SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Rande Is . . . HOME -- Ignore unavailable to you. Want to Upgrade?


To: paret who wrote (57327)2/27/2006 5:36:07 PM
From: MJ  Respond to of 57584
 
THESE PARAGRAPHS EXCERPTED FROM THE ARTICLE YOU CITED IS WHAT IS AT THE HEART OF THE MATTER WITH GIVING CONTROL OF PORTS TO FOREIGN ENTITIES----THE SAME FOR CONTROL OF ROADS--OR LETTING A FOREIGN ENTITY CONTROL THE FOOD SUPPLY CHAIN.

THIS STRATEGY IS ONE THAT ANY SPY ORGANIZATION WOULD USE TO OBTAIN WHAT IS DESIRED.

SO WHAT, THROW A TOKEN TO AMERICANS AND LET THEM HAVE A SUDSIDIARY-------AND BE SURE THAT THE SUDSIDIARY IS CONTROLLED BY "THEIR PEOPLE" THE PEOPLE PUT IN CHARGE OF THE SUDSIDIARY.

"In the original explanation of the deal, officials reassured people with concerns that there was no threat coming from the UAE because “the company is to manage the administrative space of the ports operations exclusively, not the security areas.” While the argument is logical, that isn’t the logic of the would-be terrorists. Bureaucracy and security are intertwined when it comes to strategic penetration. Al Qaida teams aren’t going to play a Hollywoodian James Bond movie and we’re not going to necessarily see Dubai CEOs jumping on a freight boat strapped with kilograms of TNT. Things are not square and triangular in the Terrorism business, but more fluid. The Jihadists won’t be that obvious in their use of a potential infiltration. The deeper danger of penetration will be more complex: First, the enemy will penetrate from the UAE end, aided by Salafi or even Khumeinist sympathizers. This first line of defense could be breached by hiring elements to form a network inside the company, or subcontracted “hostile” entities in the future. Second, while moving inside the layers of the “management” the “net” could then hire elements coming from the American side. If we project that Jihadists are operating inside the US, a UAE company “managing” six main US ports would be a first rate opportunity for them to “connect.” Hence, one can project that once a “network” installs itself inside the corporation, it would be able to recruit US citizens and residents sympathizers with or part of the movement. A bridge would thus be established between the outside cells and the inside cells through a perfectly legitimate outlet.

Action would come once the bridge is operational. It could develop into multiple directions. General intelligence and spying in the US is only one possibility. Storing material in these sensitive areas is two. Learning about the security systems in these ports from the administrative end is three. Disrupting national security operations is four. The deeper the layers, the wider possibilities would open to the Jihadists. But the initial “hole” is what allows the chain to develop."

Think we better start plugging those "holes" not opening up new ones. jmho

mj