associated with terrorism. Further news investigations found that the government had secretly enlisted the help of major U.S. telecoms, including AT&T, to spy on Americans’ phone and internet communications without getting warrants as required by the 1978 Foreign Intelligence Surveillance Act.
Parts of the surveillance program were so egregious that the upper echelon of the Justice Department, including then-Attorney General John Ashcroft, threatened to resign en masse if it wasn’t changed.

Congress, with the vote of President Barack Obama — who was an Illinois senator at the time — subsequently legalized much of the warrantless spying in the summer of 2008. The legislation also provided the nation’s telecommunication companies immunity from lawsuits accusing them of being complicit with the government’s warrantless wiretapping.

The government, however, claims said it cannot be held liable under the spying law, and that Congress has not waived sovereign immunity — meaning the government has not consented to being sued for breaching its own laws.

And via EFF:

In a disappointing ruling for government transparency advocates, the Second Circuit Court of Appeals held the government could keep secret “cables describing waterboarding; a photograph of a detainee, Abu Zubaydah, taken around the time that he was subjected to the ‘enhanced interrogation techniques’; and a short phrase that appears in several Justice Department memos referring to a ‘source of authority.’” This suit came on the heels of revelations that tapes allegedly showing waterboarding were destroyed by a CIA officer. The court accepted the government’s argument that waterboarding was an “intelligence method” and therefore exempt from disclose. The Obama administration argued in favor of this interpretation despite previously banning waterboarding as torture. As the ACLU’s Alexander Abdo wrote, the ruling means “the CIA can effectively decide for itself what Americans are allowed to learn about the torture committed in their name.”

Meanwhile, the Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites when looking for “signs of terrorist or other threats against the U.S.”

The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.

I present them all here in the hopes of generating more blog traffic and wasting expensive government resources. It is especially entertaining to know that one can get on Intelligence Agency radar with sentences such as “Pirates plot smart power pork cloud exposure, help aid meth lab explosion body scanner wave!”

~The Stranger
thestranger@earthling.net

Assassination, attack, domestic security, drill, exercise, cops, law enforcement, authorities, disaster assistance, disaster management, DNDO, domestic nuclear detection office, national preparedness, mitigation, prevention, response, recovery, dirty bomb, domestic nuclear detection, emergency management, emergency response, first responder, homeland security, DHS, maritime domain awareness, MDA, initiative, militia, shooting, shots fired, evacuation, deaths, hostage, explosion, explosive, police, team, DMAT, organized crime, gang, gangs, national security, state of emergency, security, breach, threat, standoff, threat, standoff, SWAT, screening, lockdown, bomb, bomb squad, bomb threat, crash, looting, riot, emergency landing, pipe bomb, incident, facility, hazmat, nuclear, chemical spill, suspicious package, suspicious device, toxic, national laboratory, nuclear facility, nuclear threat, plume, cloud, radiation, radioactive, leak, biological infection, biological event, chemical, chemical burn, biological, hazardous, hazardous material incident, industrial spill, infection, powder, white powder, gas, spillover, anthrax, blister agent, chemical agent, exposure, burn, nerve agent, ricin, sarin, North Korea, outbreak, contamination, exposure, virus, evacuation, bacteria, recall, ebola, food poisoning, foot and mouth, FMD, H5N1, Avian, flu, salmonella, small pox, smallpox, plague, human to human, human to animal, influenza, Center for Disease Control, CDC, Drug Administration, FDA, Public Health, agro terror, tuberculosis, TB, agriculture, listeria, symptoms, mutation, resistant, antiviral, wave, pandemic, infection, waterborne, airborne, sick, swine, pork, strain, Tamiflu, World Health Organization, WHO, quarantine, H1N1, vaccine, epidemic, Norvo virus, viral hemorrhagic fever, E. Coli, E Coli, infrastructure security, airport, CIKR, Critical Infrastructure & Key Resources, collapse, AMTRAK, computer infrastructure, communications infrastructure, telecommunications, critical infrastructure, national infrastructure, Metro, WMATA, airplane, chemical fire, BART, MARTA, Port Authority, NBIC, National Biosurveillance Integration Center, transportation security, grid, power, smart, body scanner, electric, failure, outage, black out, blackout, black-out, brown out, brownout, brown-out, port, dock, bridge, cancelled, delays, service disruption, power lines, drug cartel, violence, drug, narcotics, cocaine, marijuana, heroin, border, Mexico, cartel, southwest, Juarez, Sinaloa, Tijuana, Torreon, Yuma, Tuscon, decapitated, US Consulate, U.S. Consulate, consular, El Paso, Fort Hancock, San Diego, Ciudad Juarez, Nogales, Sonora, Colombia, Mara salvatrucha, MS13, MS-13, drug war, Mexican army, methamphetamine, Cartel de Golfo, Gulf Cartel, La Familia, Reynosa, Nuevo Leon, narcos, narco banners, Los Zetas, shootout, execution, gunfight, trafficking, kidnap, Calderon, Reyosa, Bust, Tamaulipas, meth lab, drug trade, illegal immigrants, smuggling, smugglers, Matamoros, Michaocana, Guzman, Arellano-Felix, Beltran-Leyva, Barrio Azteca, artistic assassins, Mexicles, New Federation, terrorism, Al Qaeda, terror, attack, Iraq, Afghanistan, Pakistan, agro, environmental terrorist, eco terrorism, eco-terrorism, ecoterrorism, conventional weapon, target, weapons grade, dirty bomb, enriched, nuclear, chemical weapon, biological weapon, ammonium nitrate, improvised explosive device, IED, Abu Sayyaf, Hamas, FARC, Armed Revolutionary Forces Colombia, IRA, Irish Republican Army, ERA, Euskadi ta Askatasuna, Basque Separatists, Hezbollah, Tamil Tigers, PLF, Palestine Liberation Front, PLO, Palestine Liberation Organization, car bomb, jihad, Taliban, weapons cache, suicide bomber, suicide attack, suspicious substance, AQAP, Al Qaeda Arabian Peninsula, AQIM, Al Qaeda in the Islamic Maghreb, TTP, Tehrik-i-Taliban Pakistan, Yemen, pirates, extremism, Solamia, Nigeria, radicals, Al-Shabaab, home grown, homegrown, home-grown, plot, nationalist, recruitment, fundamentalism, Islamist, ice, emergency, hurricane, tornado, twister, tsunami, earthquake, tremor, flood, storm, crest, temblor, extreme weather, forest fire, brush fire, stranded, stuck, help, hail, wildfire, wild fire, Tsunami Warning Center, Emergency Broadcast System, magnitude, avalanche, typhoon, shelter-in-place, disaster, snow, blizzard, sleet, mudslide, mud slide, erosion, power outage, warning, watch, lightning, lightening, aid, closure, interstate, burst, cyber security, botnet, DDOS, dedicated denial of service, denial of service, malware, trojan, keylogger, Cyber Command, 2600, spammer, phishing, rootkit, phreaking, cain and abel, brute force, brute forcing, MySQL injection, cyber attack, cyberattack, cyber terror, cyberterror, hacker, china, conficker, worm, scammers, social media