martes, 18 de enero de 2011

MÁS ALLÁ DE LA VIDA (HEREAFTER)


ADVERTENCIA: ¡¡¡OPERACIÓN PSICOLÓGICA!!!
WARNING: PSYOPS!!!

Esta película es maravillosa porque:
This movie is wonderful because:

1) Prepara a las tropas estadounidenses para la muerte.

En muchas culturas, a quienes se envía a matar y morir por intereses absurdos, se les cuentan lindas historias sobre la "vida ultraterrena".

Un colaborador tan efectivo del DEPARTAMENTO DE DEFENSA ESTADOUNIDENSE (U.S. DEPARTMENT OF DEFENSE / DoD) y de la COMUNIDAD DE INTELIGENCIA ESTADOUNIDENSE [actualmente en manos comunistas] y de la industria militar estadounidense (también dirigida por comunistas) como es CLINT EASTWOOD tenía que dirigir un filme que consuele y entusiasme a toda la "carne de cañón" que va a entregar su único aliento a tierras alejanas de sus hogares. Y por supuesto, el Sr. EASTWOOD recibe la generosa ayuda del productor STEVEN SPIELBERG, otro experto en propaganda.

2) Es una visión gnóstica / satánica del universo a favor del Nuevo Orden Mundial (New World Order).



Una lectura ecuánime del filme muestra un discurso subversivo en el que las figuras paternas o de autoridad son descalificadas progresivamente ante los espectadores, mediante distintas tretas: Alcoholismo [la madre], intransigencia ante la "verdad de la vida ultraterrena" [los editores], deseos interesados de servir a la humanidad [el hermano del vidente].

Quienes desautorizan a la tradición han recibido la "iluminación" de modo individual, personal, al morir y resucitar. El vidente estuvo muerto en la mesa de operaciones, la periodista falleció en la inundación y uno de los gemelos fallece de hecho. Estos personajes "poseedores del conocimiento" [portadores de la luz] se rebelan ante su entorno como PROMETEO ante los dioses y desean "iluminar" a quienes buscan el conocimiento (la periodista con su libro, el vidente accediendo a la petición del gemelo sobreviviente) lo cual es "luciferismo".

El mensaje gnóstico es evidente en la casa de Charles Dickens. En la pared de la cual el vidente toma la información relativa al libro de la periodista, resalta un afiche que dice "GNOSTICISM" (GNOSTICISMO). La madre finalmente puede hablar con el gemelo sobreviviente cuando éste ingresa en la misteriosa habitación "133", número que es señal de su iniciación.

3) Sugiere la continuidad de "ataques terroristas" como método de control social.

Con los continuos incrementos en los gastos militares estadounidenses, en particular en el área de los "dispositivos explosivos improvisados" (explosive improvise devices EIDs), un nombre que parece aguantar todo tipo de interpretaciones, intervenciones y participantes, era natural que un filme como "MÁS ALLÁ DE LA VIDA (HEREAFTER)" mostrara una explosión misteriosa en el metro londinense. Cabe preguntarse, con este tipo de promoción cuánto tiempo falta para el proximo desastre provocado en el metro de alguna ciudad conocida (¿ya ocurrió?, ¿en Moscú tal vez?).

Cuando cuantiosos presupuestos son colocados en actividades que lidian con la locura, a algunos geniecillos de pocos escrúpulos se le puede ocurrir darle un empujoncito a la vesanía para estimular ciertos intereses crematísticos.

Siempre es bueno darle una miradita a los gastos que se realizan en esta área para apreciar cómo se dilapidan los impuestos de los pobrecitos estadounidenses (carecen de la suerte de haber nacido en Latinoamérica):

[La información completa está en:
http://projects.washingtonpost.com/top-secret-america/functions/counter-ied/]
"Counter-IED explosives operations

Programs, including research and development, associated with efforts to counter terrorist and adversary use of improvised explosive devices (IEDs), including intelligence and operations efforts associated with identifying and attacking individual IEDs and the networks of fighters who employ them, as well as the forensics associated with gathering information after explosive incidents. The Joint IED Defeat Organization (JIEDDO) leads the Department of Defense's counter-IED (C-IED) efforts.

96 results for Counter-IED explosives operations
23 government organizations | 73 companies
Showing page of 0 page

Government OrganizationHQ LocationNumber of LocationsNumber of Contracting Companies
Air ForceArlington, VA99392
Air Force IntelligenceArlington, VA113153
ArmyArlington, VA106353
Army IntelligenceFort Belvoir, VA93120
Bureau of Alcohol, Tobacco, Firearms and ExplosivesWashington, DC18228
Central CommandTampa, FL664
Central Intelligence AgencyMcLean, VA36114
Defense agenciesArlington, VA78332
Defense Intelligence AgencyArlington, VA22317
Department of Defense HQArlington, VA80291
Department of EnergyWashington, DC1887
Department of Homeland Security HQWashington, DC270318
European CommandStuttgart-Vaihingen, AE211
Federal Bureau of InvestigationWashington, DC448173
Joint Chiefs of StaffArlington, VA645
Joint Forces CommandNorfolk, VA845
Joint Improvised Explosive Device Defeat Org.Arlington, VA468
Marine CorpsArlington, VA2482
National Security AgencyFt. Meade, MD19484
NavyArlington, VA56385
Navy IntelligenceArlington, VA31104
Pacific CommandCamp H.M. Smith, HI627
Special Operations CommandTampa, FL12125
Company NameHQ LocationYear Est.EmployeesRevenueLocationsGovt. Clients
A-T Solutions, Inc.Fredericksburg, Virginia2002101-500Unknown712
Alion Science and Technology CorporationMclean, Virginia20022,001-5,000$750 million to $1 billion2012
Allied Technology Group, Inc.Rockville, Maryland1986101-500Under $100 million3114
American Systems CorporationChantilly, Virginia1975501-2,000$100 million to $750 million2513
ANSERArlington, Virginia1958501-2,000$100 million to $750 million712
Applied Systems Research, Inc.Fairfax, Virginia199826-100Under $100 million28
ASG RenaissanceDearborn, Michigan1987101-500Under $100 million33
BAE Systems, Inc.Rockville, Maryland194810,000+$10 billion to $50 billion6422
Beacon SystemsCoral Springs, Florida2005<25Under $100 million62
Booz Allen HamiltonMcLean, Virginia191410,000+$1 billion to $10 billion6926
By Light Professional IT ServicesArlington, Virginia200226-100Under $100 million17
C2 Technologies, Inc.Vienna, Virginia1997101-500Under $100 million511
CACI International, Inc.Arlington, Virginia196210,000+$1 billion to $10 billion7426
Calhoun InternationalTampa, Florida2005<25Under $100 million66
Camber CorporationHuntsville, Alabama19902,001-5,000$100 million to $750 million3019
Celestar CorporationTampa, Florida200126-100Under $100 million44
Centauri Solutions, LLCAlexandria, Virginia2006101-500Under $100 million128
CMX TechnologiesReston, Virginia2005<25Under $100 million44
Cobham Analytic Solutions Columbia, Maryland1979501-2,000$100 million to $750 million236
Complete Data SolutionsArlington, Virginia1997UnknownUnknown22
Computer Sciences CorporationFalls Church, Virginia195910,000+$10 billion to $50 billion7724
Dell, Inc. / Dell Perot SystemsRound Rock, Texas1984UnknownAbove $50 billion204
Detica Federal, a BAE Systems CompanyArlington, Virginia2001101-500Under $100 million35
Dynetics, Inc.Huntsville, Alabama1974501-2,000$100 million to $750 million710
E-merging Technologies Group, Inc.Cleveland, Ohio199926-100Under $100 million1413
Fulcra Worldwide Arlington, Virginia200426-100Under $100 million17
Fulcrum IT Services Manassas, Virginia1985101-500Under $100 million1910
Global Defense Technology & Systems, Inc. (GTEC)McLean, Virginia1990501-2,000$100 million to $750 million710
GS5 LLCDumfries, Virginia200326-100Under $100 million46
i_SW corpArlington, Virginia2006<25Under $100 million35
Ideal Innovations, Inc.Arlington, Virginia1999101-500Under $100 million53
Infinity Systems EngineeringColorado Springs, Colorado199626-100Under $100 million14
Intelligent Software Solutions, Inc.Colorado Springs, Colorado1997101-500Under $100 million1117
ITT CorporationMcLean, Virginia1995501-2,000$1 billion to $10 billion5217
JIL Information Systems, Inc., a Allied Technology Group companyRockville, Maryland2005101-500Unknown31
L-3 CommunicationsNew York, New York199710,000+$10 billion to $50 billion9629
Leonie IndustriesPacific Palisades, California200126-100Under $100 million48
Lockheed MartinBethesda, Maryland199510,000+$10 billion to $50 billion7323
Logos Technologies, Inc.Arlington, Virginia199626-100Under $100 million34
MacAulay Brown, Inc.Dayton, Ohio1979501-2,000$100 million to $750 million1513
ManTech International CorporationFairfax, Virginia19685,000-10,000$1 billion to $10 billion8128
MARKON Inc.Falls Church, Virginia200726-100Under $100 million22
Masy Group, TheAlexandria, Virginia2005<25Under $100 million24
McNeil TechnologiesSpringfield, Virginia1985501-2,000$100 million to $750 million1311
MOJA, IncorporatedManassas, Virginia199526-100Under $100 million512
MPRI, an L-3 Communications CompanyAlexandria, Virginia1987UnknownUnknown710
MTC Services CorporationChula Vista, California1991101-500Under $100 million116
NEK Advanced Securities Group, Inc.Colorado Springs, Colorado2002101-500Unknown78
Northrop GrummanLos Angeles, California193910,000+$10 billion to $50 billion9827
Omega SystemsPhoenix, Arizona1998<25Under $100 million34
Operational Intelligence LLCWarrenton, Virginia2008<25Unknown21
Radiance TechnologiesHuntsville, Alabama1998101-500Under $100 million910
Reger Group, TheStafford, Virginia2004101-500Under $100 million32
Ronco ConsultingWashington, District of Columbia1974<25Unknown21
Saffron TechnologyCary, North Carolina1999<25Under $100 million12
SAICMcLean, Virginia196910,000+$10 billion to $50 billion12333
Science, Engineering, and Technology Corporation, A SAIC corporationArlington, Virginia200226-100Unknown14
Sierra Nevada CorporationSparks, Nevada1994501-2,000$750 million to $1 billion166
Six3 Systems, Inc.McLean, Virginia2009101-500Unknown2218
SPADACMcLean, Virginia2002101-500Under $100 million910
SRC, Inc.North Syracuse, New York1957501-2,000$100 million to $750 million2110
SRI International, Inc.Menlo Park, California19462,001-5,000$100 million to $750 million58
Summit TechnologiesWest Hartford, Connecticut1997101-500Unknown116
Systems Documentation Inc.South Plainfield, New Jersey1978101-500Under $100 million13
TASC, IncChantilly, Virginia19662,001-5,000$1 billion to $10 billion4411
Technology Associates International CorporationCarlsbad, California1999101-500Under $100 million48
TechOp Solutions InternationalStafford, Virginia200526-100Under $100 million44
Textron, Inc.Providence, Rhode Island192310,000+$10 billion to $50 billion75
Threat Management GroupGoose Creek, South Carolina200426-100Under $100 million13
TMC DesignLas Cruces, New Mexico199726-100Unknown21
USfalcon, Inc.Morrisville, North Carolina2005101-500$100 million to $750 million2510
WBB ConsultingReston, Virginia1981101-500Under $100 million109
Wexford Group InternationalVienna, Virginia1992<25Unknown43



Obviamente, con este tipo de actividad comercial se puede comenzar a comprender un discurso tan propio de las historietas de superhéroes como el dado por JANET NAPOLITANO, una mujer muy tierna que es casi la dulzura encarnada, el 27 de Enero de 2011 en la George Washington University en relación al estado de la Seguridad Territorial Estadounidense:

http://www.dhs.gov/ynews/speeches/sp_1296152572413.shtm

(Las letras en naranja en el texto las hemos agregado en perucine.blogspot.com)

"State of America's Homeland Security Address

Release Date: January 27, 2011

Washington, D.C.
George Washington University
(Remarks as Prepared)

Good afternoon, and thank you President Knapp for that kind introduction, and for the invitation to be here at George Washington University.

I’ll be speaking at several colleges and universities throughout the year about different aspects of homeland security. I’m happy to kick things off here, though, with an address on the overall state of our homeland security.

So, thank you to the Homeland Security Policy Institute. And I want to especially acknowledge the Institute’s founding director, Frank Cilluffo, who is a good friend of DHS. Frank is one of those who were "present at the creation" of our homeland security effort after the 9/11 attacks. And under his leadership, the Homeland Security Policy Institute has been at the vanguard of treating homeland security as its own discipline that demands serious study.

Because of this Institute, and other efforts emerging at colleges and universities across the country, homeland security is taking its place among longer-standing fields – like international affairs and criminal justice – as an area where major global challenges are being studied and addressed. For the students and young professionals here with us today, or watching online, you are the next wave of homeland security thinkers, professionals, and managers. You can – and undoubtedly will – have a significant influence on this emerging field.

I also want to take a moment to note that the very existence of the Department of Homeland Security is due, in large part, to the efforts of Senator Joe Lieberman. Senator Lieberman could not be here this afternoon. But all of us know about, and have tremendous appreciation for, his tireless, nonpartisan efforts to make our country more secure.

Two days ago, President Obama delivered to Congress and the American people his annual address on the state of our union, a tradition that goes as far back as 1790 with the namesake of this institution. Today, I’m beginning a new tradition, an annual assessment of the state of our homeland security. I want to begin by telling two stories that illustrate the breadth and the complexity of our challenge, but also the humanity of it as well.

Just a few weeks ago, I had the honor of spending New Years in Kabul, Afghanistan, with many of the men and women serving in our armed forces and our civilian mission there. I met with soldiers at the Torkham Forward Operating Base and was briefed on operations at Torkham Gate, a heavily-trafficked border crossing between Afghanistan and Pakistan. It is near Jallalabad, not far from the Khyber Pass, and it’s where Afghan and U.S. officials – including border security and customs officials from the Department of Homeland Security – work side by side to provide security, while allowing legal commerce and travel to get through.

The second experience was very different, and took place a little more than a year ago at Ellis Island. I was leading a naturalization ceremony – another great honor of this job. I read the oath of allegiance to new Americans from 48 different countries, including a 95-year-old woman from the Dominican Republic. Collectively, in that room, were dozens of individuals, with very different backgrounds, who all wanted the same thing – to accept the rights, and the responsibilities, of American citizenship.

These two experiences remind us that the hard work of securing the U.S. homeland stretches from the mountains of Afghanistan and Pakistan, and other far-off places, all the way back to the Main streets of our smallest home towns. They remind of us of why that hard work must be done; who we are doing it for; and how we must conduct ourselves while carrying it out. And they remind us that securing the homeland means upholding the very values on which this country was founded, and honoring the millions who passed through Ellis Island – and the ones still coming today – seeking the promise and blessings of America.

So, what, then, is the state of homeland security today? I can report that our young department has matured, building on the good work of my two predecessors, Tom Ridge and Michael Chertoff.

I can also report that our homeland is more secure that it was ten years ago, and, indeed, more secure than it was two years ago.

If these were ordinary times, that might suffice. But these are not ordinary times. The kinds of threats we now face demonstrate that our homeland security is a shared responsibility. Only a "whole of nation approach" will bring us to the level of security and resilience we require.

So over the last two years, our approach has acknowledged that the Department of Homeland Security – indeed, the whole Federal government and the military – cannot, itself, deliver security. Real security requires the engagement of our entire society, with government, law enforcement, the private sector, and the public all playing their respective roles.

From day one, the Obama Administration has operated on the premise that security is a shared responsibility – that no matter who you are – from students and professors to first responders to everyday citizens – we all play a part.

Because of the trust we have in Americans to share in our collective security, today I announce the end of the old system of color-coded alerts. In its place, we will implement a new system that is built on a clear and simple premise: When a threat develops that could impact you – the public – we will tell you. We will provide whatever information we can so you know how to protect yourselves, your families, and your communities.

Under the new, two-tiered system, DHS will coordinate with other Federal entities to issue formal, detailed alerts regarding information about a specific or credible terrorist threat. These alerts will include a clear statement that there is an "imminent threat" or "elevated threat." The alerts also will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals and communities can take.

The new system reflects the reality that we must always be on alert and be ready. When we have information about a specific, credible threat, we will issue a formal alert providing as much information as we can. Depending on the nature of the threat, the alert may be limited to a particular audience, like law enforcement, or a segment of the private sector, like shopping malls or hotels. Or, the alert may be issued more broadly to the American people, distributed – through a statement from DHS – by the news media and social media channels.

The alerts will be specific to the threat. They may recommend certain actions, or suggest looking for specific suspicious behavior. And they will have a specified end date.

Today, we are beginning a 90-day implementation period in which Federal, state and local government, law enforcement entities, private and non-profit sector partners, airports, and other transport hubs will officially transition to the new system, which flows from evolving practice in the last few years. This means that the days are numbered for the automated recordings at airports, and announcements about a color code level that were, too often, accompanied by little practical information.

As I said, this new National Terrorism Advisory System is built on the common-sense belief that we are all in this together, and that we all have a role to play. This system was developed in that same collaborative spirit. It was largely the work of a bipartisan task force that included law enforcement, former Mayors and Governors, and members of the previous administration. Some of them are here today, and I thank them, and ask for a round of applause for their great work that led to this new tool in our homeland security arsenal.

Continuing to evolve our approach to defending the homeland remains critical because the threats we face today are real, they are persistent, and they are evolving rapidly. We know that al Qaeda, and other groups sharing their terrorist ideology, continue to target us. Increasingly, this is done through al Qaeda affiliates in places like Yemen and the Arabian Peninsula. We are also dealing with the threat from terrorists who use the Internet and social media like Facebook and YouTube to reach vulnerable individuals and inspire new recruits.

Historically, our domestic counterterrorism efforts were based on the belief that we faced the greatest risk from attacks planned, and carried out, by individuals coming from abroad. But the arrests of an increasing number of U.S. persons on terror-related charges in the last two years mean that we must move beyond this paradigm. These include Najibullah Zazi, a legal permanent resident arrested in 2009 for plotting to attack the New York City subway system; Faisal Shahzad, a naturalized U.S. citizen, who attempted to explode a car bomb in Times Square last year; as well as more recent arrests in Portland, Oregon; Dallas, Texas; and here in the Washington area.

Today, we operate under the premise that individuals prepared to carry out terrorist acts might already be in the country, and could carry out further acts of terrorist violence with little or no warning. We must all work to gain a better understanding of the behaviors, tactics, and other indicators that could point to terrorist activity.

At the same time, we face the possibility of sophisticated attacks ranging from chemical, biological, and nuclear, to attacks in cyberspace. Indeed, in just the last year, we’ve seen the full spectrum of cyber threats, from denial-of-service attacks and spamming to attacks with spyware.

Finally, we know that our borders and ports of entry represent potential avenues, not just for terrorist travel, but also for threats in the form of smuggling, human trafficking, and transnational crime.

So as I said earlier, our approach to confronting these threats has been to build and strengthen partnerships, and to build a shared sense of responsibility for our security by working with state, local and, tribal law enforcement, our international allies, partners in the private sector, and of course, the American people.

Despite our title, the Department of Homeland Security does not possess sole responsibility for securing the homeland within the Federal government.

Our nation’s armed forces may be thousands of miles from our shores, living in Forwarding Operating Bases far from loved ones or the comforts of home, but they’re every bit on the frontlines of our homeland security. They have helped to significantly degrade al Qaeda’s capabilities to mount major attacks right here in the United States and elsewhere throughout the world.

The Director of National Intelligence, the CIA, and the entire Intelligence Community, of which DHS is a member, is producing more and better streams of intelligence than at any time in the past. The National Counterterrorism Center has made critical improvements to our federal watchlisting systems and to the coordination of our counterterrorism efforts.

And of course, the Federal homeland security enterprise includes our strong partners at the Department of Justice and the FBI, whose work has led to the arrest of more than two-dozen Americans on terrorism-related charges since 2009.

At the Department of Homeland Security over the last two years, we've seen some extraordinary progress and hard work pay off. But that could not have happened without the dedicated, professional men and women of this great Department, like the nearly 50,000 Transportation Security Officers who work tirelessly, and often thanklessly, to deter and prevent terrorist attacks on passenger planes; the more than 20,000 Border Patrol agents who put their lives on the line to protect our borders; the more than 10,000 officers and investigators who enforce our immigration laws, and bring to justice those who seek to traffic drugs, arms and people; the more than 40,000 men and women who serve in the United States Coast Guard protecting our maritime borders; or the thousands of scientists and engineers working on the next generation of security technology; the security guards at government buildings; the trainers of our law enforcement professionals; or the intelligence analysts working around the clock to stay ahead of emerging threats.

But the homeland security enterprise extends far beyond DHS and the federal government. As I said, it requires not just a "whole of government," but a "whole of nation" approach. In some respects, local law enforcement, community groups, citizens, and the private sector play as much of a role in homeland security as the federal government. That is why I like to say that "homeland security starts with hometown security."

For example, we know that communities can play a vital security role when they forge strong partnerships with local law enforcement. In fact, this is something of an old story in our nation’s history. Americans have long helped to secure their hometowns, as well as their homeland, from our tradition of civil defense, to more recent efforts like neighborhood watches and community-oriented policing initiatives.

A study just last year study found that, between 1999 and 2009, more than 80 percent of foiled terrorist plots in the United States were thwarted because of observations from law enforcement or the general public.

At DHS, we also work closely with a diverse array of religious, ethnic, and community organizations and leaders. Members of these communities have, in fact, been critical in thwarting violence. And, like all Americans, they play very positive roles in enriching our national life.

And so, every day at DHS, we are doing everything we can to get more information, more tools, and more resources out of Washington, DC, and into the hands of the men and women on the front lines.

That is why we launched the national "If You See Something, Say Something" campaign last year to raise awareness of potential terrorist tactics, and emphasize the importance of reporting suspicious activity to law enforcement. You’ve no doubt heard this campaign if you’ve ridden on Metro or Amtrak. And we have continued to expand this effort across the country in partnership with professional and collegiate sports, shopping centers – like the Mall of America – and retailers – like Wal-Mart.

We also see this effort as a partnership between citizens and local police. Therefore, we’ve worked closely with the Department of Justice to expand the Nationwide Suspicious Activity Reporting, or SAR, initiative. Currently active in over two dozen states and cities, and soon to be utilized by fusion centers, transit police, and other groups across the country, the SAR initiative creates a standard process for law enforcement to identify and report suspicious activity so it can be shared nationally and analyzed for broader trends.

I want to pause here to make an important point. Both the "If You See Something, Say Something" and SAR initiatives have been designed, and tested, with civil liberties and privacy in mind. Both are aimed at identifying suspicious behaviors and increasing our shared ability to protect the country.

Today, we’re also premiering several additional resources to better connect citizens and communities with the kinds of information and tools that DHS offers. I urge you to visit our new "Hometown Security" resource page on DHS.gov, and to stay connected via the Department’s new Facebook page as well.

To give you a better sense of how our partnership approach looks, and – to borrow a sports metaphor – how we're fielding a bigger, better-trained team, I’d like to discuss four areas of focus for us in the coming year.

Counterterrorism

Our most fundamental responsibility remains preventing terrorist attacks on the homeland. And to support this critical mission we have worked very hard to strengthen and build our domestic information-sharing architecture by increasing the capacity of state and major-area fusion centers to serve as centers of analytic excellence.

We have made historic strides in aviation security - accelerating the deployment of new security equipment at our domestic airports, and launching an international initiative that, in October of last year, produced a first-of-its-kind global agreement by 190 nations to increase aviation security standards worldwide. During the coming year, we will continue, and hopefully complete, negotiations with the European Union on strengthening information sharing in the aviation environment, and extend such information sharing to other continents as well.

We will build on these efforts by leading an international effort to strengthen the security of the global supply chain, which brings goods and commodities to our shores, and across our borders. This includes an initiative called Project Global Shield that we have launched with the World Customs Organization, or WCO, and 60 other countries to prevent the theft or diversion of precursor chemicals that can be used by terrorists to make improvised explosive devices. It also includes a new initiative with the International Civil Aviation Organization, the WCO, and other international partners, to identify and protect the most critical elements of our supply chain from attack or disruption, including key transportation hubs. Together with other Federal departments and agencies, we’re seeking to bolster the resiliency of the global supply chain so that if a terrorist attack or natural disaster does occur, the supply chain can recover quickly, and any disruption can be minimized.

As Tom Ridge liked to say when he was Secretary, the physical borders of the United States should be the last line of defense, not the first. Our goal, quite simply, is to ensure the safety of all travelers and cargo as they travel across the globe.

Border Security and Immigration

A second major set of initiatives involves border security and immigration enforcement. On these two fronts, this Department has, over the last two years, been both relentless and effective.

2010 was a historic year when it comes to securing and managing our borders and enforcing our immigration laws. There are now more resources on the southwest border – in terms of personnel, technology, and infrastructure – than ever before in American history. And we continue to see progress on every metric. The numbers that are supposed to go up have gone up, and the numbers that are supposed to go down have gone down.

The number of illegal crossings – the best indicator of illegal traffic – is now at less than half its all-time high. At the same time, in the past two years, we have seized more contraband across the board – illegal bulk cash, weapons, and drugs – than we've seen in recent years.

But we won’t stop there. Our priority continues to be the removal of criminal aliens who pose a danger to public safety and national security.

Because of the dedicated work of our ICE personnel, in the past fiscal year more illegal aliens with criminal records were deported from the U.S. than ever before, a 70 percent increase from two years ago. An agreement known as Secure Communities, which uses biometrics to identify and remove criminal aliens in state prisons and local jails, has expanded from 14 jurisdictions in 2008 to more than 1000 by the end of this month. It will be in every jail and prison by 2013.

I recognize, too, that illegal immigration is driven in large part by the demand for illegal labor. As our economy grows, that demand may grow as well. That is why we’re working to make E-Verify all that it can be to help businesses ensure a legal workforce. We must instill a culture of compliance among employers. And we’ll continue to conduct audits to ensure all businesses are following the law.

We are also focused on improving and strengthening the legal immigration system, including formalizing a policy that expedites citizenship for non-citizens serving our country in the military overseas. And we continue to grant citizenship to record numbers of military service members.

DHS will also develop an automated vetting capability for immigration benefit processing that will enable us to immediately address national security risks. We will roll out the E-Verify "Self Check," which will enable prospective workers to check their employment authorization status. And, we will begin transitioning from a paper-based system to a new customer-focused, centralized, electronic case management system for immigration benefits.

Cybersecurity, Science, and Technology

While immigration and border enforcement have been longstanding challenges to our security, we also face new and emerging ones.

Over the past two years, we’ve increased our capacity to fight cyber crimes and cyber terrorism, opening a new 24/7 watch and warning center, and testing our country's first national-level cyber incident response plan, while increasing our stable of cyber experts by some 500 percent.

We entered into a historic agreement with the Department of Defense and National Security Agency to detail the division of labor among our organizations. We have also worked closely with the private sector to protect our nation's critical infrastructure, including new funding for port security and communication systems, as well as new standards for building and securing Federal facilities.

This year, we will complete the deployment of the Einstein 2 threat detection system across the Federal space, and we will continue to develop, and begin deployment, of Einstein 3, which will provide DHS with the ability to automatically detect and disrupt malicious cyber activity. And we will work through our Science and Technology directorate, our dozen academic "Centers of Excellence," and our many partners in the Federal government, on technological advances. For example, to develop the secure and efficient airport checkpoints of tomorrow; design the materials that will make our infrastructure more resilient to an attack or natural disaster; and devise the screening and detection capabilities that will keep us ahead of threats from nuclear and radiological materials.

Resilience and Response

Through the hard work of FEMA, our National Protection and Programs directorate, and others across DHS, working with our many federal, state, local, and private sector partners, we've increased our preparedness for disasters of all kinds, and strengthened the resilience of our most vulnerable critical infrastructure.

As the President announced in his State of the Union, the so-called "D Block" of communications spectrum will be set aside for public safety, so we will work with first responders on the standards and requirements for interoperability of vital communications equipment during times of crisis.

We will continue to improve and expand the disaster exercises so critical to disaster response. This year, FEMA will lead the largest exercise ever of its kind, testing our ability to respond to a major earthquake along the New Madrid fault line that runs through the midsection of the country.

To augment our global supply chain security effort, we will work with the private sector and international partners to expand and integrate "trusted traveler" and "trusted shipper" programs that facilitate legitimate travel and trade while enhancing security.

We'll launch the Chemical Facility Anti-Terrorism Standards Personnel Surety Program, requiring high-risk chemical facilities to vet individuals with access against the Terrorist Screening Database.

And we will expand the Transportation Worker Identification Credential, or TWIC, program to ensure that only authorized maritime workers can access secure areas of regulated vessels.

Recruitment

Let me say something directly to the students in the room, because part of why I wanted to give this speech – this first annual State of Homeland Security speech – here at George Washington was because I want to make a special appeal to you.

I know you are not old enough to remember, but I bet you’ve seen images of the iconic posters of Uncle Sam, with his index finger pointed out, with the caption that read, "I Want You." Those recruitment posters encouraged a generation of Americans to enlist in the U.S. Army.

Now, I have always had deep respect for the military. As Governor of Arizona I was Commander-in-Chief of the Arizona National Guard. The Coast Guard is in the Department of Homeland Security, and I have had the honor not only of visiting troops in places like Afghanistan, Europe, and the Persian Gulf, but also talking to wounded warriors at Walter Reed Hospital. My Department today employs over 48,000 veterans, and through partnerships with the Department of Defense, and organizations like the American Legion, we’ll be over 50,000 by the end of next year.

So, it is with the greatest respect that I say it’s time for a new recruitment poster. Today, DHS wants you. We want a new generation of Americans to join the fight against the new generation of threats to our homeland.

DHS offers exciting careers in areas spanning law enforcement, intelligence, and counterterrorism, like intelligence analysts, policy experts, and international affairs specialists who help negotiate global agreements; Secret Service agents and investigators who are protecting our leaders, thwarting terror plots, fighting transnational crime, and breaking up human trafficking rings. We offer many opportunities for internships, and our various fellowship and scholarship programs attract top students from top academic programs across the country.

All of these positions – all of them – come with the opportunity not only to do great work in this exciting field, but to serve your nation as well.

I am often asked what I lose sleep about as homeland security secretary. Common sense would say that in an open society with 8,000 miles of land borders, and 95,000 miles of coastline, a terrorist could get through, or a homegrown one could succeed. A novel weapon could be deployed. A community could be temporarily overwhelmed. I’m concerned about all of those things.

But I want Americans to know what I do not lose sleep over. I do not worry about the core values that have guided our country for more than two centuries – the same values that the new citizens I naturalize are seeking to uphold: freedom, hard work, shared responsibility.

Even if our enemies were to succeed in pulling off an attack on the homeland, they will never succeed in undermining those enduring values.

In Afghanistan, there’s a plaque that hangs in the residence of the American Ambassador. On it is a quote from President Woodrow Wilson that reads: "Let us set for ourselves a standard so high that it will be a glory to live up to it ...and then let us live up to it...and add a new laurel to the crown of America."

So, let us set a standard that high for homeland security. Let us strive for more partnerships; a bigger team; and an even greater willingness from our citizens to share responsibility for our collective security. And let us then meet that standard, and add a new laurel to the crown of America.

Thank you.

This page was last reviewed/modified on January 27, 2011."

---
¡¡¡¡Aaaaaaaaaaaahhhhhhh!!!! Son buenos aprendices de la geopolítica nazi (¿o lo han escrito los mismos nazis?). Es muy gracioso saber que el territorio estadounidense se extiende por todo el mundo... eso parece una apreciación un poquito comunista... :-D.

Luego de examinar los montos que mueven las empresas vinculadas al Departamento De Defensa Estadounidense (U.S. Department of Defense / DoD) se hace evidente quiénes eran y son los interesados en hacer pasar la demolición de las Torres Gemelas (y la torre 7) por un "ataque terrorista".

Esa operación psicológica se caracterizó por:
a) Control del espacio aéreo (para hace creíble la presencia de aviones fuera de ruta),
b) Control de los medios de comunicación (para emitir imágenes digitales de "aviones impactando los rascacielos"),
c) Una organización capaz de ejecutar la operación con intereses políticos en el asunto (demolición de los rascacielos y edificio adicional, control del aparato de gobierno, capacidad de beneficiarse económicamente del engaño a la población).

El anuncio de la pérdida de miles de millones de dólares en el Departamento de Defensa Estadounidense el día anterior a la demolicion de las torres ha sido poco publicitada.

http://solari.com/articles/missing_money/

Mientras la "industria militar" estadounidense (obviamente en manos de comunistas endurecidos) se beneficia del dinero de los contribuyentes estadounidenses (proletariado pro-capitalista), el Partido-Marxista-Leninista Pensamiento Paris Hilton manifiesta que:

Tal operación psicológica recibe el siguiente puntaje (escala 1-10):

- ELEGANCIA: 2 puntos (demasiado polvorienta).
- HUMOR: 1 punto (se toma demasiado en serio a sí misma)
- ABSURDIDAD: 3 puntos (que los edificios se caigan por impactos de aviones de pasajeros es absurdo mas no lo suficiente).

Y naturalmente, pensar que el Sr. OS AMA tiene alguna relación con la demolición de las Torres Gemelas es únicamente un rumor producto de la propaganda de los medios de comunicación interesados en promover guerras. La página de la OFICINA FEDERAL DE INVESTIGACIONES (FEDERAL BUREAU OF INVESTIGATION) carece de pruebas que establezcan relación alguna entre la demolición de las torres y el Sr. OZ Ama:


Si existiese tal evidencia, en la página del F.B.I. se indicaría. Únicamente se le busca en relación a hechos vinculados a una embajada en Tanzania:

"Usama Bin Laden is wanted in connection with the August 7, 1998, bombings of the United States Embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. These attacks killed over 200 people. In addition, Bin Laden is a suspect in other terrorist attacks throughout the world"


El Partido-Marxista-Leninista Pensamiento Paris Hilton identifica que la filosofía tras la operación es anticuada, decimonónica, propia de resentidos y amargados comunistas que creen en la lucha de clases e intentan mantener la estructura de clase de la sociedad estadounidense a través de las empresas de armamentos que controlan. Estos "empresarios" comunistas deben hacer las paces consigo mismo y dejar de odiar a su sociedad.

Una recomendación típica para acabar con la dictadura comunista en los Estados Unidos de Norteamérica (United States of America) sería que un país capitalista, tal vez Rusia o China realice un ataque nuclear preventivo con los EE.UU. .

Lamentablemente la bomba atómica no existe, es otro operativo psicosocial.

Se suele exigir al Partido-Marxista-Leninista Pensamiento Paris Hilton que utilice sus ejércitos clandestinos para transformar ese país comunista en un gran agujero en el suelo. Es verdad que los ejercitos clandestinos del Partido tienen la capacidad de transformar EE.UU. en un descampado polvoriento (así lo ha visualizado el Secretario General Emperador en un lindo sueño hace dos noches). Tal acción, lamentablemente, también afectaría a los trabajadores pro-capitalistas.

Es sabido que el SECRETARIO GENERAL EMPERADOR ignora dónde están o quiénes conforman los ejércitos clandestinos del Partido-Marxista-Leninista Pensamiento Paris Hilton (porque son clandestinos) y que los contactos se establecen en sueños, por telepatia o durante arranques psicóticos en los que los miembros de los ejércitos clandestinos hablan directamente desde el ambiente.

Todo esto verifica la capacidad militar del Partido-Marxista-Leninista Pensamiento Paris Hilton. Con este hecho considerado, el SECRETARIO GENERAL EMPERADOR sostiene como tesis que son los mismo trabajadores pro-capitalistas de la republiqueta tercermundista llamada Estados Unidos los que deben liberarse a sí mismos de la dictadura comunista mediante una progresiva madurez y acción política. Desde el resto del mundo recibirán ayuda espiritual mediante constantes oraciones a la VÍRGEN DE COPACABA. Este método demostró su efectividad en la desactivación de la Unión Sovietica por rezos a la VÍRGEN DE LOURDES.

Los subdesarrollados estadounidenses han de seguir los modelos de los héroes de sus filmes de acción y desaforar a los directores de las empresas comunistas de armamento o, simplemente, negarse a trabajar para ellos y dedicarse a trabajar por la Verdad, la Bondad y la Belleza.

4) Intenta copiar la sensibilidad del gran director, escritor y guionista peruano LEÓNIDAS ZEGARRA UCEDA.

Dado que CLINT EASTWOOD es un seguidor entusiasta [como puede notarse de su estilo] de la obra de DON LEÓNIDAS ZEGARRA UCEDA e intenta aplicar sus enseñanzas (como mejor puede) le concedemos a "MÁS ALLÁ DE LA VIDA (HEREAFTER)" un lugar entre los MEJORES ESTRENOS 2011 (BEST MOVIES 2011 IN PERU).

;
DON LEÓNIDAS ZEGARRA UCEDA durante el rodaje de "MARÍA Y LOS NIÑOS POBRES", gran obra boliviana ejemplo del catolicismo militante. De izquierda a derecha: ALEJANDRO PINEDO, DIEGO TERÁN, DON LEÓNIDAS ZEGARRA UCEDA.

FERNANDO GUTIÉRREZ "HUANCHACO" (a la izquierda de la imagen) y DON LEÓNIDAS ZEGARRA UCEDA (a la derecha de la imagen). Vemos a dos artistas peruanos extraordinarios que comprenden la sensibilidad católica hispanoamericana y crean obras trascendentes de acuerdo a nuestro patrón cultural, caracterizado por su belleza, bondad y verdad.

¡¡POBRECITO!!. El señor EASTWOOD carece de la gracia de haber nacido en Latinoamérica. Hay que rezar por su alma para que se convierta al catolicismo y pueda adquirir aunque sea una protón de la sublime sensibilidad hispanoamericana. ¡Tarea para los lectores de perucine.blogspot.com!.

3 comentarios:

Anónimo dijo...

http://www.coastcomp.com/av/fltline2/avmovie.htm

Military Aviation Movie List

Initially Compiled by Marshall Cram

HTML Conversion by Michael Brunk

Additional material and formatting by Bob McKellar

Anónimo dijo...

http://www.usamilitarybenefits.com/military-bases/edwards-afb.html

The movies, The Right Stuff and Firefox, both filmed scenes at Edwards AFB.

Anónimo dijo...

http://books.google.ru/books?id=Nj3aVxRaZuwC&pg=PA202&lpg=PA202&dq=firefox+movie+air+force&source=bl&ots=Tjk3jGfOom&sig=WQl9b861Y7NvJDtgAvIX_OrSwKs&hl=es&ei=K7tITdyrOoWglAfq06CTBA&sa=X&oi=book_result&ct=result&resnum=4&ved=0CC0Q6AEwAzgU#v=onepage&q=firefox%20movie%20air%20force&f=false

Clint Eastwood: a cultural production Escrito por Paul Smith

Eastwood:
"the military cooperated with the making of the film, so we thought that a benefit would be appropriate"