Sunday, January 24, 2010



Saturday, November 21, 2009

YES NO Cyber Nuclear bomb Chemical Biological Radioactive dirty bomb Regular explosives Firearms   

Wednesday, October 7, 2009


This is a very informative video put out by the Department of Homeland Security (DHS). According to the National Terror Alert at, Janet Napolitano joined Colorado Governor Bill Ritter recently to unveil “Recognizing 8 Signs of Terrorism.” It is designed to educate Colorado citizens about the shared responsibility of recognizing signs of terrorist activity.

“The vigilance of individual citizens is critical to protecting our country from the threat of terrorism,” said Secretary Napolitano. “This video provides essential information on how to identify the warning signs and emphasizes the vital role of such assistance in state and local law enforcement’s counterterrorism efforts.”

The video is narrated by John Elway and Kim Christiansen and produced through a partnership between the Colorado Office of Homeland Security, the Colorado Department of Agriculture, the Colorado Information Analysis Center (CIAC) and the Center for Empowered Living & Learning (The CELL)—a non-profit institution dedicated to addressing the global threat of terrorism.

While in Denver, Secretary Napolitano also joined Attorney General Eric Holder, Federal Bureau of Investigation Director Robert Mueller and Office of National Drug Control Policy Director Gil Kerlikowske to participate in the National Association of Chiefs of Police Conference. Enjoy the video...and learn!

Wednesday, August 26, 2009


Wednesday, August 19, 2009


Three CIA experts and others claim that our troops in Afghanistan are side tracking going after al Queda and actually increasing the likelihood that American civilians will be killed in a future terrorist attack. This short video, "Part 6 of Rethink Afghanistan," has three former high-ranking CIA agents tell us why.

President Obama's trilateral strategy in Afghanistan seems to be a well-thought out one. But, will it succeed? Please join the FORUM in the upper right-hand margin and voice your opinion. WILL PRESIDENT OBAMA'S TRILATERAL STRATEGY IN AFGHANISTAN WORK?

German Soldiers taking a patrol break. Talking to Afghan children (Left).

Canadian soldiers on patrol (Right).

During the campaign trail before his win, it was claimed that President Obama shunned our troops in Afghanistan. Watch the enlightening factcheck video that proves he never snubbed our guys and gals fighting there. Shame on the right-wing crackpots who circulted this lie...using our brave troops as political pawns.

A roadside bomb kills Americans in convoy

American troops drinking tea with local Afghans

Thursday, July 16, 2009


“Congress never could keep any matter strictly confidential; someone always babbled”- John Jay, agent of America’s diplomatic affaires, frustrated that the Congress consisted of too many members to keep America’s most vital secrets (circa 1784).

I will write my senator and congressmen and urge them to introduce a bill to post John Jay's statement in every representative's office. Yeah, if that move would prevent leaks...perhaps Dick Cheney, Karl Rove, Scooter Libbey and Bob Novak should receive complimentary plaques...from the CIA. Just kidding...I think! Actually, a little humor is needed to get through all of this. The IC, especially the CIA, has always been cannon fodder for certain members of congress...for over two centuries! Thus, the James Bond and Ursula misquotes.

Talk about babbling, The video below proves Karl Rove lied when he denied he outed CIA covert operative Valerie Plame:
Because of documented videos like the above, Declassified Secrets does, indeed, applaud both the statements that John Jay made over two centuries ago and President Obama's recent one- that he would veto the Intelligence Authorization Bill if it included a provision that allows information about the Intelligence Community's covert actions to be given to the entire House and Senate Intelligence Committees rather than to the "Gang of Eight"- the Democratic and Republican leaders of both houses of Congress and the two Intelligence Committees.

And this is from a so-called "liberal" president? Move over Senator Church; I don't think your Committee will be reinstated any time soon. I get the feeling President Obama is fully aware that a genuine terrorist threat exists inside and outside the United States and that the Intelligence Community's agents and case officers hit the streets at home and abroad, daily, to keep Americans out of harm's way. Let's all give these brave souls many KUDOS!

Remember when former Bush Press Secretary Scott McClellan said during his press conferences that both Karl Rove and Scooter Libbey swore to him that they didn't know Valerie Plame or that she was a CIA case officer? Later, of course, McClellan discovered they both lied to him. Thes video with Matt Cooper proves that Rove did know about Valerie Plame and her CIA case officer status:
Let's hear excerpts from CIA Case Officer Valerie Plame about the leak:
I culled little OSINT out of Valerie Plame's book, "Fair Game" (photo below), although she did autograph it for me. Below are some "meaty" pages about Karl Rove and his part in leaking Plame's undercover status. Still, despite lines of redacted statements, it was an interesting book and I would highly recommend it. I gleamed much about the daily duties of CIA undercover case officers. Last year, I interviewed a CIA case officer who was a classmate of Plame's at "The Farm." He told me she was a remarkable woman and was the youngest person in his class, eventually becoming a NOC!


Wednesday, July 1, 2009


Just in from the Department of Homeland Security- National Terror Alert.

"The North Korean ship tracked by the US Navy and suspected of transporting weapons or military know-how in violation of UN sanctions has turned around, a Pentagon official said
(See "U.S. AND NORTH KOREA HEADED FOR SHOWDOWN" POST BELOW). The official declined to provide details, including where the Kang Nam 1 ship — reportedly originally bound for Myanmar — could now be headed, but news reports out of South Korea suggested the ship may be returning home two weeks after it set sail June 17.

A diplomatic source speaking on condition of anonymity told the Korea Herald that the ship was 'near our waters,' which could suggest that sanctions were having an effect on reclusive North Korea.

'If the ship is on its way back, it would mean that Resolution 1874 is taking effect and causing the North to retreat,' Kim Tae-woo, vice president of the Korea Institute for Defense Analyses, told the newspaper.

The Kang Nam 1 quickly drew the attention of the US military under new UN sanctions designed to punish Pyongyang over its May 25 underground nuclear test.

The US ambassador to the United Nations, Susan Rice, confirmed Sunday that the United States was tracking the cargo ship.

U.S. Navy tracking Kang Nam 1

'Obviously we’re pursuing and following the progress of that ship very closely,' she told the CBS network."

Source: This story came to DECLASSIFIED SECRETS via Homeland Security - National Terror Alert. National Terror Alert is America's trusted source for homeland security news and information and this site subscribe to it.

The Kang Nam 1 has a questionable history, according to intelligence experts: The ship had cleared the Taiwan Strait and was hugging the Chinese mainland. Intelligence experts were pondering if the Kang Nam may need to stop in some port to refuel. In the past, the Kang Nam stopped in Hong Kong's port.

A U.S. defense official said he tended to doubt reports that the Kang Nam was carrying nuclear-related equipment, saying information seems to indicate the cargo is banned conventional munitions. Both officials spoke on condition of anonymity in order to talk about intelligence.

North Korea has carried banned goods to Myanmar before on the Kang Nam, said Bertil Lintner, a Bangkok-based North Korea expert who has written a book about leader Kim Jong Il.

North Korea has been helping the junta in Yangon build up its weapons arsenal, a South Korean intelligence expert said. He spoke on condition of anonymity because of the sensitivity of the issue.

The two regimes, among Asia's most repressive, restored diplomatic ties in 2007. Not long after that, in April 2007, the Kang Nam docked at Thilawa port saying it needed shelter from bad weather. But one expert said reports show the weather was clear then, and two local journalists working for a foreign news agency who went to write about the unusual docking were arrested.

The North Korean cargo ship Kang Nam 1 anchored in Hong Kong waters in Oct. 24, 2006. "The Kang Nam unloaded a lot of heavy equipment in 2007," Lintner said. "Obviously, the ship was carrying something very sensitive at that time as well."

North Korea has also helped Myanmar dig tunnels in recent years, said Lintner, adding that the cash-strapped North may have received rice, rubber and minerals in return for its military and other assistance. "North Korea appears to have exported conventional weapons to Myanmar in exchange for food," another expert said.

Pyongyang is believed to have transported digging equipment to Myanmar, which is seeking to make its new capital a fortress with vast underground facilities, he said, speaking on condition of anonymity to discuss intelligence.

Note: This info was collected from Associated Press writers Hyung-jin Kim and Jae-soon Chang in Seoul, and Pauline Jelinek in Washington, contributed to this report.

Brief on Kang Nam 1: This 3-year old, 2006 news report on the Kang Nam 1 reported suspicions of arms smuggling:

Wednesday, June 10, 2009


The Heritage Foundation created a video that explains the critical need to re-initiate and completely fund a Strategic Defense Initiative (SDI) program... a anti-ballistic missile (ABM) defense program. With countries like North Korea (Photo 1: below) and Iran acquiring the capability to launch ICBM's, our negotiation positions in the future will be severely weakened.
(Note: the "Research recommendations" section at the end of this article lists proven books, DVD's and audio tapes on this article topic. All have been reviewed and are recommended by DECLASSIFIED SECRETS.)

Such countries, as they build and develop their ICBM numbers, payloads, and accuracy have the capacity to change life as we know it in the U.S. in less than 33 minutes. The documentary 33 Minutes: Protecting America in the New Missile Age is a one-hour documentary produced by the Heritage Foundation that tells the story of the fastly developing threat foreign enemies pose to every one us. The truth is brutal - no matter where on Earth a missile is launched from it would take 33 minutes or less to hit the U.S. target it was programmed to destroy.

Nuclear proliferation around the world, and the threat of a ballistic missile attack of some kind is mounting as more and more countries obtain rocketry and nuclear technology. The ongoing threat toward America is also accelerating due to the fact that there are many rogue nations and non-state terrorist organizations who either have or are seeking ballistic missiles and nuclear technology.

The challenges of protecting America and its citizens for President Obama's administration are great. Featuring rare footage and in-depth interviews with leading experts in the field, 33 Minutes is the definitive documentary exposing the untold vulnerability we all face and the action plan necessary to revive a strategic missile defense system that America uniquely can develop, maintain, and employ for its own defense and the peace-loving world's security. Note: View THADD videos in upper left Yellow margin
The Heritage Foundation video demonstrates that our technology has advanced so much since President Reagan's "Star Wars" SDI days, that we now can not only hit a bullet with a bullet, but we can hit a spot on a bullet with a bullet. Still, the SDI program is lacking in adequate funding and is incapable of defending the U.S. against ICBM attack. Watch "33 Minutes" trailer video below:

(Above photo 2) Pine Gap- a joint U.S./Australia anti-ballistic missile system
DECLASSIFIED SECRETS COMMENT: How about a global SDI system? After all, won't we have one in the Czech Republic soon? (Scroll down to Photos 8 & 9). As North Korea sells ICBM and nuclear technology to rogue nations and threatens to use her ICBM's; as Iran continues to develop ICBM capabilities (photos below); and as the world frets over the Taliban taking over in Afghanistan, DECLASSIFIED SECRETS believes a Global Strategic Defense Initiative (SDI) program should be developed fully. Yes, while writing this piece, North Korea has threatened use of her missile warheads offensively if the world places sanctions upon her and President Asif Ali Zardari of Pakistan voices concern on the danger of his country's nuclear weapons falling into Taliban hands. At the same time, he states that Pakistan's nuclear arsenal is safe and in good hands.
Some in India say this is just a "ruse to garner as much funds as possible from the US and the West to spirit away to his accounts." True, we gave billions of military aid to Pakistan to better arm the Frontier Corps army so they could drive the Taliban and al Queda out of their provinces. As we know, it was never spent for the purpose it was intended. Instead, U.S. military funding to Pakistan was spent on offensive weapon systems aimed at our friend, India. A Pentagon document disclosed that aid given by the U.S. has been used to build up and strengthen Pakistan's armed forces armory against India. As one man from India stated, "Pakistan is so obsessive with India."

So, why not develop a fail-proof, anti-ballistic missile (ABM) system...soon? The current ABM system that protects America's shores will be simply intensified qualitatively with the new failure-proof technologies and quantitatively. However, overseas, the U.S. could install fail-proof 2nd and 1st layer ABM systems in the "weaker," less-developed countries to negate their well-intentioned desires to acquire nuclear technolgies and rocket propulsion systems to protect themselves, through mutually-assured destruction capabilities, from threat-mongering neighbors. (Please view videos and books on THAAD in Yellow margin to the right).

Here are four futuristic reasons why we should:
(1) Diplomatic upside: We could install this fail safe SDI program to our nervous friends around the world...which would include on-station American specialists and advisors. Such a system would be installed as a missile defense program tailored-made for each countries individual needs and threat status. Scroll down to Photos 4 & 5, which show map of countries within Iran's Sahab-3 missile range. By installing a U.S. failure-proof ABM system in each of them, Iran's hegenomy goals would be negated. Countries yearning for security by developing or importing (from N. Korea?) missile technologies alongside nuclear capabilities would realize they didn't have to pursue these options.

(2) Economic feasibility and Self-sustainment. The system would be free from unstable U.S. federal funding and political whims. We could lease or 'rent out" such a system to our nervous allies. The copious amounts of monies taken in would pay for not only the cost of operation, but for massive and continual R&D to improve the SDI system. It would be an enduring and self-sustaining system, funded from foreign clients.

(3) Nation-Empowerment. No longer would “weaker” nations acquiesce to the desires of rogue neighbors. As the heavyweight prizefighter Jack Dempsey once said, “The best offense is a good defense.” Such a system, certainly, would be a peaceful, defensive venture, but would carry a deadly message to rogue regimes who see their power, dominance and threat-mongering capabilities grow useless. Many "weaker" nations would be more inclined to join the world community's push for peaceful existence rather than stay neutral and crouch before a derelict neighbor. (Photo 3 above)- Test launch of Pakistan's Hatf-3 {Ghaznai} SRBM in October, 2003. It's capable of delivering 20 kiloton nuclear warhead.

(4) Create Agenda for Global Peace Agenda. Participating countries would meet regularly to discuss connectivity, since each SDI system could communicate with another. The worldwide SDI system would be installed and managed by the U.S., so administrative and daily managerial difficulties could be worked out. There would also be a treaty binding participating nations together: they must protect each other with this system. For example, if a rogue nation launched a missile attack against another, and their missile passed over several participating countries, each would attempt to destroy it, even though it wasn’t targeted at them. On the same note, participating countries that do not possess long-range missiles or nuclear technology, will have have the ABM installations removed if they pursue these ventures.

Hopefully, a fully-funded, full-proof ABM system will be perfected by the U.S.

Robert Morton
Declassified Secrets

(Photo 4 above) Iran displaying Sahab-3 MRBM in September 3, 2003 parade
(Photo 5 below) Visual of 2,000 km range of Iran's Sahab-3 missile fired from within Iran
(Photo 6 below) SDI! Martin Marietta Corp. rocket-propelled missile accelerating toward collision with nuclear-tipped missile ICBM.

President Reagan’s SDI Speech - The Announcement of Strategic Defense Initiative (Photo 7 left)
March 23, 1983
Excerp from speech:
"I call upon the scientific community in our country, those who gave us nuclear weapons, to turn their great talents now to the cause of mankind and world peace, to give us the means of rendering these nuclear weapons impotent and obsolete.
Tonight, consistent with our obligations of the ABM treaty and recognizing the need for closer consultation with our allies, I'm taking an important first step. I am directing a comprehensive and intensive effort to define a long-term research and development program to begin to achieve our ultimate goal of eliminating the threat posed by strategic nuclear missiles. This could pave the way for arms control measures to eliminate the weapons themselves. We seek neither military superiority nor political advantage. Our only purpose -- one all people share -- is to search for ways to reduce the danger of nuclear war.

My fellow Americans, tonight we're launching an effort which holds the promise of changing the course of human history. There will be risks, and results take time. But I believe we can do it. As we cross this threshold,

I ask for your prayers and your support.
Thank you, good night, and God bless you.
President Ronald Reagan

(Photo 8 above) 5-step U.S. anti-ballistic missile plans for Czech Republic

(Photo 9 below) What step-4 will look like when Czech-based radar system directs U.S. interceptor missiles
(Photo 10 below) The Iskander-E is among the ballistic missiles Russsia exports

Friday, June 5, 2009


Dear Declassified Secrets:

I am married to the widow of a deceased E-6 cryptologist whose plane exploded enroute from Cubi Point, PI to the Tan Son Nhut facility just outside Saigon, Vietnam. My question why his mission would still be classified? I contacted NSA to get information because I am trying to get his name and the other 9 in the crash on the Vietnam Memorial Wall here in Washington, D.C.

The lady I spoke with said she couldn't give me more information because I was not next-of-kin. What I really don't have is something saying the mission the cryptologists were on was an operational mission in support of the fleet or an operation somewhere in the world. Since he was flying on a C2A from Cubi Point, PI to Tan Son Nhut it appears on the surface he was just on a ordinary "logistics support mission" (something like a mail run) but I know cryptologists don't just fly around (6 of them) to deliver mail. I believe he was enroute to Tan Son Nhut to pick up a different aircraft for further transfer to the USS Enterprise which had just been turned around and headed back towards the Indian Ocean. I believe the 6 cryptologists were going to pick up another plane and fly to the Enterprise where they would then begin their cryptologic mission. I need something official that will say that, because the C2A is not a plane the cryptologists would be conducting operational mission tasks from. That's why they needed to get to Tan Son Nhut to pick up a plane that could fly them to the Enterprise where they could begin their mission once aboard.

One of his two surviving daughters will have to use the FOIA to see what they can find out. Lastly, the lady at NSA told me that the mission that CTR1 Walter Ray Woods Jr. was on has not yet been declassified. His name does appear on the NSA Memorial Wall along with 5 other cryptologists who died that day. This tragic accident occurred on December 12, 1971. You would think it would have been declassified by now. I know what the mission was and where he was going. However, I do not have proof of my knowledge.

Is there any way you could assist by pointing me in the direction of someone who could provide help? I have already written to our congressmen and senators from the state of Maryland and that proved fruitless. I have been supplying information to a man down in Tennessee who puts the packages together to forward up to the Washington area where it is reviewed and if accepted the man in Tennessee is given the word to make the arrangements for his name to be put on the wall, where a ceremony is held every Memorial Day. I really need all the help I can get to crack this one. Anything you can do to help would be greatly appreciated. His daughters are grown now with children of their own.

By all means, do anything you need to find people to help us.


Dick Willis
Stanley Associates, Inc
Senior Analyst
1100 New Jersey Ave. SE Suite 800
Washington, D.C. 20003
(202) 314-4244 Office
(202) 488-1951 Fax
(301) 448-0491 Cell

COMMENT FROM DECLASSIFIED SECRETS: Mr. Dick Willis mentions The National Security Agency/Central Security Service Cryptologic Memorial honors E-6 cryptologist Walter Ray Woods Jr. and the five other cryptologists who were killed on that ill-fated flight bound for the Tan Son Nhut facility just outside Saigon, Vietnam. I found the name of Willis and the other cryptologists who died with Woods on that tragic flight on December 12, 1971. They are listed below:

CT03 James M. Coon, USN 12 Dec 1971
CTISN John M. Deremigio, USN 12 Dec 1971
CTO1 Donald E. Dickerson, USN 12 Dec 1971
CTOSN Stephen H. Elliott, USN 12 Dec 1971
CTRI Walter R. Woods, Jr., USN 12 Dec 1971
CTM2 Gregory K. Zeller, USN 12 Dec 1971

In total, there are 153 names on the black granite memorial, which stands 8 feet tall and rests inside the NSA complex. The words, “THEY SERVED IN SILENCE” are etched into the polished stone at the cap of a triangle (Photo above). I attended a seminar inside the CIA HQ not long ago. Just like the memorial inside the NSA HQ, I paused to look at the CIA memorial (Photo below), which has stars for each man and woman who died while in service of country.
To me, both memorials possess a shared voiceless hush of secrecy: men and women who breathed their last breath in the line of duty…little mention of their names……guarded discussions of their undertakings…no public fanfare or shiny medals to wear on ticker tape parades upon arriving under false identities…operating under a cloak of darkness, even after they give their lives in the line of duty.

Any members of the AFIO who are familiar with the mission the six cryptologists undertook when the plane they were on exploded may want to contact Mr. Dick Willis, the writer of the above letter. Perhaps, their assignment should still remain classified- I do not know. However, the NSA still keeps the operation they were on classified. So, any one who knew CTRI Walter R. Woods, Jr., USN or his five cryptologist friends flying with him may want to contact Mr. Willis (and Woods’ widow) and simply share with them your memories of CTRI Walter R. Woods, Jr., USN ...declassified ones, of course!

Robert Morton, M.Ed., Ed.S.

Related links:

C2A unsuccessful landing on aircraft carrier:

C2A aircraft landing successfully on USS Nimitz:

Note: Aboard ship, Cryptologic Technicians control the flow of messages and information. Their work depends on their special branch: CTAs or Administration Cryptologic Technicians (As of 01 OCT 07 CTA merged with the YN rating) perform administrative and clerical duties that control access to classified material. CTIs or Interpretive Cryptologic Technicians handle radiotelephone communications and foreign language translation. CTMs or Maintenance Cryptologic Technicians maintain electronic and electromechanical equipment. CTNs or Networking Cryptologic Technicians handle computer communication. CTRs or Collection Cryptologic Technicians handle all Morse code communications and operate radio direction-finding equipment. Finally, CTTs or Technical Cryptologic Technicians handle all communications by means other than Morse code and electronic countermeasures. (1)

(1) U.S. Navy Enlisted Ratings". University of California Berkeley, Naval Reserve Officer Training Corps. U.S. Navy.

Saturday, January 24, 2009


In April 2009, at an endisclosed location in Cleveland, AFIO members heard FBI Special Agent Figliuzzi discuss "Cyber Attack." Frank Figliuzzi earned his undergrad degree from Fairfield University CT, and a Juris Doctorate with honors from the Un. of Connecticut School of Law.

He joined the FBI in 1987 and was assigned to the Atlanta Division, working terrorism and foreign counterintelligence investigations. Later, his assignments with the FBI involved economic espionage and foreign sponsored theft of trade secrets. Agent Figliuzzi led the FBI's first squad devoted exclusively to crimes against children, and following 9/11, he was selected to head FBI Miami's new Counterterrorism Branch. He implemented the South Florida Joint Terrorism Task Force with 160 personnel from 34 agencies and served as on-scene commander during the nation's first anthrax murder in Boca Raton, Florida.
(Above right photo- deadly anthrax spore)

In 2006, FBI Director Robert S. Mueller, III, has named C. Frank Figliuzzi the Special Agent in Charge of the Cleveland Field Office. The Cleveland Field Office is headquartered in downtown Cleveland, Ohio, with nine resident agencies in Akron, Canton, Elyria, Lima, Mansfield, Painesville, Sandusky, Toledo, and Youngstown.

Agent Figliuzzi discussed Cyber Terrorism ath this private meeting, information which I plan to write newspaper commentaries about.


In March 2009, as a member of the Association of Former Intelligence Officers (AFIO), I'll be meeting retired Colonel Behram A. Sahukar of The Parachute Regiment, Indian Army. The location is classifed. He's an invaluable resource for DHS. After reading his writings, particularly the document "THE INDIAN APPROACH TO COUNTER- INSURGENCY OPERATIONS," it is obvious he has much to offer the U.S. in countering terrorism and insurgency-related violence.

He's fought counter-insurgency operations in India for years and in the last two decades, the casualties of violence in India have been high:
1. Over 65,000-75,000 killed.
2. Over 760,000 persons displaced from their homes.
3. Over 10,000 security personnel killed.
4. Assassination of Prime Minister Indira Gandhi in 1984 by her Sikh bodyguards. 5. The blowing up of Air India passenger aircraft Kanishka by Canada-based Sikh extremists killing all 329 persons on aboard in 1985.
6. Assassination of Rajiv Gandhi, former Primer Minister of India by a Liberation Tiger of Tamil Eelam (LTTE) female suicide bomber in May 1991.
7. The hijacking of an Indian Airlines aircraft with over 180 persons on board by Pakistani terrorists from Katmandu to Taliban-held Kandahar in December 1999 and the subsequent release of hardcore Pakistani terrorists held in Indian jails.
8. A suicide attack on India’s Parliament to kill or hold hostage over 200 parliamentarians who were in session inside the building in December 2001.
9. A suicide attack on the Jammu and Kashmir State Legislature building (Srinagar) in October 2001 killing over 45.
10. Multiple bomb attacks on economic and soft targets in Bombay in March 1993 killing 257 and injuring over 1,700; in August 2003 killing 52; and on commuter trains in July 2006 killing 209 and injuring hundreds more.
11. Multiple bombings in October 2005 two days before the Hindu festival of Diwali and the Muslim festival of Eid in Delhi killing 61 and injuring over 200.
12. Bombings on the Delhi-Lahore Samjhauta Express (India-Pakistan Peace train) in February 2007 killing over 68. Several other unexploded bombs were located on the train and defused by the authorities.
13. Twin bombings in market places in August 2007 killing over 42 in the South Indian city of Hyderabad. 19 other bombs were set to go off across the city but were detected and defused by the police well in time.
14. Various attacks on civilians in market places, towns and villages, places of Hindu worship, and pilgrims killing hundreds all over India as a fallout of the simmering unrest in Jammu and Kashmir and the ongoing insurgency in some of India’s Northeastern States.

15. Mumbai (below photo & right photo)

Colonel Behram A. Sahukar offers 12 basic tenets to follow (Declassified Secrets comments are in parenthesis):
1. Indian approach to COIN (counter insurgency) has been a mix of political accommodation, economic development and the use of force. (Sounds like Gen. Petraeus may have adopted the Indian COIN stategy).
2. Demands for secession or independence from the Union are put down firmly and not accepted. India is willing to wear down the insurgents until this demand is dropped or modified.
3. India is willing to talk to separatist groups and its neighbors even though they support cross border terrorism and insurgency (Pres. Obama accepts this strategy in Iranian and general terrorist relations; Pres. Bush did not).
4. While India is willing to create new states within the Union to accommodate ethno-nationalist aspirations and tribal boundaries, it is not willing to create additional states based solely on any one religion (This doctrine isn't what Vice Pres. Biden recommended for Iraq; remember, he wanted Iraq divided up into separate regions, based on religion).
5. India has been very particular not to use indiscriminate force, aerial bombardment and heavy firepower in COIN despite its conventional and nuclear superiority in the region (To what extent are we creating enemies by killing civilians, albeit unintentionally....collateral damage? Perhaps, this is why Col. Sahukar follows this tenet).
6. COIN operations in Kashmir have been very particular to minimize the impact on India’s 140 million moderate Muslims (Torture, secret prisons, Guantanamo, etc.,...could these factors be negatively impacting the Muslim mindset more than we realize? Why create more enemies? Unfortunately, simply having western boots on middle east soil negatively impacts most Muslims, who feel our ways is a threat to their religious beliefs).
7. Despite proof of external support, India has always conducted its COIN within its own borders.
8. India COIN approach follows the strategy of ‘an iron fist in a velvet glove,’ adopting an aggressive military approach towards hard-core insurgents and a humane face towards the local population (I believe General Petraeus is now mastering this strategy in Iraq).
9. India’s COIN approach has been aimed at using the security forces to create conditions for a political solution to restore normalcy in the insurgency affected area (We are using this strategem in Iraq and will in Afghanistan).
10. Human rights and weaning the population away from supporting the insurgents is the major plank of India’s COIN operations. To achieve this a multi-dimension approach to include, people-centric civic action programs, economic development, perception management programs, cultivating a responsible media, training of troops for COIN operations, force modernization, good governance, the rule of law, accountability and transparency, diplomatic and international cooperation and support, and a functioning corruption free democracy form parts of the comprehensive Indian approach to COIN operations (A lesson here for the U.S.; Iraq has much corruption resulting in much of our U.S. monies and efforts having been wasted).

11. India has the capability to stay the course and fight an insurgency in a protracted low intensity conflict to wear down the insurgencies and its supporters however, it prefers to resolve the legitimate grievances and welcome its citizens into the democratic process as quickly as possible (Declassified Secrets likes the term "low intensity conflict." The enormous cost of the Iraq war is wearing us down. If we had focused more on tenets 1 to 11 after invading Iraq, Declassified Secrets wonders if the U.S. would have lost less lives, wounded the war down quicker, and saved billions of dollars).
12. In Kashmir, the Indian approach has been based on three major thrust lines to wean away Kashmiri support to the insurgency and restore normalcy; first, cut off the insurgents from their support base in Pakistan and destroy them within India to provide security to the state, improve the socio-economic structure of the state by increasing development projects, ensuring good governance, and improving the daily life of the people ravaged by decades of insurgency and terrorism, psychological initiatives to win the hearts and minds of the people and initiate a genuine dialogue with all parties to the conflict restore India’s credibility within Kashmir and arrive at a just resolution within the Union ("Wean awayt Kashmiri support to the insurgency." Let's wean away support to the Taliban. How about starting by sending teams of agricultural scientists into Afghanistan with the mission of finding crops that will grow there that have a ready world market. Then, R&D will allow us to plow up hundreds of thousands of Poppy acres to grow these crops. Americans won't mind their tax monies paying the Afghan farmers to grow any crop that replaces the Taliban's main income...poppy plants.

Afghanistan's 407,550 acres of poppy fields could be "replaced" with this new cash crop. The government has boosted efforts to plough up poppy, only to spark often-deadly clashes between police and farmers, thus alienating the populace from their government and the U.S. We're playing into the Taliban's hands here!

Let's start with the southern provinces that were worst hit by a Taliban-led insurgency such as Helmand, the biggest opium-growing region. Our agricultural R&D will produce genetically-modified crops that can grow in Afghanistan. Actually, switchgrass and other “second-generation” biomass products could grow there unmodified.

We could build refineries to turn switchgrass and other biomass plants into fuel: good-paying jobs for the Afghans).
This curious graffiti was left on the embankments of Marine Drive Mumbai after the terrorist attack. Does it perhaps reflect the mood of Indians after the Mumbai Terror Attacks on Novermber 26, 2008? I think so!

The Indian Army, Navy and the Air Force of the Gujarat coast on February 9 jointly took up an integrated Theatre Level Operational Readiness Exercise. It was designed to send a message to Pakistan. The exercise designed to validate synergy between the forces. Click below and view Indian TV network coverage of this coordinated operation: