<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Global Security &amp;amp; Intelligencer</title><description>Geopolitical News &amp;amp; Commentaries from the Author of Project GrandSlam &amp;amp; The Zhongguo Orchestra </description><managingEditor>noreply@blogger.com (Jos Ilagan)</managingEditor><pubDate>Thu, 9 Apr 2026 03:33:40 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">29</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://josilagan.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:keywords>Christian,Post,Intelligencer,The,Zhongguo,Orchestra,York,Ryder,Jos,Ilagan,Christian,Novel,Political,Thriller,Christian,Blogger</itunes:keywords><itunes:summary>From The Christian Post Intelligencer</itunes:summary><itunes:subtitle>From The Christian Post Intelligencer</itunes:subtitle><itunes:category text="Religion &amp; Spirituality"><itunes:category text="Christianity"/></itunes:category><itunes:author>Jos. Ilagan</itunes:author><itunes:owner><itunes:email>jo1ranger@gmail.com</itunes:email><itunes:name>Jos. Ilagan</itunes:name></itunes:owner><item><title>OPERATION EPIC FURY: IS IT JUST AND LEGITIMATE WAR?</title><link>http://josilagan.blogspot.com/2026/03/operation-epic-fury-just-and-legitimate.html</link><pubDate>Wed, 25 Mar 2026 20:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-2809679020182367680</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPNCHSrjI6gHk23F8YMRRiztzC61by7wW_Y40PPrV0EgE552ogF_ubSXi4WVKS_chE8sOjWvzUFhlLJZSrLZjwnxHMdAbfpoytjb10DC8keJFJOo_RkkwMTimw6SN0XWmZZz9DxmxU-qb7n_fm9N6Lqc4TPm2sRWpXKcYebAbSaH4L7-RUCsunJzJykk/s640/Operation_Epic_Fury_Press_Briefing_(9573869)%20(1).jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: trebuchet;"&gt;&lt;img border="0" data-original-height="407" data-original-width="640" height="204" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPNCHSrjI6gHk23F8YMRRiztzC61by7wW_Y40PPrV0EgE552ogF_ubSXi4WVKS_chE8sOjWvzUFhlLJZSrLZjwnxHMdAbfpoytjb10DC8keJFJOo_RkkwMTimw6SN0XWmZZz9DxmxU-qb7n_fm9N6Lqc4TPm2sRWpXKcYebAbSaH4L7-RUCsunJzJykk/w373-h204/Operation_Epic_Fury_Press_Briefing_(9573869)%20(1).jpg" width="373" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: trebuchet; font-size: x-small;"&gt;Operation Epic Fury Press Briefing, March 19, 2026&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: trebuchet; font-size: x-small;"&gt;Photo by Benjamin D Applebaum&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b style="text-align: justify;"&gt;&lt;span style="font-family: trebuchet;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Background&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Never Again&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Since 1979, with the invasion of the US embassy in Tehran and the
initial hostage taking of 66 Americans, and down to the 52 staff held captive
for 444 days, the Islamic Republic of Iran (IRI) has been waging an asymmetric
warfare against the United States, with the latter launching Operation Epic
Fury in February 2026 after 47 years of passivity of the US Government (USG).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;To the vociferous anti-Trumper crowd in the Western World, the United
States’ military campaigns in Iran violate international law. The war is met
with total indignation on social media, mainstream media, and even in the halls
of the US Congress. From the first salvo of air attacks on February 28 to this
day, the relentless accusation against President Trump of ushering the country
into another forever war is also echoed overseas. Leaders of the European Union
and NATO, especially Spain, Germany, France, and the United Kingdom, have
castigated President Trump for not informing them of his plan to invade Iran,
then distanced themselves later on from the United States’ military campaigns,
stating that the Iran War is not their war.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The Democrat Party’s calls to end the war and its condemnation of
sending the Americans’ sons and daughters to harm’s way grew louder even more
when the former Director of NCTC, Joe Kent, resigned from his position,
claiming that in his good conscience he could not support Operation Epic Fury
because there is no imminent threat from Iran.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;If the USG considered the IRI as a State-Sponsored Terrorist
Regime--referring to a foreign government providing supplies, training, and
other forms of support to non-state terrorist organizations--the Iranian
government should then be treated with a higher degree of concern. More so, the
IRGC and its proxies, like Hezbollah, are considered to be Religious
Terrorists—groups that use violence to further what they see as a divinely
commanded purpose and who value death more than life itself.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Following the expiration of a 10-day deadline for the Islamic Republic
of Iran to comply with nuclear and security demands of the USG, President Trump
ordered the launch of Operation Epic Fury on February 28, in coordination with
the Israel IDF’s Operation Roaring Lion.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The operation is a large-scale, coordinated US military and cyber
campaign aimed at the systematic degradation of the IRGC’s offensive
capabilities. The USG has articulated four primary military objectives for the
campaign:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Permanent
     Denuclearization:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; To ensure the IRGC never obtains a
     nuclear weapon by neutralizing remaining and reconstituted nuclear
     infrastructure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Destruction of
     Missile Infrastructure:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; To raze the IRGC missile
     industry to the ground by destroying missile stockpiles, launchers, and
     production factories.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Neutralization of
     Naval Forces:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; To annihilate the IRGC Navy and other
     security infrastructure used to project power and threaten regional
     stability, especially in the Strait of Hormuz.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Degradation of
     Proxy Networks:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; To significantly weaken IRGC’s regional
     "terrorist proxies," including Hezbollah, Hamas, and the
     Houthis, preventing them from further destabilizing the Middle East.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;I disagree with Joe Kent. Based on my assessment of the pugnacious
relationship and antipathy of the Islamic Republic of Iran to the United
States, the Shiite regime, which calls the United States the Great Satan, poses
imminent danger, not an immediate threat, to the Americans. I arrived at this
conclusion using the analytical process called CHIPS (© 2016)—Capability,
History, Intention, Pronouncement, and Situation. CHIPS is a strategic
analytical method that I used to assess the Islamic Republic of Iran’s overall
composition and the threat it poses to US national security.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;This study uses Open Sources, which are derived from periodicals,
research studies, and news publications; as such, this presentation can be
identified as an Open Source Intelligence (OSINT).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Capability&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;How strong are the IRI security forces? The IRI security infrastructure
is divided into three forces: the Islamic Revolutionary Guard Corps (IRGC), the
regular Islamic Republic of Iran Army (ARTESH), and the volunteer militia known
as BASIJ. For this study, this paper will cover only the IRGC and its Quds
Force, as they have the capacity to affect and threaten the US government’s
national security both domestically and abroad.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;IRGC is Iran's elite military, intelligence, and economic powerhouse,
with an estimated 125,000-210,000 personnel, focusing on the Ayatollah Regime’s
survival, asymmetric warfare, and regional influence. It also controls Iran's
ballistic missile arsenal, drone programs, and the Quds Force (QF), which
manages proxy networks across the Middle East and East Asia, like Hamas (Gaza),
Hezbollah (Lebanon), &lt;a href="https://www.google.com/search?q=Hashd+al-Sha%27abi&amp;amp;sca_esv=130bc29f65ae38a3&amp;amp;biw=1912&amp;amp;bih=948&amp;amp;ei=tkO7acj5Ma2KkPIP_KmQGQ&amp;amp;ved=2ahUKEwjmjfHnn6uTAxUFhIkEHfqPPKYQgK4QegQIARAC&amp;amp;uact=5&amp;amp;oq=who+are+the+proxies+of+irgc+in+iraq&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiI3dobyBhcmUgdGhlIHByb3hpZXMgb2YgaXJnYyBpbiBpcmFxMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKsCSK6lAVC1EFi2mwFwBXgBkAEFmAHtCaABh0mqARAwLjIyLjMuNC4yLjMuMC4xuAEDyAEA-AEBmAIjoAKgMqgCFMICFhAAGIAEGEMYtAIY5wYYigUY6gLYAQHCAhkQLhiABBhDGLQCGOUEGOcGGIoFGOoC2AEBwgIgEAAYgAQYtAIY1AMY5QIY5wYYtwMYigUY6gIYigPYAQHCAhAQABgDGLQCGOoCGI8B2AECwgIIEAAYgAQYsQPCAhcQLhiABBixAxiDARjHARiKBRiOBRivAcICCxAAGIAEGLEDGIMBwgIOEC4YgAQYsQMY0QMYxwHCAgsQLhiABBixAxiDAcICDhAuGIAEGLEDGIMBGIoFwgIREC4YgAQYsQMY0QMYgwEYxwHCAg4QABiABBixAxiDARiKBcICCxAuGIAEGNEDGMcBwgIKEAAYgAQYQxiKBcICCxAAGIAEGJECGIoFwgIFEAAYgATCAggQLhiABBixA8ICBBAAGAPCAgYQABgWGB7CAggQABgWGAoYHsICCxAAGIAEGIYDGIoFwgIFEAAY7wXCAggQABiABBiiBMICBRAhGJ8FmAMH8QVcZca6Ytx537oGBAgBGAe6BgYIAhABGAqSBwo1LjIwLjUuMi4zoAeU6gGyBwowLjIwLjUuMi4zuAeFMsIHCDAuOS4xOS43yAe_AYAIAA&amp;amp;sclient=gws-wiz-serp&amp;amp;mstk=AUtExfACg7_YNGpQOuCAZ4iZD1W4aLvDZTeFbI5x-1p_xawIAD8y00xFVTgXD2aCHW_MutELqo2zObUGHKn38Ev0GiyNdfd5KflVjl6-ZglqawdQWKUbwXvnw0dg8ynJ0jKxARo&amp;amp;csui=3" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Hashd al-Sha'abi&lt;/span&gt;&lt;/a&gt; (Iraq), National Defence
Forces (Syria), Houthis (Yemen), &lt;a href="https://www.google.com/search?q=Zainabiyoun+Brigade&amp;amp;sca_esv=130bc29f65ae38a3&amp;amp;biw=1912&amp;amp;bih=948&amp;amp;ei=_4u7ac_iNt-qw8cPp5GMqQU&amp;amp;ved=2ahUKEwiulsPypauTAxWOC0QIHdxtLtoQgK4QegQIAxAF&amp;amp;uact=5&amp;amp;oq=who+are+the+proxies+of+irgc+in+syria&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiJHdobyBhcmUgdGhlIHByb3hpZXMgb2YgaXJnYyBpbiBzeXJpYTIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRirAkiIIFC6DFiUFXACeACQAQCYAWGgAbIDqgEBNbgBA8gBAPgBAZgCBaAC4wPCAgUQIRifBZgDAIgGAZIHAzMuMqAH-xyyBwMzLjK4B-MDwgcHMC4zLjAuMsgHH4AIAA&amp;amp;sclient=gws-wiz-serp" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Zainabiyoun Brigade&lt;/span&gt;&lt;/a&gt; (Pakistan), and the
Fatemiyoun Division (Afghanistan), to name a few.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Before &lt;a href="https://www.google.com/search?q=Operation+Epic+Fury&amp;amp;sca_esv=881c8779ce9071b0&amp;amp;sxsrf=ANbL-n6r_8CepG20fb8J6fM7lwQPvERQiA%3A1774451152958&amp;amp;source=hp&amp;amp;ei=0PnDaameOO_CkPIP5M3riQg&amp;amp;iflsig=AFdpzrgAAAAAacQH4AKrPsr_2RNaDVZh_vts0WFrrRT6&amp;amp;ved=2ahUKEwi2xMj2qbuTAxU4JkQIHQ7ECNQQgK4QegQIARAB&amp;amp;oq=what+is+the+IRGC+military+capability+in+terms+of+missiles%2C+drones%2C+and+other+weapons+and+armaments+before+the+Operation+Epic+Fury&amp;amp;gs_lp=Egdnd3Mtd2l6IoEBd2hhdCBpcyB0aGUgSVJHQyBtaWxpdGFyeSBjYXBhYmlsaXR5IGluIHRlcm1zIG9mIG1pc3NpbGVzLCBkcm9uZXMsIGFuZCBvdGhlciB3ZWFwb25zIGFuZCBhcm1hbWVudHMgYmVmb3JlIHRoZSBPcGVyYXRpb24gRXBpYyBGdXJ5SKj3A1AAWIzoA3AEeACQAQKYAYgFoAHWPKoBCzQ1LjIxLjEuNS0yuAEMyAEA-AEBmAJCoALGM8ICBRAAGIAEwgIOEAAYgAQYsQMYgwEYigXCAg4QLhiABBixAxjRAxjHAcICCxAAGIAEGLEDGIMBwgIIEAAYgAQYsQPCAhEQLhiABBixAxjRAxiDARjHAcICERAAGIAEGLEDGIMBGMcDGIoFwgIHEAAYgAQYCsICBhAAGBYYHsICCBAAGBYYChgewgIJEAAYFhjHAxgewgILEAAYgAQYhgMYigXCAggQABiABBiiBMICBRAhGKABwgIFECEYqwLCAgcQIRigARgKmAMAkgcHMjkuMzYuMaAHjcUCsgcHMjUuMzYuMbgHtzPCBwk4LjI3LjI1LjbIB-sBgAgA&amp;amp;sclient=gws-wiz" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Operation Epic Fury&lt;/span&gt;&lt;/a&gt;, the IRGC possessed
the Middle East's largest missile arsenal, boasting roughly 2,500 missiles,
including advanced long-range ballistic and cruise missiles (e.g., Sejil,
Khorramshahr-4) and over 2,000 drones. The arsenal was designed for saturation
attacks on regional targets and to maintain a second-strike capability. This
study focuses on the IRGC’s Force Projection Capability beyond Iran.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Missile Capabilities&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;a href="https://www.google.com/search?q=IRGC+Aerospace+Force&amp;amp;sca_esv=9a0f969563c68435&amp;amp;sxsrf=ANbL-n4cP_7Ir_KIPa9MQKO08Q78av3yWQ%3A1773855338812&amp;amp;source=hp&amp;amp;ei=auK6ad7aL6zj1e8P9J3B0Qs&amp;amp;iflsig=AFdpzrgAAAAAabrwei2BVrghGSkL9Bn6EBiVF8VBwXQ5&amp;amp;ved=2ahUKEwiW2Omvn7aTAxUhD0QIHSFIIOQQgK4QegQIBBAB&amp;amp;uact=5&amp;amp;oq=IRGC+military+capability+and+strength&amp;amp;gs_lp=Egdnd3Mtd2l6IiVJUkdDIG1pbGl0YXJ5IGNhcGFiaWxpdHkgYW5kIHN0cmVuZ3RoMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAFImqUBUABY5J8BcAR4AJABAJgBgwKgAeMvqgEGMC4zNy4yuAEDyAEA-AEBmAIroALWMcICCxAAGIAEGLEDGIMBwgILEC4YgAQYsQMYgwHCAgsQLhiABBjRAxjHAcICDhAAGIAEGLEDGIMBGIoFwgIFEAAYgATCAhEQLhiABBixAxjRAxiDARjHAcICBRAuGIAEwgIOEC4YgAQYsQMYgwEYigXCAg8QABiABBixAxjJAxgKGAvCAgsQABiABBiSAxiKBcICDBAAGIAEGLEDGAoYC8ICBxAAGIAEGArCAgcQLhiABBgKwgIIEAAYgAQYxwPCAgYQABgWGB7CAgsQABiABBiGAxiKBcICCBAAGIAEGKIEwgIFEAAY7wXCAggQABiiBBiJBcICBRAhGKsCwgIHECEYoAEYCpgDAJIHBjQuMzYuM6AHnuABsgcGMC4zNi4zuAfBMcIHCTMuMjAuMTcuM8gHmAGACAA&amp;amp;sclient=gws-wiz&amp;amp;mstk=AUtExfDb0msFB6QEKz-ARKQlMmWbQWNdnhLfOIX28lHvNx6hYYRoCIG4l2Nh4_mJ4AEnIyCvVLLD_OECl5caPBSOcAmFPvflOMM1fQNaXUws-NnRyT3K8Xa2rKNeQQ6POW94G3SNVhwhkdFxffbZ8hZLAE_VUSgfW8I5mZd3j45LgWcMKRu_VkgFfYg6Fa41JT47zHVS&amp;amp;csui=3" target="_blank"&gt;&lt;b&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;IRGC Aerospace Force&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;:
     &amp;nbsp;Operates Iran's largest-in-region
     missile inventory and UAV capabilities, featuring underground missile
     silos, enabling strikes across the Middle East.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Ballistic
     Missiles:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The arsenal included weapons with ranges
     of up to 2,000 km, capable of striking targets throughout the region. Key
     missile models included the &lt;i&gt;Sejil&lt;/i&gt; (1,550-mile range), Kheibar
     (1,240-mile range), &lt;i&gt;Ghadr&lt;/i&gt;, and &lt;i&gt;Khorramshahr&lt;/i&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Cruise Missiles:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; Advanced
     long-range anti-ship missiles were deployed to create a defensive barrier
     and threaten shipping lanes in the Strait of Hormuz.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Missile Cities:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;
     The IRGC maintained extensive underground storage facilities for these
     missiles, ensuring survivability against initial strikes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Precision:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;
     Recent exercises highlighted improved precision in striking targets, as
     evidenced by attacks on Israel and Gulf Cooperation Council countries.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Drone and Naval Capabilities&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;UAVs (Drones):&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;
     The IRGC relied heavily on one-way attack drones (similar to the Shahed
     series) for offensive operations.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Navy Assets:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;
     The &lt;a href="https://www.palestinechronicle.com/fact-sheet-irans-arsenal-explained-missiles-drones-and-the-military-behind-them/" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;IRGC Navy&lt;/span&gt;&lt;/a&gt; operated hundreds of
     fast-attack boats and naval drones intended to threaten shipping in the
     Strait of Hormuz.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Regional
     Proliferation:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC was noted for providing advanced
     drones and missiles to regional allies like Lebanese Hezbollah.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Strategic Posture&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Second-Strike
     Doctrine:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The arsenal was configured so that even
     if a first strike destroyed 50% of the IRGC weapons, over 1,000 missiles
     would remain to retaliate and overwhelm regional defenses.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Production
     Capability:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; Iran's rate of producing new missiles and
     drones was outpacing the ability of regional defenses to create
     interceptors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Missile Response:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; In
     the initial days of the conflict, the IRGC demonstrated its capability by
     launching over 500 ballistic missiles and 2,000 drones.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Quds Force is also active in the Western Hemisphere, focusing on
intelligence gathering, clandestine operations, and the development of logistical
networks. The QF operators are concentrating on Venezuela, the Tri-Border Area
(Argentina, Brazil, Paraguay), and on establishing anti-US influence in the
region. IRGC-QF also has a presence in Mexico and Canada, as reported by the
news media. There is no doubt that the existence of IRGC-QF operators at the
United States’ doorsteps elevates the terrorists’ threats to homeland security.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;History&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The IRI Government, through the IRGC, has engaged in a long-term,
asymmetric campaign against the United States since the 1980s, primarily using
proxy militias, intelligence operations, and naval harassment to avoid direct
conventional war. Key actions include training insurgents in Iraq, attacks in
Lebanon, and provocations in the Persian Gulf, aiming to force US military
forces' withdrawal from the Middle East.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Key Historical Conflict Points&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;1979 US Embassy
     Invasion and Hostage Taking: &lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The crisis lasted from
     November 4, 1979, to January 20, 1981, during the time of President Jimmy
     Carter (D). Iranian militants seized the US embassy in Tehran, initially
     taking 66 Americans hostage, and while several hostages were released
     early, 52 Americans were held captive for 444 days.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;1983 Car Bombing
     in Beirut: &lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Islamic Jihad, an Iran-backed terrorist
     group, staged a suicide car bombing at the US Embassy in Beirut, killing
     17 Americans.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;1983 US Barracks
     Bombing:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC was instrumental in forming,
     training, and funding Hezbollah, which carried out the 1983 US Marine
     barracks bombing in Beirut, killing 241 US personnel.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;1984 Kidnapping of
     William Buckley:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; Hezbollah, supported by the IRGC,
     kidnapped William Buckley, the CIA station chief in Beirut, Lebanon. He
     was held for approximately 15 months and subjected to brutal torture
     intended to force him to reveal CIA intelligence networks. Some
     intelligence reports also suggest he was moved to &lt;a href="https://www.cia.gov/readingroom/docs/CIA-RDP91-00587R000100200047-0.pdf" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Tehran, Iran&lt;/span&gt;&lt;/a&gt;, where he was tortured
     in the basement of the Iranian foreign ministry. The interrogation has
     resulted in the decimation of the CIA network in Lebanon and had a big
     effect on the intelligence collection in the Middle East Operation. Ali
     Larijani was the IRGC Commander in the 1980s and supervised Hezbollah in
     Lebanon. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;1987-1988 Tanker
     War:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC Navy mined the Persian Gulf, resulting in
     Operation Praying Mantis, where the US Navy forces destroyed Iranian oil
     platforms and naval ships.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;2003–2011 Iraq
     War:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The Quds Force supplied Shiite militants with
     advanced roadside bombs, leading to the deaths of over 600 US service
     members.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;2016 Capture of US
     Navy Sailors: &lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The 2016 US–Iran naval incident happened
     on January 12, 2016, during the Obama administration. IRGC forces captured
     ten US Navy sailors after two riverine command boats drifted into Iranian
     territorial waters near Farsi Island in the Persian Gulf.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;2020 Assassination
     of Qasem Soleimani:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The US killed Quds Force commander
     Qasem Soleimani in Baghdad, a major escalation in the conflict. Soleimani
     is reported to be the mastermind of the roadside bombings in Iraq.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Ongoing Regional
     Shadow War:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC continues to support proxy
     forces in Syria, Iraq, and Yemen that target US military bases with drones
     and missiles.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The IRGC's strategy focuses on "guerrilla warfare" and
"low-intensity conflict," aiming to inflict costs that make the US
presence unsustainable in the Middle East, rather than winning through
conventional battle. But this kind of war escalated in 2026 when the American
forces launched Operation Epic Fury.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Intention&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The IRGC intends to expel US military forces from the Middle East,
retaliate for the killing of Qassem Soleimani, and counter US influence in the
region through asymmetric warfare. Their strategy involves targeting US
personnel and interests, supporting proxy militias, and employing cyber warfare
against US infrastructures. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Key aspects of the IRGC's intent and actions include:&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Asymmetric
     Warfare:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC-QF utilizes regional proxy
     militias in Iraq, Syria, and Yemen to attack US coalition forces and
     allies. Rough estimates indicate that the IRGC and its proxy network have
     been responsible for the killings of more than 1,000 Americans since 1979.
     This total includes US military personnel, diplomats, and civilians killed
     in various attacks across the Middle East and elsewhere over the past four
     decades.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Retaliation and
     Terror Plotting:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; Following the 2020 killing of Qassem
     Soleimani, the IRGC has vowed revenge, plotting attacks on American
     personnel, civilians, and former officials in the Middle East and around
     the world.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Targeting US
     Assets:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC frequently engages in harassment
     of US naval vessels, including high-speed boat approaches and drones.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt;"&gt;Cyber
     Attacks:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt;"&gt;
     The IRGC operates a robust cyber program capable of, and has engaged in,
     attacks on US infrastructure and intelligence-gathering. IRGC hackers had
     successfully infiltrated Donald Trump’s 2024 Presidential Campaign email
     system, launched major DDoS campaigns against US financial institutions,
     and even destroyed Las Vegas Sands Casino’s servers in retaliation for the
     political comments made by the owner. Recent cyberattacks by the IRGC and
     affiliated groups against the United States have escalated sharply since
     late February 2026. The IRGC often operates through front groups or
     private contractors to maintain plausible deniability, and these are:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; text-align: justify;"&gt;&lt;span style="font-family: Wingdings; font-size: 10pt; line-height: 115%; text-indent: -0.25in;"&gt;§&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-language-override: normal; font-optical-sizing: auto; font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%; text-indent: -0.25in;"&gt;§ &lt;b&gt;Handala&lt;/b&gt;: Focused on data destruction
rather than extortion; recent attacks claim retaliation for kinetic strikes.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; text-align: justify;"&gt;&lt;span style="font-family: Wingdings; font-size: 11pt; text-align: left; text-indent: -0.25in;"&gt;§&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-language-override: normal; font-optical-sizing: auto; font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; text-align: left; text-indent: -0.25in;"&gt;§ &lt;b&gt;Seedworm (MuddyWater):&lt;/b&gt; Active in cyber espionage and long-term
network infiltration of USG and private-sector targets.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; text-align: justify;"&gt;&lt;span style="font-family: Wingdings; font-size: 11pt; text-indent: -0.25in;"&gt;§&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-language-override: normal; font-optical-sizing: auto; font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; text-indent: -0.25in;"&gt;§ &lt;b&gt;Pioneer Kitten&lt;/b&gt;: Known for targeting the healthcare, satellite,
and defense sectors.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; text-align: justify;"&gt;&lt;span style="font-family: Wingdings; font-size: 11pt; text-indent: -0.25in;"&gt;§&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-language-override: normal; font-optical-sizing: auto; font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; text-indent: -0.25in;"&gt;§ &lt;b&gt;APT42&lt;/b&gt;: Specializes in "rapport-building"
spear-phishing, often impersonating journalists or think-tank employees to
harvest credentials from USG officials.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; text-align: justify;"&gt;&lt;b style="text-align: left;"&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Exporting
     Revolution:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; A core, enduring mandate of the IRGC is
     to defend the Ayatollah’s regime and project power against the US and its
     allies overseas. IRGC and its proxy, Hezbollah, have established a
     strategic foothold in Venezuela with the intention of creating a long-term
     hub to advance Iranian interests in the Western Hemisphere and establish a
     presence near the United States. The US DEA long accused the Iran-backed
     militant group Hezbollah of using Venezuela as a base for drug trafficking
     and money laundering schemes in collusion with Venezuelan officials and
     local cartels. The proceeds from these illicit activities help fund
     Hezbollah's operations in the Middle East.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The US officially designated the IRGC as a Foreign Terrorist
Organization (FTO) in April 2019 due to its involvement in these activities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Pronouncement&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Based on reports leading up to the Operation Epic Fury, the IRGC and
Iranian leadership issued several stark warnings and declarations against the
United States, positioning themselves as prepared for a "full-scale hybrid
war."&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Key pronouncements and actions by the IRGC and Iranian officials before
the 2026 war included:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;&lt;b&gt;The Morbid Chant&lt;/b&gt;: Since 1979, the
     IRI government has been chanting DEATH TO AMERICA. The chant &lt;b&gt;&lt;i&gt;"Marg
     bar Amrika" &lt;/i&gt;&lt;/b&gt;is a widely used political slogan in Iran, often
     chanted during parliamentary sessions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;"Finger on
     the Trigger" Warning:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; IRGC commanders warned
     that their forces were "more ready than ever, finger on the
     trigger," as US warships headed toward the Middle East.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Retaliation
     Threats:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC stated that any US military
     strikes on Iranian nuclear facilities would trigger a response that would
     "cause deep regret.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Escalation
     Signaling:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; An IRGC commander warned that the IRGC's
     deterrence posture meant that a strike on its infrastructure would prompt
     a faster, broader response than in past engagements, focusing on
     "horizontal escalation" against US forces across the Middle East.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Dismissal of US
     Objectives:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; As tensions peaked, the IRGC dismissed
     claims that U.S.-led military campaigns were achieving their goals,
     asserting that Iran would "determine the end of the war."&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;"Great
     Satan" and Regional Threat:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The longstanding
     designation of the US as the "Great Satan" was reaffirmed, with
     then Supreme Leader Ayatollah Ali Khamenei warning that any US attack
     would spark a regional war.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Accusation of
     "Full-Scale Hybrid War":&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; The IRGC stated they
     were actively engaged in a "full-scale hybrid war" and would not
     be intimidated by US pressure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Before the 2026 war, Iran had also officially designated US military
forces in the region as terrorist organizations (following a similar
designation of the IRGC by the US in 2019) and accused the US of creating,
rather than reducing, regional instability.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Situation&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The situation that led to Operation Epic Fury on February 28 was a
combination of stalled diplomatic negotiations, Iran's continued nuclear and
missile ambitions, and immediate maritime escalation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Military Situation&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;US Military
     Buildup&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;: Under Operation Epic Fury, the US
     conducted its largest military buildup in the Middle East since the 2003
     Iraq War. This included the deployment of three aircraft carriers, a dozen
     supporting ships, fighter jets, bombers, and air defense batteries.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Intelligence
     Assessments&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;: The US and Israel concluded that Iran
     was within weeks of possessing a nuclear weapon. This assessment served as
     the primary justification for the subsequent Operation Epic Fury and
     Operation Roaring Lion (Israel).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Regional
     Escalation&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;: Before the war, Israel had conducted
     near-daily airstrikes against Iranian-backed Hezbollah targets in Lebanon
     for nearly a year. Tensions had also been fueled by the October 7, 2023,
     Hamas attacks that killed more than a thousand Israelis and subsequent
     regional fighting.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Asymmetric Posture&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;:
     Iran maintained an asymmetric strategy, relying on drones, fast-attack
     boats, and a network of regional proxies (the "Axis of
     Resistance") to counter conventional US and Israeli power.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Western
     Hemisphere, Mexico, and Canada Presence: &lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The
     IRGC utilizes a "direct air bridge" to Venezuela to transport
     personnel, weapons, and senior intelligence members into South America.
     Precise numbers of IRGC-QF members are not publicly disclosed. Still, they
     are estimated to number between 5,000 and 15,000 personnel globally, with
     a covert presence focused on intelligence gathering, networking with
     criminal organizations, and logistical support. Reports in early 2026
     indicate that the Quds Force has attempted to recruit cartel-linked individuals
     to attack US officials and Iranian dissidents in the US mainland and
     Mexico. IRGC-QF operatives targeted the Israeli ambassador to Mexico in
     late 2024, showing an active intelligence and operational capability
     within the country. Based on reports in 2024 and early 2026, an estimated
     700 individuals linked to the IRGC are operating or residing in Canada.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Missile Force
     Projection:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; In March 2026, the IRGC attempted to
     strike the US-UK base at Diego Garcia, 4,000 km (roughly 2,500 miles)
     away, using two-stage, long-range ballistic missiles (possibly modified &lt;a href="https://www.google.com/search?q=Khorramshahr&amp;amp;sca_esv=881c8779ce9071b0&amp;amp;sxsrf=ANbL-n7aQw57hERz86cCBuq-LtUm5B6wrw%3A1774451222761&amp;amp;ei=FvrDae-XLuPQkPIPocLnwAQ&amp;amp;biw=1920&amp;amp;bih=945&amp;amp;ved=2ahUKEwiDypmYxLuTAxX1I0QIHVMeJx8QgK4QegQIARAB&amp;amp;oq=force+projection+of+IRGC+missile+to+Diego+Garcia+and+how+far+it+can+reach&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiSWZvcmNlIHByb2plY3Rpb24gb2YgSVJHQyBtaXNzaWxlIHRvIERpZWdvIEdhcmNpYSBhbmQgaG93IGZhciBpdCBjYW4gcmVhY2hI5JcCUL8JWOOEAnABeAGQAQCYAawDoAGdQaoBCzQyLjI1LjQuMS4xuAEMyAEA-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_MJHhXugYECAEYB7oGBggCEAEYFJIHCzE3LjM4LjQuMS4xoAe77gKyBwsxNi4zOC40LjEuMbgHujzCBw0xLjIzLjI4LjcuMS4xyAfhAoAIAA&amp;amp;sclient=gws-wiz-serp&amp;amp;mstk=AUtExfDodN6T3Ux4Y0o6k--wGC-koaaF8btlYQgpS7RMSimh8CarWbsQHQIeMv5eVgMtC2lLxKucCeKrI9V-jAkrhW9NGqBkjaBqsUPjYygwbPeByQTHrM4VuxuMptwxTNVImb7kDF2hqy9y7uAre7VxXfDdI8e4NB7sk0h5zBvb3nvDtwc&amp;amp;csui=3" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Khorramshahr&lt;/span&gt;&lt;/a&gt;-class). While the
     attempt failed—with missiles either failing or being intercepted—it
     demonstrated a major expansion in force projection beyond their declared
     2,000 km limit.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Political Situation&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Diplomatic Failure&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;:
     Last-minute "last-chance" negotiations in Geneva between the
     Trump administration and Iranian officials failed to produce a new deal to
     replace the JCPOA, which Trump had dismantled in 2018. Three rounds of
     high-stakes negotiations in February 2026—in Muscat, Oman, and in Geneva,
     Switzerland—ended in a stalemate. Iran refused to accept a
     "zero-enrichment" policy or to include its ballistic missile
     program in a new deal.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Trump's 10-Day
     Ultimatum:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; President Donald Trump issued a 10-day
     ultimatum for Iran to comply with US demands regarding its nuclear
     program. The operation was launched following Tehran's refusal to meet
     these conditions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Iranian Internal
     Pressure&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;: The IRI government was facing severe
     economic pressure from sanctions and widespread domestic unrest before the
     war began, and the United States saw it as a window of opportunity to
     launch the military campaigns along with Israel.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Nuclear Situation&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Uranium Stockpile&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;:
     Based on reports from March 2026, the Iranian Foreign Minister &lt;a href="https://www.google.com/search?q=Abbas+Araghchi&amp;amp;rlz=1C1SQJL_enUS787US787&amp;amp;sca_esv=1f81df499d5b0247&amp;amp;biw=1920&amp;amp;bih=945&amp;amp;sxsrf=ANbL-n6p0mkZurquXE1DViTGNbg1LW5NeA%3A1774412539324&amp;amp;ei=-2LDac7AE-S4kPIP5czVmAc&amp;amp;ved=2ahUKEwje2_m7m7qTAxU3PUQIHcc8BhsQgK4QegQIARAB&amp;amp;uact=5&amp;amp;oq=did+aragchi+say+Iran+has+ten+uraniums&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiJWRpZCBhcmFnY2hpIHNheSBJcmFuIGhhcyB0ZW4gdXJhbml1bXMyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGApI3p4BUKwJWJiWAXABeACQAQCYAa0BoAGrHaoBBTIxLjE2uAEDyAEA-AEBmAIjoAKmHagCCsICEBAAGAMYtAIY6gIYjwHYAQHCAgsQABiABBiRAhiKBcICCxAuGIAEGLEDGIMBwgIREC4YgAQYsQMY0QMYgwEYxwHCAgUQABiABMICDhAuGIAEGLEDGNEDGMcBwgIEEAAYA8ICDhAAGIAEGLEDGIMBGIoFwgIIEAAYgAQYsQPCAgsQABiABBixAxiDAcICChAuGIAEGEMYigXCAgsQLhiABBjRAxjHAcICFBAuGIAEGLEDGNEDGIMBGMcBGIoFwgIIEC4YgAQYsQPCAgUQLhiABMICDhAuGIAEGMcBGI4FGK8BwgIXEC4YgAQYsQMYlwUY3AQY3gQY3wTYAQLCAgoQABiABBhDGIoFwgIHEAAYgAQYDcICBRAhGJ8FwgIFECEYqwLCAggQABgIGA0YHsICCBAAGIAEGKIEwgIFEAAY7wWYAwvxBb5McNti-Qp9ugYECAEYCroGBggCEAEYFJIHBDguMjegB5_DAbIHBDcuMje4B5sdwgcIMC45LjE5LjfIB7MBgAgA&amp;amp;sclient=gws-wiz-serp&amp;amp;mstk=AUtExfBnVjDr3lUHAdq-UFHZ61zvwPkpRb7YBEQx0_HSQ8Y18rgrj6eIQo-Yc-wi66iRtdyn7y_CSBFhH43KDB-LkYSt0sIgAmwL73nu31uHGYRumYTy0ATbDaC1nJlRsHFjkv7OziiuEyqReBu6797VfZboHEjx3OQa6dKbQfhzkRkzsoDZWifD-eJGjMyz7lsbq8Yc4lGiZ_I91Pc2hAquwqot0JlKidYtfkHjZ8Isn3UafA&amp;amp;csui=3" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Abbas Araghchi&lt;/span&gt;&lt;/a&gt; acknowledged that the
     IRGC possesses a stockpile of around 441 kilograms of highly enriched
     uranium, which international experts and reports note is enough to produce
     material for 10–11 nuclear weapons. The stated amount is approximately 441
     kg of 60%-enriched uranium, which is a short technical step away from 90%
     weapons-grade levels.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Quantity for 10
     Bombs:&lt;/span&gt;&lt;/b&gt;&lt;span face="&amp;quot;Abadi&amp;quot;,sans-serif" style="font-size: 11pt; line-height: 115%;"&gt; IAEA Chief Rafael Grossi stated in
     October 2025 that Iran's stockpile of approximately 400 kilograms of 60%
     enriched uranium was enough for ten nuclear bombs if enriched further.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif"&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Based on intelligence assessments&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: 14.6667px;"&gt;in June 2025,&lt;/span&gt;&lt;span style="font-size: 11pt;"&gt;&amp;nbsp;following Operation Midnight
Hammer attacks on Iran’s three nuclear sites—Natanz, Fordow, and
Isfahan, US and Israeli officials claimed massive damage to Iranian nuclear
facilities. Still, other assessments and IAEA input suggested that significant
capabilities survived, and while infrastructures were damaged, not all of
Iran’s enriched uranium stockpile was eliminated.&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Iranian Foreign Minister &lt;a href="https://www.google.com/search?q=Abbas+Araghchi&amp;amp;rlz=1C1SQJL_enUS787US787&amp;amp;sca_esv=1f81df499d5b0247&amp;amp;biw=1920&amp;amp;bih=945&amp;amp;sxsrf=ANbL-n6p0mkZurquXE1DViTGNbg1LW5NeA%3A1774412539324&amp;amp;ei=-2LDac7AE-S4kPIP5czVmAc&amp;amp;ved=2ahUKEwje2_m7m7qTAxU3PUQIHcc8BhsQgK4QegQIARAB&amp;amp;uact=5&amp;amp;oq=did+aragchi+say+Iran+has+ten+uraniums&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiJWRpZCBhcmFnY2hpIHNheSBJcmFuIGhhcyB0ZW4gdXJhbml1bXMyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGAoyBxAhGKABGApI3p4BUKwJWJiWAXABeACQAQCYAa0BoAGrHaoBBTIxLjE2uAEDyAEA-AEBmAIjoAKmHagCCsICEBAAGAMYtAIY6gIYjwHYAQHCAgsQABiABBiRAhiKBcICCxAuGIAEGLEDGIMBwgIREC4YgAQYsQMY0QMYgwEYxwHCAgUQABiABMICDhAuGIAEGLEDGNEDGMcBwgIEEAAYA8ICDhAAGIAEGLEDGIMBGIoFwgIIEAAYgAQYsQPCAgsQABiABBixAxiDAcICChAuGIAEGEMYigXCAgsQLhiABBjRAxjHAcICFBAuGIAEGLEDGNEDGIMBGMcBGIoFwgIIEC4YgAQYsQPCAgUQLhiABMICDhAuGIAEGMcBGI4FGK8BwgIXEC4YgAQYsQMYlwUY3AQY3gQY3wTYAQLCAgoQABiABBhDGIoFwgIHEAAYgAQYDcICBRAhGJ8FwgIFECEYqwLCAggQABgIGA0YHsICCBAAGIAEGKIEwgIFEAAY7wWYAwvxBb5McNti-Qp9ugYECAEYCroGBggCEAEYFJIHBDguMjegB5_DAbIHBDcuMje4B5sdwgcIMC45LjE5LjfIB7MBgAgA&amp;amp;sclient=gws-wiz-serp&amp;amp;mstk=AUtExfBnVjDr3lUHAdq-UFHZ61zvwPkpRb7YBEQx0_HSQ8Y18rgrj6eIQo-Yc-wi66iRtdyn7y_CSBFhH43KDB-LkYSt0sIgAmwL73nu31uHGYRumYTy0ATbDaC1nJlRsHFjkv7OziiuEyqReBu6797VfZboHEjx3OQa6dKbQfhzkRkzsoDZWifD-eJGjMyz7lsbq8Yc4lGiZ_I91Pc2hAquwqot0JlKidYtfkHjZ8Isn3UafA&amp;amp;csui=3" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Abbas Araghchi&lt;/span&gt;&lt;/a&gt; claimed to CBS NEWS that
around 440 kilograms of 60%-enriched uranium is under the rubble, and Iran has
no plans to retrieve the near‑weapons‑grade material. This is the same Araghchi
who, on February 26, claimed that Iran deliberately limits its ballistic
missile range to 2,000 km. However, this claim contradicts reports from March
2026, which suggest Iran demonstrated a 4,000 km range by targeting the British
base on Diego Garcia, bringing European targets like London, Madrid, and Munich
within reach.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;On February 26, the US Intelligence Community assessed that IRI was only
weeks away from enriching enough uranium to produce a low-level nuclear device.
Likewise, Vienna-based International Atomic Energy Agency, as reported by the
Associated Press said, “The significantly increased production and accumulation
of high enriched uranium by Iran, the only non-nuclear weapon State to produce
such nuclear material, is of serious concern” and that “approximately 42
kilograms of 60% enriched uranium is theoretically enough to produce one atomic
bomb, if enriched further to 90%.” One device could be used by IRGC-QF and/or
Hezbollah operators in North America or the Western Hemisphere (See
Situation-Western Hemisphere, Mexico, and Canada Presence).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt;"&gt;Finding that the IRI negotiators, led by
Abbas Araghchi, were not amenable to the USG's demands, the final round of
nuclear negotiations involving &lt;a href="https://www.google.com/search?q=jared+kushner&amp;amp;kgmid=/m/0fv_sp&amp;amp;sa=X&amp;amp;ved=2ahUKEwj0hqfz-buTAxWrBbwBHWbvHooQ3egRegQIAhAC" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Jared Kushner&lt;/span&gt;&lt;/a&gt; and &lt;a href="https://www.google.com/search?q=steve+witkoff&amp;amp;kgmid=/m/0yql36x&amp;amp;sa=X&amp;amp;ved=2ahUKEwj0hqfz-buTAxWrBbwBHWbvHooQ3egRegQIAhAE" target="_blank"&gt;&lt;span style="color: black; text-decoration-line: none;"&gt;Steve Witkoff&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt;"&gt;concluded on February 26, 2026, in Geneva,
where they reportedly described the Iranian proposal presented on the final day
as being "full of holes." Araghchi’s team walked out of the
negotiation table. This validated the old report by Al Jazeera on June 4, 2025,
when Supreme Leader Ayatollah Ali Khamenei firmly stated that Iran will not
abandon its uranium enrichment, rejecting US demands for a complete halt.
Khamenei described calls to stop enrichment as "nonsense" and
asserted it is crucial for Iran's energy independence and technological
progress.&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt;"&gt;Two days after the nuclear negotiation ended, the US Intelligence
Community and Israel's Mossad received information that the senior leadership
of the then Supreme Leader Ayatollah Ali Khamenei would meet in one building in
Tehran at the same time, which led to President Trump approving the launch of
Operation Epic Fury, as both USG and Israel saw the “window of opportunity” in
front of them, which might not happen again.&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Considering the IRGC’s capability to enrich uranium into weapons grade
in weeks, ability to produce ballistic missiles at a range of 2000 kilometers
(now revealed to be 4000 Kilometers), its history of asymmetric warfare with
the United States since 1980s that killed thousands of Americans, its intention
of targeting US national security interests here and abroad with proxies or
otherwise, its pronouncements of killing the American infidels and Death to
America, and the intelligence assessment that IRGC can choke the world economy
via Strait of Hormuz, it is unlikely for Joe Kent to say that Iran does not
pose imminent threat to the United States (or even to the Middle East and the
rest of the world).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;When it comes to nuclear issues and threats, especially from a country
labeled as a State-Sponsored Terrorist Regime, the USG generally considers “all
bets on the table” to mean, in national security terms, that all military
options, peace negotiations, diplomatic proposals, or political risks are under
consideration, or in play. It indicates a situation in which everything is
exposed, and no option is off-limits. This reminded me of my Hostage Rescue
Operations class when a student raised this scenario: A terrorist group has
kidnapped the President of the United States, and if their demands are not met,
they would kill the President and detonate a portable nuclear bomb on the
mainland. What would be the USG’s response? Our CIA instructor replied in one
sentence: Find the portable nuclear bomb at all costs and let the President
die, if he cannot be rescued alive. You got my point. Nuclear threat is a
paramount concern to the US Government. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;The United States is dealing with a regime that has a nihilistic
mindset, akin to a religious terrorist that uses violence to further what they
see as a divinely commanded purpose. The suicidal behaviors of the religious
terrorists deepen the degree of concern about their existence because of their
religious adherence to &lt;i&gt;jihad&lt;/i&gt; (holy war). Their willingness to die for
their cause makes them dangerous, as exemplified by the suicidal operations of
the al-Qaeda members on 9/11.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;If an Islamist regime could kill 35,000 plus of its people in January
2026 for protesting, execute more than 2000 Iranians in 2025 for religious
violations, and send 36,000 schoolchildren to their deaths as
"human-wave" attacks, including clearing minefields, as part of IRGC
tactics during the Iran-Iraq War, would the IRGC-QF hesitate to kill hundreds
of thousands "American infidels" using a nuclear bomb? Or strike the
“Zionist Regime” or hit the blasphemous Madrid, Paris, London? The presence of
hundreds of IRGC-QF operators at the United States' doorsteps should raise a
great alarm for the USG. Remember, it only took 19 al-Qaeda members to bring
the United States to its knees and change the way Americans live their lives
after 9/11. This must never happen again. Ever.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Going back to Joe Kent’s assertion that the Islamic Republic of Iran
posed no imminent threat to the United States, I would say that his assessment
was more of a personal protest than an official pronouncement, as he was
compartmentalized from intelligence briefings weeks leading up to Operation
Epic Fury due to leaking intelligence reports, and that created stigma.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;But, granting that Joe Kent did not know the imminent threat, as he was
the man on the outside looking in, I would present that before 9/11, the US
Intelligence Community had no intelligence about the 19 Saudi Arabian nationals
planning to crash four airplanes into the Twin Towers, the Pentagon building,
and possibly the White House, where the plane landed in Shanksville,
Pennsylvania. No intelligence on hitting the country. Nada.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-size: 11pt;"&gt;What is the chance that some IRGC-QF or Hezbollah sleeper cells (if they are not here in the States already), who are based in Canada or some countries in the Western Hemisphere, stage some attacks much bigger than 9/11? A suitcase bomb in New York? A nuclear radioactive materials in Los Angeles? A truck bomb in Boston?&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;So, on that fateful morning on September 11, the world stood still, and the
Americans said: &lt;b&gt;Never Again&lt;/b&gt;. In terms of national
security matters, it appears the Trump Administration follows the Bush Doctrine, which asserted the
United States’ right to launch preemptive or preventive war to dismantle
terrorist threats abroad before they could reach the US mainland. It
establishes the right of the United States to use military force against
perceived threats before they materialize into real attacks. Take it to them
before they can bring it home. It shifted foreign policy toward unilateral
action and regime change, seeking to destroy threats where they lived, before
the enemies could bring their evil plans to decimate hundreds of thousands of
Americans in the homeland using a nuclear device or otherwise; thus, the
Operation Epic Fury.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;I will end with this quote from Edmund Burke: When good people do nothing, evil and injustice triumph. Inaction allows harmful forces to grow unchecked, and in the case of the Islamic Republic of Iran, its devilish tentacles have spread throughout the world for 47 years, and along with the IRGC-Quds Force and Islamist proxies, they need to be cut off. The global apathy towards the Ayatollah's regime is often considered complicity, enabling evil to thrive and leading to significant negative consequences, thereby proving that the world's neutrality amounts to a form of surrender, but not with the United States of America.&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;Never Again&lt;/span&gt;&lt;/b&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span face="Abadi, sans-serif" style="font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXPNCHSrjI6gHk23F8YMRRiztzC61by7wW_Y40PPrV0EgE552ogF_ubSXi4WVKS_chE8sOjWvzUFhlLJZSrLZjwnxHMdAbfpoytjb10DC8keJFJOo_RkkwMTimw6SN0XWmZZz9DxmxU-qb7n_fm9N6Lqc4TPm2sRWpXKcYebAbSaH4L7-RUCsunJzJykk/s72-w373-h204-c/Operation_Epic_Fury_Press_Briefing_(9573869)%20(1).jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>The Current State of the IRGC and its Capability to Wage War</title><link>http://josilagan.blogspot.com/2026/03/uss-abraham-lincoln-american-aircraft.html</link><pubDate>Mon, 16 Mar 2026 22:04:17 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-5694347973554974017</guid><description>&lt;p style="text-align: center;"&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_fMWkuH7x1nrX0uT38I0SXPP9_gk-ivyW-sR-MvHb40VXad9vkb8OxWOQBWiusT8I0XDG6bE05nmPI9S74XeDlBggoyHKx4kvQw-8PSRZNMjIy9Tfm2Vq5WqnQG7bse-vV4nylJf_EAeIkJY-GUEkCBA90adJ0tvxaAsVgOANykpCR0E88Ck0VbXfPVc/s4035/USS_Abraham_Lincoln_Conducts_Operations_in_Support_of_Operation_Epic_Fury_(9546012).jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="2690" data-original-width="4035" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_fMWkuH7x1nrX0uT38I0SXPP9_gk-ivyW-sR-MvHb40VXad9vkb8OxWOQBWiusT8I0XDG6bE05nmPI9S74XeDlBggoyHKx4kvQw-8PSRZNMjIy9Tfm2Vq5WqnQG7bse-vV4nylJf_EAeIkJY-GUEkCBA90adJ0tvxaAsVgOANykpCR0E88Ck0VbXfPVc/w393-h240/USS_Abraham_Lincoln_Conducts_Operations_in_Support_of_Operation_Epic_Fury_(9546012).jpg" width="393" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: center;"&gt;&lt;span style="text-align: justify;"&gt;USS Abraham Lincoln, American Aircraft Carrier&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: center;"&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Based on news reports and open sources, as of March 16, 2026, the United States' military operations,&amp;nbsp;dubbed Operation Epic Fury, launched against the Islamic Revolutionary Guard Corps (IRGC),&amp;nbsp;have significantly degraded Iranian military capabilities, particularly in the missile, drone, and naval sectors.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Key Damage and Operational Impacts:&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Command and Control: The US military forces have struck the IRGC headquarters, with reports claiming the destruction of Central Command centers and a decapitation strike on leadership, specifically the elimination of Iran's supreme leader, Ayatollah Ali Hosseini Khamenei. Approximately 48 senior Iranian officials (i.e., political, military, and intelligence leaders) were killed in the opening strikes. Also, Israeli Defense Forces (IDF) reports that over 6,000 IRGC members have been killed and roughly 15,000 wounded since the start of Operations Epic Fury and Roaring Lion.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Key IRGC and Military Figures Killed:&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;o General Mohammad Pakpour: Commander of the IRGC Ground Forces.&lt;/li&gt;&lt;li&gt;o General Hossein Salami: Commander-in-Chief of the IRGC.&lt;/li&gt;&lt;li&gt;o Brigadier General Amir Ali Hajizadeh: Chief of the IRGC Aerospace Force.&lt;/li&gt;&lt;li&gt;o Major General Abdolrahim Mousavi: Chief of Staff of the Iranian Armed Forces.&lt;/li&gt;&lt;li&gt;o Brigadier General Aziz Nasirzadeh: Minister of Defense and former Air Force commander.&lt;/li&gt;&lt;li&gt;o Admiral Ali Shamkhani: Former Secretary of the Supreme National Security Council and senior IRGC&amp;nbsp; &amp;nbsp;strategist.&lt;/li&gt;&lt;li&gt;o Major General Mohammad Bagheri: Chief of Staff of the Armed Forces&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Missile and Drone Capability: US Central Command (CENTCOM) and the White House reports state that Iranian ballistic missile capacity has been functionally destroyed, and drone manufacturing facilities have been hit hard.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Missile Launcher Destruction: US and IDF forces focused heavily on transporter-erector- launchers (TELs) as they prepared to launch, reducing Iranian missile salvos by up to 90%. By March 11, roughly 60% or more of Iran’s ballistic missile launcher arsenal was destroyed or rendered inoperable.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Infrastructure Destruction: Over 6,000 targets were hit across 30 provinces, including high-value, hardened underground missile silos and storage tunnels, such as the major site at Khorramabad.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Drone Program Degradation: One-way attack drone capabilities were severely crippled, with official reports showing a 90% reduction in attacks in some assessments and an overall 95% reduction in functionality, partly due to the destruction of hangars and runways at key bases like Konarak.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Naval and Infrastructure Assets: CENTCOM reports that over 100 Iranian vessels have been destroyed by US forces, including strikes on Kharg Island ( where 90% of Iran's oil export comes), which have destroyed Iranian naval mine storage facilities, missile storage bunkers, and 11 ships at the port.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Noted IRGC Naval Ships Destroyed: IRIS Shahid Bagheri (Drone Carrier), IRIS Makran (Forward Base Ship), Soleimani-class Warships, IRIS Dena (Frigate), and vessels from the Jamaran, Sahand, Sabalan, Bayandor, and Alvand classes have been confirmed as struck or destroyed.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;The IRGC's Naval Headquarters: Several urban command structures have been dismantled. Extensive damage has been reported at key naval installations, including Bandar Abbas and Konarak, where satellite imagery shows destroyed buildings and sunken vessels after the US air strikes. At least 26 minelaying vessels have been destroyed (16 near the Strait of Hormuz and 10 at port), significantly weakening Iran's ability to blockade the waterway.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;•&lt;span style="white-space: pre;"&gt;	&lt;/span&gt;Infrastructure Damage: Joint US-Israeli air strikes have caused substantial damage to Iranian military sites, with some reports from the Iranian Red Crescent claiming damage to tens of thousands of residential and commercial buildings.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;The Operation Epic Fury has targeted over 3,000 locations to disable Iran’s nuclear program, ballistic missile arsenal, and naval power.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Key Data on Air Operations (As of March 16, 2026):&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Total Targets Struck: More than 6,000 targets identified by the Pentagon.&lt;/li&gt;&lt;li&gt;Initial Wave: On February 28, nearly 900 strikes were launched within 12 hours.&lt;/li&gt;&lt;li&gt;Duration: The campaign is in its 17th day of sustained air attacks. Assets: Operations involve 125+ aircraft, including 52+ refueling tankers, stealth fighters, and bombers.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;The campaign has focused on degrading Iran's air defenses, command and control sites, missile production facilities, and naval vessels.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Nuclear Sites Damage&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Natanz: The Natanz nuclear production facility sustained severe damage, with satellite imagery showing the destruction of above-ground facilities, including the Pilot Fuel Enrichment Plant.&lt;/li&gt;&lt;li&gt;Fordow: The Fordow fuel enrichment plant was rendered inoperable following targeted strikes on June 21, 2025, with further damage reported during the 2026 Epic Fury campaign.&lt;/li&gt;&lt;li&gt;Isfahan &amp;amp; Research Sites: The Isfahan metallurgy facility suffered major damage, and additional strikes have targeted the Parchin explosive research facility and the Atomic Energy Agency headquarters in Tehran.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Given the magnitude of destruction against the Iranian political and military leaderships, as well as the suppression of the IRGC's capability to defend and launch a counter-offensive against the US and Israeli forces, would the war last for another two weeks or would the current Ayatollah (if he is still alive) agree to sit at the table and cede to the United States' demand to stop Iran's nuclear and ballistic missile program?&amp;nbsp;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;br /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_fMWkuH7x1nrX0uT38I0SXPP9_gk-ivyW-sR-MvHb40VXad9vkb8OxWOQBWiusT8I0XDG6bE05nmPI9S74XeDlBggoyHKx4kvQw-8PSRZNMjIy9Tfm2Vq5WqnQG7bse-vV4nylJf_EAeIkJY-GUEkCBA90adJ0tvxaAsVgOANykpCR0E88Ck0VbXfPVc/s72-w393-h240-c/USS_Abraham_Lincoln_Conducts_Operations_in_Support_of_Operation_Epic_Fury_(9546012).jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>President Xi Jinping and The Generals of the Red Table</title><link>http://josilagan.blogspot.com/2026/01/president-xi-jinping-and-generals-of.html</link><pubDate>Thu, 29 Jan 2026 13:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-3807918618333653168</guid><description>&lt;p&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEjKSB9_cqs9yLcSgzzQT2DRiHOWVp5VoVwKkJd8I9tcwMiCCbzg70wLAn6z3ApmWHMGBLbJ5sfsugwH-1j_3VJwjfBJrkY1UtQ1gkl87zSbYdeWaGs9bAZZcZe8RWHgB6Xs7w2vhaoUceKqktf636iW5yZAlZr_CvYyu8Yr81jCDyt1iyMdGakNjZBEN3o" style="margin-left: 1em; margin-right: 1em; text-align: center;"&gt;&lt;img alt="" data-original-height="575" data-original-width="1024" height="180" src="https://blogger.googleusercontent.com/img/a/AVvXsEjKSB9_cqs9yLcSgzzQT2DRiHOWVp5VoVwKkJd8I9tcwMiCCbzg70wLAn6z3ApmWHMGBLbJ5sfsugwH-1j_3VJwjfBJrkY1UtQ1gkl87zSbYdeWaGs9bAZZcZe8RWHgB6Xs7w2vhaoUceKqktf636iW5yZAlZr_CvYyu8Yr81jCDyt1iyMdGakNjZBEN3o" width="320" /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div style="text-align: center;"&gt;General Zhang Youxia. Photo courtesy of BBC.&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; text-align: justify;"&gt;So, what’s going on in
China, where unprecedented purging has happened this month of January?&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;A military purge due to a
failed coup, a senior party leader's purge due to questionable loyalty to &lt;b&gt;Xi
Jinping&lt;/b&gt;, or a CMC purge due to global humiliation brought by substandard
Chinese armaments? Or all of the above? Is corruption the CCP/PLA’s generic
excuse to incarcerate or terminate generals who have fallen from &lt;b&gt;Xi Jinping’s&lt;/b&gt;
grace? &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;According to open
sources, roughly&amp;nbsp;93% of generals&amp;nbsp;who were active at the beginning of
2025 have since been relieved from their command posts or are no longer in
public view, leading to the assumption that they are either incarcerated or
executed. But no credible evidence to support these reports, though.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Recent news states that
General &lt;b&gt;Zhang Youxia&lt;/b&gt;, a close ally of Xi Jinping and top-ranking vice
chairman of the Central Military Commission (CMC), was placed under arrest for
"grave violations of discipline" in January 2026. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Reports also indicate
that 29 of 44 senior military officers appointed to the Central Committee in
2022 went missing--suggesting a significant, widespread roundup of ranking
party members and signaling a massive purge within the PLA.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;A similar investigation was
launched against General &lt;b&gt;Liu Zhenli&lt;/b&gt;, the chief of staff of the
commission's Joint Staff Department. While this constitutes a major purge aimed
at ensuring loyalty to &lt;b&gt;Xi Jinping&lt;/b&gt;, there is no credible, publicly
available information confirming the arrest of about 3,000 soldiers and their
families who are loyal to General &lt;b&gt;Zhang Youxia&lt;/b&gt;. Have they launched a coup
d’état but failed?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;The investigation into General
&lt;b&gt;Zhang Youxia,&lt;/b&gt; a member of the 24-person Politburo, indicates an escalation
of President &lt;b&gt;Xi Jinping's&lt;/b&gt; efforts to consolidate power over the armed
forces.&amp;nbsp;Clearly, there is a rupture in the Party structure, and &lt;b&gt;Xi Jinping
is focused on removing&lt;/b&gt; disloyal generals, even if it means promoting
inexperienced officers to higher positions. A loyal and less corrupt leadership,
but with questionable military capabilities? How would that stand on &lt;b&gt;Xi
Jinping’s&lt;/b&gt; planned Taiwan invasion in 2027?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;President &lt;b&gt;Xi Jinping’s&lt;/b&gt;
extensive purging of senior PLA generals, including top rocket force commanders
and his former top ally, General &lt;/span&gt;&lt;a href="https://www.washingtonpost.com/national-security/2026/01/25/china-military-purge-zhang-youxia-xi/" target="_blank"&gt;&lt;b&gt;&lt;span style="color: black; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%; text-decoration-line: none;"&gt;Zhang Youxia&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt;, &lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;drastically undermines the PLA's operational readiness
in the near term. By decimating the high command and leaving key Central
Military Commission positions vacant, these actions create a fragmented command
structure, &amp;nbsp;likely making the invasion of
Taiwan riskier or less likely in 2027, the year set by Xi Jinping.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style="margin-top: 0in;" type="disc"&gt;
 &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Central Military Commission Gutted:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;As
     of January 2026, nearly the entire uniformed leadership of the CMC has
     been purged. Of the six uniformed commanders appointed to the body in
     2022, five have been formally removed. Following the January 2026
     investigations into&amp;nbsp;General Zhang Youxia and&amp;nbsp;General Liu Zhenli,
     CMC is now reduced to two members: Xi Jinping and the anti-corruption
     watchdog, General&lt;b&gt; Zhang Shengmin.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Recent Wave (2023–2026):&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;Over&amp;nbsp;50
     high-ranking military and defense officials&amp;nbsp;have been purged since an
     intensified campaign began in 2023.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;October 2025 Mass Expulsion:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;In
     one of the largest single crackdowns in decades, the Communist Party
     expelled&amp;nbsp;&lt;b&gt;nine top generals&lt;/b&gt;&amp;nbsp;on graft charges in October
     2025. These included, among others:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;ul style="margin-top: 0in;" type="circle"&gt;
  &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Gen. He Weidong:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;CMC
      Vice-Chairman and Politburo member.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Adm. Miao Hua:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;Director
      of the CMC’s Political Work Department.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Adm. Wang Houbin:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;Commander
      of the Rocket Force.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Defense Ministers:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;Two
     former defense ministers,&amp;nbsp;&lt;b&gt;Li Shangfu&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;b&gt;Wei
     Fenghe&lt;/b&gt;, were purged and expelled from the Party in 2024 for
     corruption.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Rocket Force Target:&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;The
     purge heavily targeted the&amp;nbsp;&lt;b&gt;Rocket Force&lt;/b&gt;, which oversees
     China's nuclear and conventional missiles, with at least six generals from
     this branch removed by late 2025.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;The United States&amp;nbsp;had
the largest defense budget in the world in 2025, with projected spending of
$997 billion, while China ranked second at $314 billion. &amp;nbsp;China is focused on modernization, and its
budget is primarily allocated to developing and acquiring advanced military
hardware, including stealth fighters, drones, and ballistic missiles. With this
large amount of money reaching the hands of vulnerable generals, the abuse of
public office for personal gain likely affected China’s defense manufacturing
industry, leading state-owned and state-controlled corporations to produce
defective and substandard military hardware and armaments. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;Significant evidence
indicates that systemic corruption within the Chinese People's Liberation Army
has led to the manufacturing of substandard armaments and defective equipment.
Corruption, particularly within the elite Rocket Force, led to incidents such
as missiles filled with water rather than fuel, silos with malfunctioning
doors, and even some exported defense products that malfunctioned severely
during the war. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11pt; line-height: 115%;"&gt;For example, the JF-17
Thunder Fighter, CH-4 Unmanned Aerial Vehicles, F-7 Aircraft, F-22P Frigates, C-705
Missiles, FM90(N) Missile System, and VT-4 Main Battle Tank have experienced significant malfunctions, technical
failures, and poor performance in both training exercises and in real-time
conflicts. During the Operation Midnight Hammer, Iran’s Chinese-made radars &lt;/span&gt;&lt;a href="https://www.google.com/search?q=YLC-8B&amp;amp;newwindow=1&amp;amp;rlz=1C1SQJL_enUS787US787&amp;amp;sca_esv=dfd8ad97cdb7fcc2&amp;amp;sxsrf=ANbL-n6FPwe489nMBU6v9445Lmpl2QUwjA%3A1769572118481&amp;amp;ei=Fod5abmOHdXWptQPgdP2wQU&amp;amp;ved=2ahUKEwjLh6m2rK2SAxWkwvACHc-TI48QgK4QegQIAxAC&amp;amp;uact=5&amp;amp;oq=what+type+of+chinese-made+radar+and+air+defense+system+did+Iran+have+on+Operation+Midnight+Hammer&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiYXdoYXQgdHlwZSBvZiBjaGluZXNlLW1hZGUgcmFkYXIgYW5kIGFpciBkZWZlbnNlIHN5c3RlbSBkaWQgSXJhbiBoYXZlIG9uIE9wZXJhdGlvbiBNaWRuaWdodCBIYW1tZXJIkqAFUPoGWKKdBXADeAGQAQCYAdIBoAHBSqoBBjAuNjYuMbgBA8gBAPgBAZgCIKACpyPCAgoQABiwAxjWBBhHwgIIEAAYCBgNGB7CAgsQABiABBiGAxiKBcICBRAAGO8FwgIIEAAYgAQYogTCAgoQIRigARjDBBgKwgIEECEYCsICCBAhGKABGMMEwgIFECEYoAHCAgUQIRirApgDAIgGAZAGCJIHBDMuMjmgB8K9AbIHBDAuMjm4B5ojwgcGMC4yNy41yAdIgAgA&amp;amp;sclient=gws-wiz-serp"&gt;&lt;span style="color: black; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%; text-decoration-line: none;"&gt;YLC-8B&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.google.com/search?q=JY-27A&amp;amp;newwindow=1&amp;amp;rlz=1C1SQJL_enUS787US787&amp;amp;sca_esv=dfd8ad97cdb7fcc2&amp;amp;sxsrf=ANbL-n6FPwe489nMBU6v9445Lmpl2QUwjA%3A1769572118481&amp;amp;ei=Fod5abmOHdXWptQPgdP2wQU&amp;amp;ved=2ahUKEwjLh6m2rK2SAxWkwvACHc-TI48QgK4QegQIAxAD&amp;amp;uact=5&amp;amp;oq=what+type+of+chinese-made+radar+and+air+defense+system+did+Iran+have+on+Operation+Midnight+Hammer&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiYXdoYXQgdHlwZSBvZiBjaGluZXNlLW1hZGUgcmFkYXIgYW5kIGFpciBkZWZlbnNlIHN5c3RlbSBkaWQgSXJhbiBoYXZlIG9uIE9wZXJhdGlvbiBNaWRuaWdodCBIYW1tZXJIkqAFUPoGWKKdBXADeAGQAQCYAdIBoAHBSqoBBjAuNjYuMbgBA8gBAPgBAZgCIKACpyPCAgoQABiwAxjWBBhHwgIIEAAYCBgNGB7CAgsQABiABBiGAxiKBcICBRAAGO8FwgIIEAAYgAQYogTCAgoQIRigARjDBBgKwgIEECEYCsICCBAhGKABGMMEwgIFECEYoAHCAgUQIRirApgDAIgGAZAGCJIHBDMuMjmgB8K9AbIHBDAuMjm4B5ojwgcGMC4yNy41yAdIgAgA&amp;amp;sclient=gws-wiz-serp"&gt;&lt;span style="color: black; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%; text-decoration-line: none;"&gt;JY-27A&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt; and HQ-9B Surface-to-Air Missile (SAM) have
failed to engage the planes from the US Air Force, leaving the three Iranian
nuclear sites defenseless to the Americans’ &lt;/span&gt;&lt;a href="https://www.google.com/search?q=GBU-57+Massive+Ordnance+Penetrators&amp;amp;newwindow=1&amp;amp;rlz=1C1SQJL_enUS787US787&amp;amp;sca_esv=dfd8ad97cdb7fcc2&amp;amp;sxsrf=ANbL-n5Wk_srTqu_sNqBCeHKDiPHFNeCiA%3A1769572810354&amp;amp;ei=yol5ab2iFeimptQPg-PZiQI&amp;amp;ved=2ahUKEwj40Oq_ra2SAxW7lokEHa9IEzwQgK4QegQIARAB&amp;amp;uact=5&amp;amp;oq=what+type+of+bombs+hit+the+iranian+nuclear+sites&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiMHdoYXQgdHlwZSBvZiBib21icyBoaXQgdGhlIGlyYW5pYW4gbnVjbGVhciBzaXRlczIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRirAkjIlQFQvwhYupMBcAJ4AZABAJgBiAKgAdU4qgEGMC40Ny4yuAEDyAEA-AEBmAIroAKAMKgCCsICFxAAGIAEGJECGLQCGOcGGIoFGOoC2AEBwgIQEAAYAxi0AhjqAhiPAdgBAcICEBAAGIAEGLEDGEMYgwEYigXCAgoQABiABBhDGIoFwgIOEC4YgAQYsQMY0QMYxwHCAgsQLhiABBixAxiDAcICDRAAGIAEGLEDGEMYigXCAhEQLhiABBixAxjRAxiDARjHAcICDhAAGIAEGLEDGIMBGIoFwgIIEAAYgAQYsQPCAgsQABiABBiRAhiKBcICBRAAGIAEwgILEAAYgAQYsQMYigXCAgYQABgWGB7CAgsQABiABBiGAxiKBcICBRAAGO8FwgIIEAAYogQYiQXCAggQABiABBiiBMICBRAhGJ8FmAMK8QWclqYhRjxCzLoGBAgBGAeSBwYyLjQwLjGgB9eoArIHBjAuNDAuMbgH8C_CBwkwLjEyLjMwLjHIB5MBgAgA&amp;amp;sclient=gws-wiz-serp"&gt;&lt;span style="color: black; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%; text-decoration-line: none;"&gt;GBU-57
Massive Ordnance Penetrators&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt;. &amp;nbsp;And just recently, the Chinese-made
radar systems JY-27A, JY-1/JYL-1, and Type 305A/H-200, as well as the anti-air
missile FK-3, have failed to detect the US military forces penetrating
Venezuela in the dead of the night, which led to the capture of Nicolas Maduro
under the Operation Absolute Resolve.&lt;b&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt;Xi Jinping&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; line-height: 115%;"&gt;, as
paranoid and proud as he is, will not allow himself to lose face on the global
stage, and that is what happened after&lt;b&gt; &lt;/b&gt;Operation Midnight Hammer and
Operation Absolute Resolve. In Chinese culture, "Losing face" (&lt;i&gt;diū
liǎn&lt;/i&gt;) refers to&amp;nbsp;a severe loss of reputation, honor, and social
standing caused by public embarrassment. Thus, Xi Jinping directed his anger at
his senior leaders in the Central Military Commission, and the purging began, as
I think it did.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/a/AVvXsEjKSB9_cqs9yLcSgzzQT2DRiHOWVp5VoVwKkJd8I9tcwMiCCbzg70wLAn6z3ApmWHMGBLbJ5sfsugwH-1j_3VJwjfBJrkY1UtQ1gkl87zSbYdeWaGs9bAZZcZe8RWHgB6Xs7w2vhaoUceKqktf636iW5yZAlZr_CvYyu8Yr81jCDyt1iyMdGakNjZBEN3o=s72-c" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Is NATO Still Relevant With The United States? </title><link>http://josilagan.blogspot.com/2026/01/is-nato-still-relevant-with-united.html</link><pubDate>Mon, 19 Jan 2026 00:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-321570674782264665</guid><description>&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEidausWmnk9SwF_Jsmi4ISLTooh9POUdTxk5g1__01BIc0E9SM069MNdEwO9gxBwINJ1jC22N3z8odL2B42O6KDJr780kh06_p-RfyYVOx-MlGJ9mTmKa8uzDzwJPWhdgUL6cQ1u3TFdhtMP8LSSy1nCtPrTIETxmLmoeMmgGCwYBnNVRBjDOCPR7J04MY" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="" data-original-height="1016" data-original-width="1280" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEidausWmnk9SwF_Jsmi4ISLTooh9POUdTxk5g1__01BIc0E9SM069MNdEwO9gxBwINJ1jC22N3z8odL2B42O6KDJr780kh06_p-RfyYVOx-MlGJ9mTmKa8uzDzwJPWhdgUL6cQ1u3TFdhtMP8LSSy1nCtPrTIETxmLmoeMmgGCwYBnNVRBjDOCPR7J04MY" width="302" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;European Union Members&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;(Source:&amp;nbsp;By SiBr4 -&amp;nbsp; https://commons.wikimedia.org/w/index.php?curid=30352945)&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;The North Atlantic Treaty Organization (NATO) was
created in 1949 primarily to counter and curtail the foreseeable expansion and
influence of the USSR (and then the Warsaw Pact Countries) in Europe after
World War II. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;The demise of the Union of Soviet Socialist Republics (USSR) in 1989 and the breakup of the Warsaw
Pact countries, considered as the “A” list nations in terms of threats to the US
national security interests, has caused the United States’ foreign policy on defense
to pivot slowly and strategically to&amp;nbsp;the Asia-Pacific and the Middle East, and with the current administration looking closely at China, North Korea, and Iran while still maintaining its radar
on the USSR, now simply called as Russia. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;&lt;span style="mso-spacerun: yes;"&gt;&lt;span style="text-align: left;"&gt;As the saying goes in geopolitics, there are no
permanent friends but only permanent interests. So, after the USSR’s
disintegration, three former Soviet Republics, i.e., Estonia, Latvia, and
Lithuania, 11 Warsaw Pact Countries, i.e.,&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.google.com/search?q=Czech+Republic&amp;amp;newwindow=1&amp;amp;sca_esv=c03ec876592c9bde&amp;amp;ei=-qRtaeysN7z-ptQP48Pa0Q4&amp;amp;oq=how+many+countries+under+USSR+are+now+part+of+NATO&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiMmhvdyBtYW55IGNvdW50cmllcyB1bmRlciBVU1NSIGFyZSBub3cgcGFydCBvZiBOQVRPKgIIADIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRirAkiN0gFQ-g9Yqq0BcAd4AZABAJgBhgKgAe5BqgEGMC40Ni45uAEByAEA-AEBmAI-oAKJRagCCsICFxAAGIAEGIoFGJECGOcGGOoCGLQC2AEBwgIXEC4YgAQYigUYkQIY5wYY6gIYtALYAQHCAhAQLhgDGI8BGOoCGLQC2AEBwgIQEAAYAxiPARjqAhi0AtgBAcICCxAAGIAEGIoFGJECwgIOEC4YgAQYsQMYxwEY0QPCAg4QLhiABBiKBRixAxiDAcICCxAuGIAEGLEDGIMBwgILEAAYgAQYsQMYgwHCAgoQABiABBiKBRhDwgINEC4YgAQYxwEY0QMYCsICCBAAGIAEGLEDwgIOEC4YxwEYsQMY0QMYgATCAgcQABiABBgKwgIREC4YgAQYsQMYgwEYxwEYrwHCAhwQLhiABBjHARjRAxgKGJcFGNwEGN4EGOAE2AECwgISEC4YgAQYChgLGLEDGMcBGNEDwgIFEAAYgATCAgwQABiABBgKGAsYsQPCAgwQLhiABBgKGAsYsQPCAgcQLhiABBgKwgIhEC4YgAQYChgLGLEDGMcBGNEDGJcFGNwEGN4EGOAE2AECwgINEAAYgAQYigUYQxixA8ICDhAAGIAEGIoFGJECGLEDwgIJEAAYgAQYChgLwgIGEAAYFhgewgILEAAYgAQYigUYhgPCAggQABiABBiiBMICBRAAGO8FmAMK8QUAMCo0s6sxpboGBAgBGAe6BgYIAhABGBSSBwc3LjQ0LjExoAeK7wKyBwcwLjQ0LjExuAfYRMIHCjEuMTkuMjguMTTIB7YCgAgB&amp;amp;sclient=gws-wiz-serp&amp;amp;ved=2ahUKEwj04qas1ZaSAxW9g4kEHYxiNQgQgK4QegQIBRAB" style="text-align: left;"&gt;&lt;span color="windowtext" style="text-decoration-line: none;"&gt;Czech
Republic&lt;/span&gt;&lt;/a&gt;&lt;span style="text-align: left;"&gt;,&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.google.com/search?q=Hungary&amp;amp;newwindow=1&amp;amp;sca_esv=c03ec876592c9bde&amp;amp;ei=-qRtaeysN7z-ptQP48Pa0Q4&amp;amp;oq=how+many+countries+under+USSR+are+now+part+of+NATO&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiMmhvdyBtYW55IGNvdW50cmllcyB1bmRlciBVU1NSIGFyZSBub3cgcGFydCBvZiBOQVRPKgIIADIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRirAkiN0gFQ-g9Yqq0BcAd4AZABAJgBhgKgAe5BqgEGMC40Ni45uAEByAEA-AEBmAI-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&amp;amp;sclient=gws-wiz-serp&amp;amp;ved=2ahUKEwj04qas1ZaSAxW9g4kEHYxiNQgQgK4QegQIBRAC" style="text-align: left;"&gt;&lt;span color="windowtext" style="text-decoration-line: none;"&gt;Hungary&lt;/span&gt;&lt;/a&gt;&lt;span style="text-align: left;"&gt;,&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.google.com/search?q=Poland&amp;amp;newwindow=1&amp;amp;sca_esv=c03ec876592c9bde&amp;amp;ei=-qRtaeysN7z-ptQP48Pa0Q4&amp;amp;oq=how+many+countries+under+USSR+are+now+part+of+NATO&amp;amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiMmhvdyBtYW55IGNvdW50cmllcyB1bmRlciBVU1NSIGFyZSBub3cgcGFydCBvZiBOQVRPKgIIADIFECEYoAEyBRAhGKABMgUQIRigATIFECEYoAEyBRAhGKABMgUQIRirAkiN0gFQ-g9Yqq0BcAd4AZABAJgBhgKgAe5BqgEGMC40Ni45uAEByAEA-AEBmAI-oAKJRagCCsICFxAAGIAEGIoFGJECGOcGGOoCGLQC2AEBwgIXEC4YgAQYigUYkQIY5wYY6gIYtALYAQHCAhAQLhgDGI8BGOoCGLQC2AEBwgIQEAAYAxiPARjqAhi0AtgBAcICCxAAGIAEGIoFGJECwgIOEC4YgAQYsQMYxwEY0QPCAg4QLhiABBiKBRixAxiDAcICCxAuGIAEGLEDGIMBwgILEAAYgAQYsQMYgwHCAgoQABiABBiKBRhDwgINEC4YgAQYxwEY0QMYCsICCBAAGIAEGLEDwgIOEC4YxwEYsQMY0QMYgATCAgcQABiABBgKwgIREC4YgAQYsQMYgwEYxwEYrwHCAhwQLhiABBjHARjRAxgKGJcFGNwEGN4EGOAE2AECwgISEC4YgAQYChgLGLEDGMcBGNEDwgIFEAAYgATCAgwQABiABBgKGAsYsQPCAgwQLhiABBgKGAsYsQPCAgcQLhiABBgKwgIhEC4YgAQYChgLGLEDGMcBGNEDGJcFGNwEGN4EGOAE2AECwgINEAAYgAQYigUYQxixA8ICDhAAGIAEGIoFGJECGLEDwgIJEAAYgAQYChgLwgIGEAAYFhgewgILEAAYgAQYigUYhgPCAggQABiABBiiBMICBRAAGO8FmAMK8QUAMCo0s6sxpboGBAgBGAe6BgYIAhABGBSSBwc3LjQ0LjExoAeK7wKyBwcwLjQ0LjExuAfYRMIHCjEuMTkuMjguMTTIB7YCgAgB&amp;amp;sclient=gws-wiz-serp&amp;amp;ved=2ahUKEwj04qas1ZaSAxW9g4kEHYxiNQgQgK4QegQIBRAD" style="text-align: left;"&gt;&lt;span color="windowtext" style="text-decoration-line: none;"&gt;Poland&lt;/span&gt;&lt;/a&gt;&lt;span style="text-align: left;"&gt;,
Bulgaria, Romania, Slovakia, Slovenia, Albania, Croatia, Montenegro, and North
Macedonia, as well as Finland (a former Soviet territory), Sweden (historically
neutral), and Germany have changed their allegiances as Soviet satellite countries and became part of NATO.&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;The political and military realignment of the
former Soviet satellite countries into the Western coalition is akin to a tectonic shift, transforming communist/socialist states into democratic nations and thereby lessening the
threat posed by Russia to the United States.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;Again, there are no permanent friends but only permanent
interests. The United States fought against the Italian, German, and Japanese
forces in World War II. Now these three countries are trading partners and
military allies of the Americans. Russians who fought alongside the Americans
in World War II to defeat the German forces became the United States’ archenemy.
Still, its political clout and military capabilities (except for the nuclear
warheads) around the world have diminished. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;According to open sources, over the past 75 years,
since NATO's creation, the United States has contributed an estimated $21.9 trillion
to the alliance’s defense budget, significantly more than the 32 members. An
estimated $36 billion was spent on direct protection of Europe, including troop
presence and infrastructure, in 2018. What about the aid to Ukraine? As of
2025, the US government had appropriated approximately $187 billion to Ukraine
to fund its fight against Russia, thereby lessening the logistical burden on the European Union members and NATO forces. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;Right after World War II, the United States, through
the Marshall Plan or the European Recovery Program, started an initiative to
help 16 European countries get back on their feet and provided around $13.3
billion (&amp;nbsp;(equivalent to over $130 billion today) to “rebuild economies,
prevent communist takeovers, and create strong markets for U.S. goods, offering
funds for food, fuel, machinery, and technical assistance.” The Marshall Plan was
a total success, given how Europe has become an economic powerhouse today. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;The United States has done so much for the European
Union and NATO, and with the deafening calls from the Europeans for the American
Forces to leave their continent because of the Greenland issue, the Trump Administration
must take the ingrates and anti-American peoples’ proposition seriously and let
them protect their continent this time against Russia, China, Iran, and North
Korea. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia; line-height: 115%;"&gt;While the United States is funding trillions of
dollars on the defense and security of Europe, it’s allowing the European Union members to concentrate and allocate their spending in building powerhouse
economies like those in France, Germany, and the United Kingdom. The parasitism
relationship between the United States and the European Union must stop. The
Europeans can now handle the Russians in Ukraine without the United States'
military aid and protection. Can they do it, really? &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;&lt;span style="line-height: 115%;"&gt;For the last time, there are no permanent friends but
only permanent interests. Now, the Europeans consider the Americans as their
enemies, while the United States’ national security interests have now shifted to the Western Hemisphere,&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;the&amp;nbsp;&lt;/span&gt;&lt;span&gt;Middle East, &lt;/span&gt;&lt;span&gt;and the Asia-Pacific Region. The primary threat is no longer Russia but China. American allies such
as Taiwan, South Korea, Japan, Australia, and the Philippines welcome the
presence of US military forces in the region, forming alliances similar to NATO. There is no better time to move
the US troops and military infrastructures from Europe to the Middle East, Asia,
Latin America, and, of course, Greenland. &lt;/span&gt;&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="mso-spacerun: yes;"&gt;&lt;span style="background-color: white; color: #0f1419; font-family: georgia; text-align: start; white-space-collapse: preserve;"&gt;By the way, Europeans are saying that there were about 1000 soldiers from the European Union who died in the United States' GWOT in Iraq and Afghanistan, so the Trump Administration must shut up and give up its interest in Greenland. Let me say this, though: around 250,000 American soldiers died in the European theater during World War II, trying to protect and liberate the continent from the war machines of Adolf Hitler and Benito Mussolini.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/a/AVvXsEidausWmnk9SwF_Jsmi4ISLTooh9POUdTxk5g1__01BIc0E9SM069MNdEwO9gxBwINJ1jC22N3z8odL2B42O6KDJr780kh06_p-RfyYVOx-MlGJ9mTmKa8uzDzwJPWhdgUL6cQ1u3TFdhtMP8LSSy1nCtPrTIETxmLmoeMmgGCwYBnNVRBjDOCPR7J04MY=s72-c" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Yes, You Can Be A Published Author, Too! </title><link>http://josilagan.blogspot.com/2025/12/yes-you-can-be-published-author-too.html</link><pubDate>Mon, 29 Dec 2025 14:40:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-8106873591705310836</guid><description>&lt;p style="text-align: justify;"&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjukXTB0Cv0YGGtYK4p-L1nDMCY9ma8W601uc3ZYTzZ4Kq0XHHBaNSOXol-ePkAPKCLgpX4eVi5Bs7qPVzndciq_Irb5FRsonj7FsXtSTZc7zUHzddphkFG8OAv8Ri_NYCdfe3j5ANa1MjEMkfc-wz8ZIc0t5iY7fB1zZlyrwjxO1QbN0MIXw52anNfngY/s1344/PGS%20Books%20in%20Library%20-%20Marketing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1344" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjukXTB0Cv0YGGtYK4p-L1nDMCY9ma8W601uc3ZYTzZ4Kq0XHHBaNSOXol-ePkAPKCLgpX4eVi5Bs7qPVzndciq_Irb5FRsonj7FsXtSTZc7zUHzddphkFG8OAv8Ri_NYCdfe3j5ANa1MjEMkfc-wz8ZIc0t5iY7fB1zZlyrwjxO1QbN0MIXw52anNfngY/w449-h266/PGS%20Books%20in%20Library%20-%20Marketing.png" width="449" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;&lt;p style="text-align: center;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;(&lt;/span&gt;The spy novel Project GrandSlam &amp;amp; The Zhongguo Orchestra is rated Five-Star by the Readers’ Favorite.)&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: left;"&gt;So, do you
want to write a book? A&lt;/span&gt;&lt;span style="text-align: left;"&gt;&amp;nbsp;full-length novel? I’m telling you it’s not an easy goal. But if you have discipline
and perseverance, yes, you can be a published author, too.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Okay, let me tell you this to motivate you. It took me
15 years to finish my novel, &lt;i&gt;Project GrandSlam &amp;amp; The Zhongguo Orchestra&lt;/i&gt;—ten
years of daydreaming and five years of actual writing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Yes, those
ten lost years didn’t amount to anything except that they filled my dream
basket with buts and ifs.&amp;nbsp; Doubts were my
unwelcome visitors and later became my unwanted companions.&amp;nbsp; In those fledgling years, my enthusiasm for
writing waned, and at times, a week passed by without even a single page to
credit.&amp;nbsp; Unbelief led to procrastination.&amp;nbsp; I almost gave up on writing and thought of
letting &lt;i&gt;Project GrandSlam &amp;amp; The Zhongguo Orchestra&lt;/i&gt; die a natural
death.&amp;nbsp; I prepared for its wake and was
ready to mourn its passing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;You see,
unlike other writers who pride themselves on a BA in English or an MFA in
Creative Writing, I admit I have neither one of those coveted degrees.&amp;nbsp; Nevertheless, the dearth of writing skills
didn’t discourage me from moving on; on the contrary, it bolstered me even more
to work harder. Who Dares Wins, just like what the SAS motto says.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;To hone my
writing skills, I became a self-educated writer.&amp;nbsp; I read some "How to Write" articles
online and borrowed reference materials from the library.&amp;nbsp; I also bought books on creative writing and
slowly built myself a mini library.&amp;nbsp; I
went further and subscribed to magazines like Writer’s Digest and Poets &amp;amp;
Writers.&amp;nbsp; A writer must be a reader
first!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Some of
the books I read were &lt;i&gt;How to Write a Thriller, Grammatically Correct, 38 Most
Common Fiction Writing Mistakes, Rewrite Right, St. Martin's Guide to Writing,
Writer to Writer, Self-Editing for Fiction Writers, Plot &amp;amp; Structure,&lt;/i&gt; and
other self-help books.&amp;nbsp; I also read the works
of some great novelists, such as Sir Arthur Conan Doyle, Frederick Forsyth,
Robert Ludlum, and Ken Follett.&amp;nbsp; Tom
Clancy showed up later in my writing life.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;If you
want to improve your writing skills, you must study the great works of those master
storytellers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;My
manuscript didn't come out easily.&amp;nbsp; I
juggled everything in life – family, full-time job, and church activities.
Writing always showed up at the bottom of my schedule.&amp;nbsp; Especially during the times my son had out-of-state soccer tournaments!&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;I got my solitude only when everyone at home (or at the hotel) was asleep.&amp;nbsp; My creative juices usually
flowed from ten at night to one in the morning.&amp;nbsp;
So, imagine it was hard for me to go to my real job the following
morning, half-dead like a zombie.&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;The last two years of writing &lt;i&gt;Project GrandSlam &amp;amp; The Zhongguo Orchestra&lt;/i&gt; were a grueling experience for me.&amp;nbsp; I felt like I’d
sailed into the unknown depths of literary seas, fishing for elusive words that
often escaped my convoluted mind.&amp;nbsp; It was
an arduous struggle from the start, and more than anything else, the process
tested my patience and sanity. Really.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;My
indomitable will compelled me to endure those difficult years.&amp;nbsp; And during these times, a small voice, which could
have been from an angel, cajoled me relentlessly, saying, "You have a good
story to share with the world, so don't give up." Well, that was my daughter.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;So, I
pressed on, and I worked harder than ever before. My creative thoughts flowed naturally
this time.&amp;nbsp; I saw how my story
metamorphosed from a lethargic draft to a promising manuscript.&amp;nbsp; Afterwards, I started forming Beta
Readers—friends who’d provided critiques of my manuscript without getting any compensation. Bless their souls. The last year was nerve-racking for me, given
all the writing and rewriting and editing, and everything that came in between
that cycle.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Finally, my
novel &lt;i&gt;Project GrandSlam &amp;amp; The Zhongguo Orchestra&lt;/i&gt; came out, but not without
experiencing the blood, sweat, and tears of writing.&amp;nbsp; Oh, the joy and pain of writing!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;You see,
some writers have natural flair, and their literary wells overflow with an
abundance of words.&amp;nbsp; Those skilled ones
could produce a novel in three months or even in one month! You heard about
NaNoWriMo?&amp;nbsp; I really envy those gifted
writers.&amp;nbsp; Me? I’m just an&amp;nbsp;ordinary guy
with two simple writing traits:&amp;nbsp;
discipline and perseverance – two enviable qualities that helped me
complete my spy novel, and two non-fiction books titled &lt;i&gt;Creating the Department
of Homeland Security: A Public Policy Process&lt;/i&gt; and &lt;i&gt;Managing the Philippines’ War
on Terror from 1969 to 2005: A Case Study in Public Administration.&lt;/i&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Let me
share with you some points to ponder from Andre Jute, the author of &lt;i&gt;Reverse
Negative&lt;/i&gt;.&amp;nbsp; In his book &lt;i&gt;Writing a
Thriller&lt;/i&gt;, he said, “A Nobel laureate told me that, within a six block radius of
the pub we were in, there were a hundred better writers than either of us . . .
The difference between us, as published writers, and them as unpublished
writers . . . was merely that we sat down and wrote a page a day or ten pages a
day . . . and they didn’t.”&amp;nbsp; He also
said, “The writer’s greatest virtue is never to give up.&amp;nbsp; If you were born stubborn, obstinate, and
plain pig-headed, you have a good start.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;So, do you
really want to write a book and become a published author?&amp;nbsp; Well, the only thing that can stop you from
achieving your goal is—You! Take this advice from an ESL author. I hope my
story will motivate you to write if nothing else.&amp;nbsp; Quit dreaming and start writing!&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style="font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: center;"&gt;&lt;b&gt;&lt;span style="font-size: x-small;"&gt;*The spy novel Project GrandSlam &amp;amp; The Zhongguo Orchestra is rated Five-Star by the Readers’ Favorite&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: small;"&gt;and available in paperback and eBook at Barnes &amp;amp; Noble, Amazon, and Rakuten Kobo.*&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjukXTB0Cv0YGGtYK4p-L1nDMCY9ma8W601uc3ZYTzZ4Kq0XHHBaNSOXol-ePkAPKCLgpX4eVi5Bs7qPVzndciq_Irb5FRsonj7FsXtSTZc7zUHzddphkFG8OAv8Ri_NYCdfe3j5ANa1MjEMkfc-wz8ZIc0t5iY7fB1zZlyrwjxO1QbN0MIXw52anNfngY/s72-w449-h266-c/PGS%20Books%20in%20Library%20-%20Marketing.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title/><link>http://josilagan.blogspot.com/2025/08/1969-philippine-government-has-been.html</link><pubDate>Mon, 11 Aug 2025 15:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-1308132698911295432</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8KyK2sgv-Ev4LHCXz5dI5J78X67YYI0Y6xSd_NOODyfyDSbkyV3fvple4Z_AtNGdfaa7tSAweAdG_M74AS11STVnWdam4I_O43rEcyt6q_Bpq3q1EOhEZs-aqYysGdhNuHglKYbVWoookHIvUo6SWVwsJGTX2Zado0N_s02zOpZiVT9VQJBO-pXtx1CU/s7017/Book%20Cover%20-%20War%20on%20Terror%20Amazon.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="7017" data-original-width="4963" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8KyK2sgv-Ev4LHCXz5dI5J78X67YYI0Y6xSd_NOODyfyDSbkyV3fvple4Z_AtNGdfaa7tSAweAdG_M74AS11STVnWdam4I_O43rEcyt6q_Bpq3q1EOhEZs-aqYysGdhNuHglKYbVWoookHIvUo6SWVwsJGTX2Zado0N_s02zOpZiVT9VQJBO-pXtx1CU/s320/Book%20Cover%20-%20War%20on%20Terror%20Amazon.png" width="226" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;Since
1969, the Philippine government has been battling Communist Terrorists, yet it
has not gained complete control of the security situation in the country in
2005. Considering the experiences gained in the long years of fighting
terrorism, the police and the armed forces should have decimated the CPP/NPA
and its Sparrow Unit and Alex Boncayao Brigade. &lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&lt;/span&gt;It could have successfully established peace
and order throughout the nation, but the internal conditions during the period
dictated otherwise. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif;"&gt;The influx of foreign Islamists in
Mindanao, like the Jemaah Islamiyah (JI), and their association with the local
terror groups, such as the Abu Sayyaf Group (ASG), has aggravated the already
combustible situation in the South. &lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&lt;/span&gt;Subsequently,
their close collaboration has become a serious threat to national security. ASG’s
operational ties with JI and the Al-Qaeda network developed stronger as time went
by, with bombings in Metro Manila and other parts of the country as their
signature accomplishments.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal"&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;So, what kept the Philippine
government from winning its War on Terror, considering its counter-terror
infrastructure, anti-terror policies and programs, and seasoned police and
military forces? &amp;nbsp;What served as obstacles to the War on Terror that forestalled
strategic successes? How did the Executive, Legislative, and Judicial Branches miss
the opportunity to collaborate in the War on Terror using the concepts and
theories in public administration, as well as the utilization of the best
practices in public governance?&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;

&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;&lt;div style="text-align: justify;"&gt;The purpose of this case study
is to analyze the anti-terrorism policies and programs of the Philippine
government from 1969 to 2005 and examine why the governmental agencies
responsible for enforcing them struggled to execute their mission, which consequently
denied them complete victory.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;This case study also focuses on the challenges
faced by the Intelligence Community in its counter-terrorism operations. It
presents how the system of governance hinders the Philippine government from achieving
strategic success in the War on Terror.&amp;nbsp; Along this line, this book will
examine how the prevailing culture in Philippine politics from 1969 to 2005 has
impacted the intelligence operations against domestic and foreign terrorist
groups.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;: Available on eBook and Hard Copy. Order via amazon.com.&amp;nbsp;&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8KyK2sgv-Ev4LHCXz5dI5J78X67YYI0Y6xSd_NOODyfyDSbkyV3fvple4Z_AtNGdfaa7tSAweAdG_M74AS11STVnWdam4I_O43rEcyt6q_Bpq3q1EOhEZs-aqYysGdhNuHglKYbVWoookHIvUo6SWVwsJGTX2Zado0N_s02zOpZiVT9VQJBO-pXtx1CU/s72-c/Book%20Cover%20-%20War%20on%20Terror%20Amazon.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title/><link>http://josilagan.blogspot.com/2025/07/for-nine-years-from-first-bombing-of.html</link><pubDate>Sat, 19 Jul 2025 11:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-7499404815470518218</guid><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNT5iz1Qg6LRNjQPNIc39EJN4NKmUpm93sEUGeoyYE0xHOYrQuMIiGvnFVRjLbSlRP_TSFYnlIZKzzY6ctv0GC-spsXewrfmhCq3dBF1C5G0MkaRvk9Shd9KDJOFBM1I43lk8oQe9_3SEtvGxWPtTHChpF0NhQIgPqOHwinjwB3WhMepUpi2zYWgBAtk8/s7017/BOOK%20COVER%20%20-%20HOMELAND%20SECURITY.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="7017" data-original-width="4963" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNT5iz1Qg6LRNjQPNIc39EJN4NKmUpm93sEUGeoyYE0xHOYrQuMIiGvnFVRjLbSlRP_TSFYnlIZKzzY6ctv0GC-spsXewrfmhCq3dBF1C5G0MkaRvk9Shd9KDJOFBM1I43lk8oQe9_3SEtvGxWPtTHChpF0NhQIgPqOHwinjwB3WhMepUpi2zYWgBAtk8/s320/BOOK%20COVER%20%20-%20HOMELAND%20SECURITY.png" width="226" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="background-color: white; color: #0f1111; font-size: 14px;"&gt;&lt;span style="font-family: times;"&gt;For nine years, from the first bombing of the World Trade Center on February 26, 1993, to its second attack on September 11, 2001, the United States encountered ten major terrorist attacks on the US mainland and the United States' interests overseas. These attacks have resulted in the total death of 6101 and injuries to 19,735 people.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="color: #0f1111; font-size: 14px;"&gt;&lt;span style="font-family: times;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="background-color: white; color: #0f1111; font-size: 14px;"&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: times;"&gt;The blame game and political mudslinging from the Republican and Democratic parties have not produced any positive results to address the problems of terrorism. On the other hand, the crisis highlighted the years of a dysfunctional relationship within the Intelligence Community, which the United States Congress revisited through its fact-finding commission, ultimately leading to the creation of the Department of Homeland Security (DHS).&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="color: #0f1111; font-size: 14px;"&gt;&lt;span style="font-family: times;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="background-color: white; color: #0f1111; font-size: 14px;"&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: times;"&gt;The establishment of DHS was a public policy statement by the United States government to counter threats to national security. It was the proactive approach of the Bush Administration to its domestic policy on terrorism. DHS carries out all the federal government's terrorism activities and programs.&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="color: #0f1111; font-size: 14px;"&gt;&lt;span style="font-family: times;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="background-color: white; color: #0f1111; font-size: 14px;"&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: times;"&gt;The DHS was the result of a policy choice by elected officials, and their policy output led to the creation of the Department. On the other hand, the policy impact was the effect of both the policy choice and policy output, which was to protect the homeland against terrorist attacks from both domestic and transnational groups. The process of establishing DHS went through six stages in the public policy process, and these are: Agenda Setting, Policy Formulation, Decision Making, Implementation, and Evaluation.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: times;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span style="font-family: times;"&gt;Available on Amazon.com. Get your eBook or Hard Copy or Both.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNT5iz1Qg6LRNjQPNIc39EJN4NKmUpm93sEUGeoyYE0xHOYrQuMIiGvnFVRjLbSlRP_TSFYnlIZKzzY6ctv0GC-spsXewrfmhCq3dBF1C5G0MkaRvk9Shd9KDJOFBM1I43lk8oQe9_3SEtvGxWPtTHChpF0NhQIgPqOHwinjwB3WhMepUpi2zYWgBAtk8/s72-c/BOOK%20COVER%20%20-%20HOMELAND%20SECURITY.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Duterte, China, and the West Philippine Sea: The President's Betrayal</title><link>http://josilagan.blogspot.com/2025/03/rodrigo-duterte-strong-personality-and.html</link><pubDate>Wed, 26 Mar 2025 15:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-966349442290053045</guid><description>&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="background: white; color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;You can’t make this stuff up, can you?&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="background: white; color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;While in office, former President
Rodrigo Duterte sought to have the Philippines become a province of China, and
he undermined the Philippines’ territorial claim over the West Philippine Sea.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;Did Duterte serve the
interests of the Philippines during his presidency, or promote China's foreign
policy in Southeast Asia? I believe it’s the second premise, and that’s a shame
because his foreign policy was preeminently pro-CCP and supportive of Xi Jinping's.
He turned his back on the Philippines' traditional ally, the United
States.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;Do you recall Duterte's
public pronouncement in 2016, when he said, “It’s time to say goodbye to
Washington.” (Foreign Policy, November 2, 2021)&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;Duterte exhorting Xi
Jinping to make the Philippines one of China’s provinces is somewhat
reprehensible, if not treasonous.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;









&lt;/p&gt;&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;The West Philippine Sea
and the expanse of the South China Sea aren’t only strategically important to
China’s military expansion in the Indo-Pacific region. These areas are abundant
in mineral resources, including oil, gas, and other forms of natural gas, and
rank among the largest in the world. Additionally, 12 percent of the global
fish catch originates from these coveted waters. Moreover, approximately 21
percent of global trade passes through the West Philippine Sea and the South
China Sea, amounting to approximately $3.4 trillion in annual&amp;nbsp;trade.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN7Dllih2uH2wsF_XhhUbp_YjY2yHY0HSbmYGnqlH1LjxXiiNEnakRpt7kDH2AEnlLswRnpQ09BMzUUeLlrlT-31BwD3bD1BcjzpwgZC6K1CMipQhHFlUlYVY74sBAgkcAHLCQH8HyM5NG2eBAz2OpxIxtJCqvER2nBMLsfUxFyPNaMRMAobO4AanIEWg/s300/West-Philippine-Sea-Map.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="300" data-original-width="263" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN7Dllih2uH2wsF_XhhUbp_YjY2yHY0HSbmYGnqlH1LjxXiiNEnakRpt7kDH2AEnlLswRnpQ09BMzUUeLlrlT-31BwD3bD1BcjzpwgZC6K1CMipQhHFlUlYVY74sBAgkcAHLCQH8HyM5NG2eBAz2OpxIxtJCqvER2nBMLsfUxFyPNaMRMAobO4AanIEWg/w314-h312/West-Philippine-Sea-Map.jpg" width="314" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;(Photo Credit: GeoCurrents -- geocurrents.info.blog)&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="background-color: white; color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;, serif; font-size: 11pt; text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; text-align: justify;"&gt;&lt;span style="background: white; color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;As has been debunked, China has no
legal or historical claim to the entire South China Sea, despite its relentless
propaganda campaigns. Its assertion of maritime ownership to the West Philippine
Sea and/or the&amp;nbsp;entire is based solely on the map published by the&amp;nbsp;
Republic of China in 1947, which was titled "Map of South China Sea
Islands," whereby it demarcates the Chinese’s territorial claims with the
eleven dashes, extending from Malaysia in the south&amp;nbsp;up to&amp;nbsp; Taiwan in
the north.&amp;nbsp;Later, it was downgraded to the nine-dash line in 1952, when
the Chinese Communist Party (CCP) assumed control of the government from the
Kuomintang.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;The Permanent Court of
Arbitration at The Hague, an international tribunal, ruled in 2016 that the
Philippines is the rightful claimant to the West Philippine Sea, which
encompasses the Spratly Islands. This ruling is significant because it upholds
the principles of international law and maritime rights as set out in UNCLOS.
But China, which didn't participate in the trial, defies this international
court order with its relentless military provocations and incursions into the
Philippine territory.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;Even with the Hague's
ruling, Duterte still sided with China and declared in 2021 that he'll 'throw
away' the Philippines' arbitral win versus China, “&lt;i&gt;Sa usapang bugoy, sabihin
ko sa iyo ibigay mo sa'kin, sabihin ko sa'yo putang ina, papel lang 'yan.
Itatapon ko 'yan sa wastebasket.&lt;/i&gt;” (Phil Star, May 6, 2021)&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;China's People's
Liberation Army-Navy (PLAN) military aggressions against the Philippine Coast
Guard and the local fishermen's boats aren't only unlawful but dangerous as
well. It warrants robust condemnation by the United Nations (UN), particularly
given China's repeated mockery of the legal frameworks set out in the UN
Convention on the Law of the Sea (UNCLOS). Unfortunately, even the members of
the Association of Southeast Asian Nations (ASEAN) are hesitant to express
their official views on the PLAN's bullying or Grey Zone tactics in the West
Philippine Sea, given China's primary trade partner status in the region.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;But the Philippines has
found some great allies in the United States, the AUKUS alliance (comprising
the United States, the United Kingdom, and Australia), and the First Island
Chain countries (including Japan and Taiwan), which have been vocal in their support
for the Philippines and in their condemnation of China's aggressive actions and
military adventurism in the region.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;Might isn't right when a
powerful country like China flexes its military strength to harm and bully a
small but sovereign nation like the Philippines.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="color: #080809; font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;It's about time the
government of President Ferdinand Marcos Jr. asserted the Philippines'
sovereignty in the West Philippine Sea. This isn't just a task for the Filipino
government leaders but a responsibility that all Filipinos must relentlessly
pursue. Filipinos must unite as a nation behind the Sun and Stars and stand
together in defense of their country's sovereignty.&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="MsoNormal" style="line-height: normal; margin-bottom: 0in; mso-margin-top-alt: auto; text-align: justify;"&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 11.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;After the contentious extradition to the Netherlands, Duterte is now
languishing in jail and finding himself in trial before the&amp;nbsp; International
Criminal Court (ICC) for his alleged “crime against&amp;nbsp;humanity” while
serving in public office, notably as the Davao's Mayor and President of the
Philippines; Filipinos are hoping the elusive justice must prevail in the court
of law, even though Duterte's administration has deprived thousands of their
legal rights to seek justice--the same rights being afforded to him by the
ICC.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-font-kerning: 0pt; mso-ligatures: none;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjN7Dllih2uH2wsF_XhhUbp_YjY2yHY0HSbmYGnqlH1LjxXiiNEnakRpt7kDH2AEnlLswRnpQ09BMzUUeLlrlT-31BwD3bD1BcjzpwgZC6K1CMipQhHFlUlYVY74sBAgkcAHLCQH8HyM5NG2eBAz2OpxIxtJCqvER2nBMLsfUxFyPNaMRMAobO4AanIEWg/s72-w314-h312-c/West-Philippine-Sea-Map.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Five Stars! The Reader's Favorite Book Review of Project GrandSlam &amp; The Zhongguo Orchestra</title><link>http://josilagan.blogspot.com/2022/09/five-stars-readers-favorite-book-review.html</link><pubDate>Mon, 19 Sep 2022 11:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-5695016039317855045</guid><description>&lt;p&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;&lt;a href="https://readersfavorite.com/book-review/project-grandslam-the-zhongguo-orchestra"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiuaw5TnZdWxW6yUcgrf4iTxgvxkFlhjuuCnv826K8s5mPJll8bdoksJYIbUMzsZJZxNtLrbbczBJjU03kqaWjyHE5zuy4W9j0mOC5qH_xCHn3r02TyOHcpFzalwdqqo7BrU1J-x6v2iSaqE-tnIgDuaRbTOUzPWV4bczIbCWNVdq7rpbM9TbMnAU8/s144/5star%20Reader's%20Favorite.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="144" data-original-width="144" height="144" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiuaw5TnZdWxW6yUcgrf4iTxgvxkFlhjuuCnv826K8s5mPJll8bdoksJYIbUMzsZJZxNtLrbbczBJjU03kqaWjyHE5zuy4W9j0mOC5qH_xCHn3r02TyOHcpFzalwdqqo7BrU1J-x6v2iSaqE-tnIgDuaRbTOUzPWV4bczIbCWNVdq7rpbM9TbMnAU8/s1600/5star%20Reader's%20Favorite.png" width="144" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: left;"&gt;&lt;span style="font-family: georgia; text-align: justify;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;a href="https://readersfavorite.com/book-review/project-grandslam-the-zhongguo-orchestra" style="font-family: georgia; text-align: center;"&gt;https://readersfavorite.com/book-review/project-grandslam-the-zhongguo-orchestra&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family: georgia; text-align: justify;"&gt;Project GrandSlam &amp;amp; The Zhongguo Orchestra by Jos Ilagan is a political thriller with strains of religious themes. York Ryder is a photojournalist tasked to cover US Secretary of State John Berzowski’s diplomatic delegation to the Philippines. However, things don’t go as planned, and before they knew it, Berzowski is killed and there are bomb threats.&lt;/span&gt;&lt;/p&gt;&lt;p class="font_8" style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;Ryder was then given a new assignment: figure out who killed the secretary, locate the bombs, and make sure the killers don’t get a chance to kill anyone else. With the USA allies offering no help, Ryder works with the CIA and National Intelligence Coordinating Agency to figure out who did it. Turns out Hong Kong’s Kowloon Dragon is behind it all, and their next target is the President of the United States. The Kowloon Dragon has major plans, and it looks like York Ryder has to stop them before it is too late.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class="font_8" style="text-align: justify;"&gt;&lt;span class="color_26"&gt;&lt;span style="font-family: georgia;"&gt;Entertaining from the very start, Project GrandSlam &amp;amp; The Zhongguo Orchestra opens with an intriguing scene and makes you wonder if Ryder is more than just a photojournalist or a government agent. However, it is also a nod to Ryder’s capabilities as a journalist and as a reliable protagonist for readers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="font_8" style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;The story is very complex and intriguing. Readers are always looking for the next clue, the next twist, and the next turn; however, they are never able to guess what will happen next.&lt;/span&gt;&lt;/p&gt;&lt;p class="font_8" style="text-align: justify;"&gt;&lt;span style="font-family: georgia;"&gt;Author Jos Ilagan maintains the suspense of the story even when we know the culprit. You can never guess what will happen next and if Ryder will be able to get the job done or not. The characters are well-rounded, they have space to develop and grow, and this is all a reader needs from an author! Fantastic!&lt;/span&gt;&lt;/p&gt;&lt;p class="font_8" style="text-align: center;"&gt;&lt;br /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiuaw5TnZdWxW6yUcgrf4iTxgvxkFlhjuuCnv826K8s5mPJll8bdoksJYIbUMzsZJZxNtLrbbczBJjU03kqaWjyHE5zuy4W9j0mOC5qH_xCHn3r02TyOHcpFzalwdqqo7BrU1J-x6v2iSaqE-tnIgDuaRbTOUzPWV4bczIbCWNVdq7rpbM9TbMnAU8/s72-c/5star%20Reader's%20Favorite.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>A Basic Study of Postal Bomb: A Guide to Personal Security Measures</title><link>http://josilagan.blogspot.com/2019/07/a-basic-study-of-postal-bomb-guide-to.html</link><pubDate>Tue, 9 Jul 2019 21:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-8000746282262404316</guid><description>&lt;iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/Lk4iSE6ZZAI" width="480"&gt;&lt;/iframe&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/Lk4iSE6ZZAI/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Personal Security Measures: How to Protect Yourself from Postal Bomb</title><link>http://josilagan.blogspot.com/2018/04/personal-security-measures-how-to_2.html</link><pubDate>Mon, 2 Apr 2018 22:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-6873340515848049279</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOsbP7EQkHFstJZPDqKbnLKG8R9jbdrhwim_nXchey4oYfQ0mEixkS4n-oaByL0_IGbbCuTpFDcRK54PovhYntQ99t8QUwWhtcDbbA1SS9vi-pXlZIhCHrEZbGoWh4Tm95Fu5ugMBT_KA/s1600/The+Atlantic.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="540" data-original-width="960" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOsbP7EQkHFstJZPDqKbnLKG8R9jbdrhwim_nXchey4oYfQ0mEixkS4n-oaByL0_IGbbCuTpFDcRK54PovhYntQ99t8QUwWhtcDbbA1SS9vi-pXlZIhCHrEZbGoWh4Tm95Fu5ugMBT_KA/s400/The+Atlantic.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div align="center" style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&lt;span style="font-size: xx-small;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (Photo Credit: The Atlantic, March 30, 2018 Issue)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;The spate of bombings that took place
in Austin, Texas from March 2 to 20 this year had put the nation on edge.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;Five package bombs exploded. Two people
killed. Five critically injured.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;For three weeks the lingering
questions in the minds of law enforcers were: Is this another Ted “Unabomber”
Kaczynski-style operation? Is the bomber (or bombers) domestic-bred or from a
foreign group? What’s the bomber’s motive or objective?&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 107%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;The news report later revealed that the bombings were the handiworks of
Mark Anthony Conditt, a self-professed psychopath who detonated a bomb and blew
up himself when the police pulled him over on March 21.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 107%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;Now, would this kind of terroristic act also happen in a place like
Santa Clarita Valley? Yes, it could. In my eight years in counter-terrorism
operations, I would say terrorists know no boundaries—they strike in rural and
urban areas, in populated and isolated places.&lt;span style="margin: 0px;"&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 107%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;Postal bomb is one of the methods used by terrorists in sowing chaos. A
bomb of choice could be in the form of explosive or incendiary device. They come
in envelopes no thicker than one-fourth inch or packages not more than
twenty-two pounds in weight. &lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 107%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;So, what do we do to protect ourselves and our families? Two words—be
vigilant. Always be observant at home and at work for any suspicious mails.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 107%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;Below are pointers in handling postal deliveries. Although they’re
designed for persons working in sensitive-government positions overseas and for
executives in multinational corporations, personal security, however, is
everyone’s responsibility, and so the succeeding guidelines apply to all even
to the Santa Claritans.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The bomb can explode when opening the
mail so one must be aware of the following tell-tale signs in handling a letter
or a package.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px 0px 0.93px; text-align: justify; text-indent: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Do
you normally receive letters or parcels from domestic or abroad? Pay attention
to the foreign name and address of the sender.&lt;span style="margin: 0px;"&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;A
key to look for is the postmark. Do you recognize the writing? Is it written in
foreign style?&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Is
the letter or parcel balanced? If it’s lopsided, treat it as a suspect.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;If
the weight is excessive for its size, treat it as a suspect.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Are
there any small holes that could’ve resulted from wire punctures?&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Are
there any grease or stain marks that could’ve caused by explosive
sweating?&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Is
there an unusual scent or aroma coming from the letter or parcel, something
like the smell of almonds?&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;In
case of a letter (usually in brown envelope), check if there’s a stiffer that
holds the content flat—like cardboard or metal.&lt;span style="margin: 0px;"&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;If
the feel isn’t like just a folded paper inside, treat the envelope as a
suspect.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Check
if there are any unusual outlines if you hold the envelope up to the
light.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 0px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Is
the flap of the envelope sealed completely? Usually there’s a small gap on both
sides. If so, treat it as a suspect.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 0.66px; text-align: justify;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;What to do
and not to do when you receive a suspected postal bomb in the office or at
home: &lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px 0px 0.86px; text-align: justify; text-indent: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Place
the letter or the parcel on the flat surface.&lt;span style="margin: 0px;"&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Make
sure to place it in an open space away from the house or office.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;If not possible, leave it on the flat
surface, and then open the windows and doors.&lt;span style="margin: 0px;"&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;A
bomb explodes strongly when it’s in a closed room.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Clear
the area of all persons immediately.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Call
the Security Staff if you’re in the office to make proper determination of
consequent steps.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;When
at home, call the LASD-SCV for determination and assistance.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Don’t
bend the envelope or the package.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Don’t
open the letter or the package.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 47px; text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;●&lt;span style="font-size-adjust: none; font-stretch: normal; font: 7pt &amp;quot;Times New Roman&amp;quot;; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;Don’t
place the letter or the package in the water. &lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="line-height: 107%; margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;What’s the chance of Austin-like
incidents happening in Santa Clarita Valley? Not even one-percent. So why this
article? Just a heads-up so you or your family members won’t become part of the
0.99-percent targets. There will always be copycats. Remember Thanh Cong Phan
from Washington who mailed postal bombs to US military facilities and to the
CIA HQS at the time Conditt is wreaking havoc in Texas?&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px; text-align: justify; text-indent: 0in;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Lastly, I would’ve you think twice of
letting your minor children get the packages from your porch or mail box. I’m
sure they want to help, and you want to see them off their Xbox and
PlayStation. I never let mine. Paranoia? Friend, we’re living in different
times.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;/div&gt;
&lt;div style="margin: 0px 0px 1.53px 0.66px; text-align: justify;"&gt;
&lt;span style="font-size: 12pt; line-height: 104%; margin: 0px;"&gt;&lt;span style="margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Please take
note, security is always inconvenient, but it’ll keep you and your loved ones
safe.&lt;span style="margin: 0px;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;

&lt;b&gt;&lt;/b&gt;&lt;i&gt;&lt;/i&gt;&lt;u&gt;&lt;/u&gt;&lt;sub&gt;&lt;/sub&gt;&lt;sup&gt;&lt;/sup&gt;&lt;strike&gt;&lt;/strike&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOsbP7EQkHFstJZPDqKbnLKG8R9jbdrhwim_nXchey4oYfQ0mEixkS4n-oaByL0_IGbbCuTpFDcRK54PovhYntQ99t8QUwWhtcDbbA1SS9vi-pXlZIhCHrEZbGoWh4Tm95Fu5ugMBT_KA/s72-c/The+Atlantic.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Beijing Goes Global: China to Expand Marine Force</title><link>http://josilagan.blogspot.com/2017/04/chinas-military-goes-global.html</link><pubDate>Sat, 8 Apr 2017 17:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-6642894597922878024</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVWjjWSjJn-K49hvG0CqSBt0_6TPjkt8PQP-TKVEPa44PUSRutQ6bLSF9uaAxxBwJ9eYG4mTKzJN2HswjUlbSk5WZZFzFOrkOfICzpG4vYv6aRqvuuZkmilB56RE7z2YtUiOJq2pN1BZQ/s1600/PLA+Navy+Frigate.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="288" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVWjjWSjJn-K49hvG0CqSBt0_6TPjkt8PQP-TKVEPa44PUSRutQ6bLSF9uaAxxBwJ9eYG4mTKzJN2HswjUlbSk5WZZFzFOrkOfICzpG4vYv6aRqvuuZkmilB56RE7z2YtUiOJq2pN1BZQ/s400/PLA+Navy+Frigate.jpg" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;(PLA Navy Frigate Yueyang. &lt;span class="mw-mmv-source-author"&gt;&lt;span class="mw-mmv-author"&gt;Photo by MC Specialist 1st Class Shannon Renfroe, Wikimedia Commons&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;)&amp;nbsp; &lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span class="mw-mmv-source-author"&gt;&lt;span class="mw-mmv-author"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Hereunder&lt;/span&gt; article from Daniel Lang &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;tells o&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;f &lt;/span&gt;&lt;/span&gt;an interesting topic &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;about &lt;/span&gt;the strategic
plan of the Chinese government to expand its military clout worldwide. China's
People's Liberation Army (Navy) is going global. With its adventurous
island-grabbing in West Philippine Sea, PLA (N) is now making its presence in
Africa.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;So,
from constructing an airstrip on a reclaimed area in Spratly Islands, the Chinese
is now building a navy &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;installation &lt;/span&gt;about four miles from Camp Lemonnier--United
States&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;'&lt;/span&gt; military base of Combined Joint Task Force-Horn of Africa.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;In
my book The Zhongguo Orchestra, I have &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;discussed&lt;/span&gt; China's long-term objective of
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;displacing &lt;/span&gt;the United States as the &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;primary &lt;/span&gt;global power; and with the
PLA increas&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;ing&lt;/span&gt; its military budget and expand&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;ing&lt;/span&gt; its armed forces, the Chinese
keep the Am&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;erican &lt;/span&gt;military planners in Pentagon glued on their drawing tables as t&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;hey &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;strategize &lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;to &lt;/span&gt;counter the looming threat from &lt;/span&gt;&lt;/span&gt;Beijing.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Below
is Lang's article.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;For
most of its recent history, China has largely been a land power with no
significant naval capabilities. They haven’t been able to exert much military
influence beyond their coastline for hundreds of years. In fact, one of the reasons
why Western powers had no trouble bullying China during the 19th and 20th
centuries, was because the Imperial Navy under the Qing dynasty was incredibly
weak. With that in mind, it’s no surprise that lately, China has been putting a
lot of effort into building an effective overseas naval force.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Not
only have they been busy constructing their &lt;a href="http://www.popularmechanics.com/military/navy-ships/a25009/chinas-second-aircraft-carrier-shandong/" target="_blank"&gt;first combat-ready aircraft carrier&lt;/a&gt;,
the Chinese have also been developing new aircrafts to accompany it. Of course,
a navy can’t really exert much military influence if it doesn’t have soldiers
to deploy. That’s why Chinese officials have recently announced that they are
preparing to &lt;a href="http://www.news.com.au/world/china-to-boost-marine-corps-by-400pc-to-enforce-growing-world-influence/news-story/0d39501cbedd214994e435cecaf8c835" target="_blank"&gt;rapidly expand the ranks&lt;/a&gt; of the
People’s Liberation Army Marine Corps.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Chinese media is reporting the People’s Liberation
Army’s ambitious new plans following the announcement of a 7 per cent increase
to $AU200 billion in defence spending last week. Among the details to emerge is
a move to boost China’s marine corps — highly trained and well equipped troops
intended for rapid deployment and offensive missions launched from the sea —
from an existing 20,000 troops to more than 100,000.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Chinese officials have stated this is to
protect arterial maritime trade routes and enforce its growing overseas
interests.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;“What growing overseas interests” you
might ask? Well, China has been in the process of building their first overseas
military base in Djibouti, on the Horn of Africa. And that base &lt;a href="https://www.defensetech.org/2017/03/13/chinas-first-overseas-military-base-nearing-completion/" target="_blank"&gt;is expected to be completed this summer&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Marine Gen. Thomas Waldhauser, commander
of AfriCom, told the Senate Armed Services Committee that he expected the
Chinese base on the Horn of Africa to be operational later this summer. Without
getting specific, Waldhauser said he recently met with Djibouti’s President
Ismail Omar Guelleh “and expressed our concerns about some of the things that
are important to us about what the Chinese should not do at that location.” &lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;The Chinese base would be about four
miles from the U.S. base at Camp Lemonnier, one of the Pentagon’s largest and
most important foreign military installations, where about 3,000 U.S. military
personnel and contractors are assigned to Combined Joint Task Force-Horn of Africa.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;Given that base’s close proximity to
Camp Lemonnier, China’s intentions are obvious. They want what the United
States has, which is a vast overseas empire, and an expeditionary force that
can reach any coastline in the world. They want to compete with our current
role in the global theater. Unfortunately, there isn’t enough room in the world
for two countries carrying out that role. We may very well be witnessing the
first stages of a new conflict between the United States and China.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , sans-serif;"&gt;(Authored
by Daniel Lang, &lt;a href="http://www.shtfplan.com/headline-news/beijing-goes-global-china-to-expand-marines-by-400-first-overseas-military-base-almost-complete_03172017" target="_blank"&gt;Beijing Goes Global: China to Expand
Marine Force by 400%; First Overseas Military Base Almost Complete&lt;/a&gt;, March
17, 2017. From SHTFplan.com)&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="374"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri",sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="374"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri",sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVWjjWSjJn-K49hvG0CqSBt0_6TPjkt8PQP-TKVEPa44PUSRutQ6bLSF9uaAxxBwJ9eYG4mTKzJN2HswjUlbSk5WZZFzFOrkOfICzpG4vYv6aRqvuuZkmilB56RE7z2YtUiOJq2pN1BZQ/s72-c/PLA+Navy+Frigate.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Personal Security Measures: A Guide on How to Live and Work Safely in Abroad (Part 1)</title><link>http://josilagan.blogspot.com/2016/05/personal-security-measures-guide-on-how.html</link><category>Action Plan</category><category>Dusk to Dawn Sensor</category><category>Home Security Measures</category><category>Intrusion Plan</category><category>Personal History Statement</category><category>Safety Check</category><category>Strategic Areas</category><pubDate>Sun, 22 May 2016 23:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-7253320885691891199</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj4fW26NqcAX71jZBbjX3hauViqeXA7Isnr9ZuHvLszP5ux2XoamqQhdnM3oIx5eJHmuHXxV7_yqU2oXaG4QjaI7zVqhnHMAmgp_cBhGIEvaMwZ-76Edh1k-bb8h5hZS7MN7uF-9LIqsM/s1600/Usual+Suspects.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj4fW26NqcAX71jZBbjX3hauViqeXA7Isnr9ZuHvLszP5ux2XoamqQhdnM3oIx5eJHmuHXxV7_yqU2oXaG4QjaI7zVqhnHMAmgp_cBhGIEvaMwZ-76Edh1k-bb8h5hZS7MN7uF-9LIqsM/s400/Usual+Suspects.png" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;(Image courtesy of Pixabay)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On January 2016, the US Department of State had issued seven travel alerts and warnings for the Americans who are going to Mexico, El Salvador, Haiti, Uganda, Sudan, Niger, and Burkina Faso. The USDOS advised the travelers of the risks they would encounter in these countries. Tourists are even cautioned to consider not going at all or to postpone their plans to a later date. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Accordingly, the reasons for issuing the notification was due to “unstable government, civil war, ongoing intense crime or violence, or frequent terrorist attacks.”&amp;nbsp; The announcement also mentioned of “an election season that is bound to have many strikes, demonstrations, or disturbances; a health alert like an outbreak of H1N1; or evidence of an elevated risk of terrorist attacks.” On both publications, the USDOS pointed out the possible terrorist attack. This kind of threat would intensify as the years go by notably with the expanding clout of the Islamic State of Iraq and Syria (ISIS) in the Middle East, and the al-Qaeda (AQ) in the African continent.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; For the American tourists, they can always forego their vacation plans and depart when the security condition in their destinations changed for good. This could also be said for those company executives who are on a planned business trip. But for those expatriates living overseas, they do not have the luxury of altering their schedules; instead, they will need to raise the level of their security awareness to protect themselves and their household from physical harm. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Executives of multinational corporations would be the most likely targets of criminal and terroristic acts, not only for financial gains but also for political objectives because they are construed as conduits of so-called American imperialism.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; One of the critical assets of a corporation is its personnel—primarily the managers or those assigned on sensitive assignments. As such, appropriate attention must be given to the safety and protection of the executives and their families, particularly in high-risk countries where crimes are rampant and where terrorist groups operate unabated. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The security operation is of universal application, but some techniques may need to be applied to address the threat condition. A security precaution required for a given situation would depend mostly on the nature of the threats, which could be assessed on several factors.&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; So, in this article, I am going to outline the Personal Security Measures that you--the American expatriate--could apply to mitigate your risk of becoming a victim of criminal or terrorist group. I will discuss the precautionary security measures you can take while in the field, in the office, and at home. These guidelines come in the simple &lt;i&gt;Do’s and Don’ts&lt;/i&gt;, which are uncomplicated that you and your family members can perform daily.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; As a caveat, the security measures presented herein should serve as guides only, as no one is more concerned with the protection of your well-being than yourself. So, the greater the security awareness you put into the task, the greater the degree of your safety will be. Remember, even the professional security practitioners find it hard to stay on full-security alert on a 24-hour basis. As such, it is crucial for you to identify and recognize vulnerable situations when traveling to work, staying at home, or even doing recreational activities with your family. For instance, you might be defenseless when pumping gas in a local station, opening the door to callers, or traveling on a deserted highway. It is, therefore, important to always be on the lookout and not to lower your guard down. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remember, attackers operate using the element of surprise, and if you take that component away from them, the criminals or terrorists will find you operating on higher ground, if not leveling the threat to a manageable degree. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The following are basic personal security guidelines that lay down the foundation on the &lt;i&gt;Do’s and Don’ts&lt;/i&gt; that I am going to discuss in the succeeding chapters. These guiding principles are:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1. Always be alert to the suspicious conduct of person/s around you, in the vicinity of your home, or near your office.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2. Always be sensitive to the areas of threat arising from your personal dealings, as well as those resulting from your official business. Inform your immediate superior, staff (who should be aware of the situation), and family members.&amp;nbsp;&amp;nbsp; Report the threat to the police at once either by phone or in person.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3. Always remember that an attack would succeed if the perpetrator caught you unaware. If you were on guard, the attacker would stop and think twice. This brief interval is precious, as it will give you time to take evasive actions or call for assistance.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.&amp;nbsp; Summon for help at the first sign of danger when something is about to happen or when the act is occurring. Shout, sound the motor horn or blow the whistle to call the attention of the people around you! When you can’t do this yourself, tell your family or friends to sound the alarm.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5. Always remember that raising the alarm is an effective means of slowing or hindering the perpetrator from pressing on his attack.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6. If you and your family plan to go out of town in a period of days, inform your trusted neighbor or friend in the community to look after your house. Have your lookout call you and/or call the police when they see unusual activities happening in and around your house.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7. While traveling to work and going back to home, make sure not to establish observable patterns that would enable a potential attacker to predict your future movements, construct an attack-plan based on it, intercept you in conditions unfavorable to you, or isolate you from summoning assistance.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8. Only provide an interview or conduct a business transaction with a properly accredited person in the office during the business hours, or in the presence of your staff or trusted person.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9. While on the field, you must not stay overnight in a place or in conditions that would isolate you from persons able to provide help or summon assistance.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp; 10. When attending social functions, be cautious on your conversations with the locals and with expatriates of other countries. If your position in the company is sensitive in nature, do not disclose anything about your official functions/duties, particularly to the publishers of commercial or social directories. You may not know who among the guests are working for the criminal or terrorist group.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Please bear in mind that your family and household staff may, at any given time, also be the target of the criminal or terrorist group. So, the Personal Security Measures I am going to share on this blog apply to them as well. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="372"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri",sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;/div&gt;
&lt;div class="MsoListParagraphCxSpFirst" style="text-align: justify; text-indent: -0.25in;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: 12.0pt; line-height: 107%;"&gt;&lt;span style="mso-list: Ignore;"&gt;1&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj4fW26NqcAX71jZBbjX3hauViqeXA7Isnr9ZuHvLszP5ux2XoamqQhdnM3oIx5eJHmuHXxV7_yqU2oXaG4QjaI7zVqhnHMAmgp_cBhGIEvaMwZ-76Edh1k-bb8h5hZS7MN7uF-9LIqsM/s72-c/Usual+Suspects.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Personal Security Measures: A Guide on How to Live and Work Safely in Abroad (Part 2)</title><link>http://josilagan.blogspot.com/2016/02/personal-security-measures-guide-on-how.html</link><category>Darwinism</category><category>home safety measures</category><category>human behavior</category><category>security lighting system</category><category>Sir Edward Coke</category><category>The Institutes of the Laws of England</category><pubDate>Fri, 5 Feb 2016 10:21:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-4068627615936996533</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRvwZjap3lz4oqaMYBAkq98W78TCHeehVV_lAW_cXhx5MSzknoW6JNNMVtRBXENvfTH5P575xs4pI_-UHFPZiSGZluxpvsr_cLuGoKI82HLdQJDnbIULSmy7vmSuyltNz4Tfov6M61TAU/s1600/Knight.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRvwZjap3lz4oqaMYBAkq98W78TCHeehVV_lAW_cXhx5MSzknoW6JNNMVtRBXENvfTH5P575xs4pI_-UHFPZiSGZluxpvsr_cLuGoKI82HLdQJDnbIULSmy7vmSuyltNz4Tfov6M61TAU/s320/Knight.jpg" width="213" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;(Photo courtesy of Pixabay)&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The desire to stay alive is innate in human behavior. This inherent conduct is true even for animals, like the mother Hen securing herself and her chicks from the predacious Hawk hovering in the sky.&amp;nbsp; Self-preservation is a natural instinct, and it is an intrinsic part of human’s defense mechanism.&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Although I don’t subscribe to Darwinism, yet the philosophy of “survival of the fittest and the elimination of the unfit” applies to personal security. If you live in a high-risk country, you are vulnerable to attack--not only against your personal being but also of your family and your property. Thus, the best defense against the malefactors is to keep yourself and your family protected even at home.&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remember what Sir Edward Coke said in The Institutes of the Laws of England in 1628? Coke declared, "For a man's house is his castle, and each man's home is his safest refuge." This adage has no time expiration. It was a spot-on maxim centuries ago, and it is still true even today.&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In the olden days, a King would order his royal guards to keep a vigil in the towers to protect the castle from invaders, and at times, he would instruct the gatekeepers to raise the drawbridge to prevent the enemies from gaining access to the castle. This same security philosophy is applicable today, and even without the luxury of having a regiment of royal guards at your disposal, you can protect everyone at home using simple steps as outlined below. &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The following are necessary home-safety measures that you can use in securing your house and safeguarding your family from intrusions. Remember, the guidelines below are adaptable to various settings—whether you live in rural area or in urban center. &lt;br /&gt;&lt;br /&gt;Do’s&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.&amp;nbsp;&amp;nbsp;&amp;nbsp; Fit locks to outer doors. Ideally, exterior doors should be of solid construction. If the doors have glass fixtures, cover the doors with blinds or curtains from the inside.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.&amp;nbsp;&amp;nbsp; Know where you keep the door keys.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.&amp;nbsp;&amp;nbsp; Use strong chains or bars on outer doors and gates.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.&amp;nbsp; Check visitors through a peephole or from adjacent windows before opening the door.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5. Fit window locks on ground-floor windows and on any windows on upper floors, especially those hidden from the view of the passers-by.&amp;nbsp; Any openings/windows not normally used can be permanently secured by screwing the window to the frame.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.&amp;nbsp; Hang a non-see-through curtain in rooms commonly used by the family.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7.&amp;nbsp; Light the approaches to your house and garage. Make sure the exterior lights are placed out of reach. Check the lighting system from time to time. A time-delayed type of system is ideal.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.&amp;nbsp; Leave a porch light on or in the area of the front door during hours of darkness. A motion-detector lights are excellent in the yards.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9.&amp;nbsp; Always have reserve lighting equipment available in your home, such as flashlights, candles, and hand lamps. Make sure you have spare batteries. A cheap gasoline-powered generator is ideal if you live in the suburb.&lt;br /&gt;&amp;nbsp;&amp;nbsp; 10.&amp;nbsp; Consider also the use of other types of security lighting system for use in emergency situations. Lights placed at strategic points make it difficult for the attackers to hide in the shadows or behind the shrubberies.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRvwZjap3lz4oqaMYBAkq98W78TCHeehVV_lAW_cXhx5MSzknoW6JNNMVtRBXENvfTH5P575xs4pI_-UHFPZiSGZluxpvsr_cLuGoKI82HLdQJDnbIULSmy7vmSuyltNz4Tfov6M61TAU/s72-c/Knight.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Personal Security Measures: A Guide on How to Live and Work Safely in Abroad (Part 3)</title><link>http://josilagan.blogspot.com/2016/01/personal-security-measures-guide-on-how.html</link><category>American Expatriates</category><category>Burkina Faso</category><category>Haiti</category><category>Niger</category><category>Personal Security Measures</category><category>Raise Alarm</category><category>Sudan</category><category>Summon for Help</category><category>Uganda</category><category>USDOS Travel Alerts and Warnings</category><pubDate>Sat, 30 Jan 2016 13:56:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-2626980215815816830</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6y62TlB9krGZwGayHgiOgMZDLMLUsd7uhN3dZf5WyjabPCVKEnB0F8IwzxjC-mXJ_F5kM72auwwLTtVWGEhnacFh_BJONrSQuHAWUP5qw6XIonx5JeLOOQeUpofVxhEV8rDQu1d3MpKM/s1600/House+Protector.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="271" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6y62TlB9krGZwGayHgiOgMZDLMLUsd7uhN3dZf5WyjabPCVKEnB0F8IwzxjC-mXJ_F5kM72auwwLTtVWGEhnacFh_BJONrSQuHAWUP5qw6XIonx5JeLOOQeUpofVxhEV8rDQu1d3MpKM/s400/House+Protector.jpg" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;(Image courtesy of Pixabay)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In this article, I will discuss the security measures in protecting your home and keeping your family safe from intruders, as well as screening your household staff and selecting party caterers and repair men. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.&amp;nbsp;&amp;nbsp;&amp;nbsp; Leave a “courtesy light” at the porch or front door from dusk to dawn. A light with a dusk-to-dawn sensor is highly recommended.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Consider the use of other types of security lighting system for use in emergencies.&amp;nbsp; Lights placed in strategic areas around the house would make it difficult for the would-be-assailants or robbers to hide in the shadows.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.&amp;nbsp;&amp;nbsp;&amp;nbsp; Keep the boundary fences in good condition and make sure they block the rooms in the house that are often used.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.&amp;nbsp; Remove or trim shrubberies around your house, particularly shrubs near paths and driveways to make concealment of persons or devices difficult.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5.&amp;nbsp;&amp;nbsp;&amp;nbsp; Make a safety check each night before retiring to ensure that all doors and windows are locked.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.&amp;nbsp;&amp;nbsp;&amp;nbsp; Treat late callers with high suspicion.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7.&amp;nbsp;&amp;nbsp;&amp;nbsp; Consider keeping a dog. A barking dog will warn you of strangers or trespassers.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.&amp;nbsp;&amp;nbsp; Know your domestic helpers. Let them fill out a Personal History Statement (PHS) or other similar forms. Take their pictures yourself, if not, ask for their current pictures. This will serve as a deterrent to those who have criminal plans.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9.&amp;nbsp;&amp;nbsp;&amp;nbsp; Conduct due diligence. Verify the information declared by the helpers on their PHS.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.&amp;nbsp; Avoid walk-in helpers or helpers dropping names of an acquaintance who are not available for verification.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11. Schedule the works/repairs in your residence and never leave the workers in the house on their own.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12. Exercise utmost care when holding parties or gatherings at your home.&amp;nbsp; Workers, helpers, and caterers should be properly checked before the function. Be wary of those last-minute substitutions.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13. Prepare an action plan or emergency plan in case of intrusion or other threats. The plan should involve the protection of family members as well as the helpers in the house and also of the household pets. &lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6y62TlB9krGZwGayHgiOgMZDLMLUsd7uhN3dZf5WyjabPCVKEnB0F8IwzxjC-mXJ_F5kM72auwwLTtVWGEhnacFh_BJONrSQuHAWUP5qw6XIonx5JeLOOQeUpofVxhEV8rDQu1d3MpKM/s72-c/House+Protector.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Introduction: The Nation Under Siege (Creation of the Department of Homeland Security) </title><link>http://josilagan.blogspot.com/2016/01/introduction-nation-under-siege_4.html</link><category>Abu Sayyaf</category><category>al-Qaeda</category><category>EO 12333</category><category>MAK</category><category>mujahideens</category><category>NATO</category><category>USIC</category><category>Warsaw Pact Countries</category><category>World Trade Center</category><pubDate>Mon, 4 Jan 2016 14:07:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-7377579212932399444</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
﻿﻿﻿&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="height: 361px; margin-left: auto; margin-right: auto; text-align: center; width: 521px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkFkgxFI9UDPhb2k2ffxBq0N8CgqF47OKol9z2YQE6TZsBPzZ7siOxgZunJVIT6AcaDu5EHoou2qSVbl7Av9xY_RIi3GZZxmdOBbQ6UorCf5m-__BwmsaD0ezXgRHnaGS7WB8frvxO3xI/s1600/WTC+Picture.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkFkgxFI9UDPhb2k2ffxBq0N8CgqF47OKol9z2YQE6TZsBPzZ7siOxgZunJVIT6AcaDu5EHoou2qSVbl7Av9xY_RIi3GZZxmdOBbQ6UorCf5m-__BwmsaD0ezXgRHnaGS7WB8frvxO3xI/s320/WTC+Picture.jpg" width="211" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;span style="font-family: Courier; font-size: 7.5pt; line-height: 107%;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace;"&gt;&lt;span style="font-size: xx-small;"&gt;(World Trade Center. Photo courtesy of Wally Gobetz, &lt;span style="mso-no-proof: yes;"&gt;Wikemedia&lt;/span&gt; Commons)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
notion that the United States is invincible from a &lt;span style="mso-no-proof: yes;"&gt;foreign-terrorist&lt;/span&gt; attack was proven wrong after the tragic events of
September 11, 2001, which later referred to as the 9/11. The successful
terrorist operations carried out in New York and Washington DC by the members
of al-Qaeda (AQ) have revealed to the world that even a powerful country like
the United States is not secured from a suicidal terrorist group. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The results of the suicide attacks on the World Trade Center towers and the
Pentagon building not only claimed the lives of 5,350 Americans and foreign
expatriates, but they also resulted in the injuries of 6,500 people. These
figures do not include the lives of 44 passengers and the flight crew of United
Airlines Flight 93 killed when they crashed in the outskirt of Shanksville,
Pennsylvania while bravely wrestling control of the plane from the terrorists. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The terrorists' operations on 9/11 have revealed the softer sides of the
security and intelligence apparatus of the United States government. The
much-heralded invincibility of the US Intelligence Community (IC), considered
as the best in the world, was later on regarded by the public as an incompetent
organization. The IC members' ineptitude raised serious concern about the
capability to provide the policymakers with accurate and timely intelligence on
future terrorist operations in the United States.&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
There are several factors that can be considered why the IC failed to preempt
the AQ plot. One of these was the lack of a strategic plan to counter the
emerging threats of global terrorism coming from the ranks of the Islamist
terrorists after the Cold War. The IC members, particularly the FBI and the
CIA, have failed to adjust to the changing geopolitical landscape of the world
after the collapse of the Berlin wall—which consequently united the two German countries—and
of the break-up of the Union of Soviet Socialist Republic (USSR) into
independent States. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The political change has shifted the global alliances that even former Warsaw
Pact members (i.e., communist states) became part of the North Atlantic Treaty
Organization. This transformation had left the United States with no
traditional military enemies to engage with. The threat to United States'
national security via conventional warfare or through missile strikes from the
distant European shores has lessened.&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The lowering of guards created false security, which apparently affected the
collection of intelligence data because of the pressure to disband the CIA in
the aftermath of the downfall of communism in Europe. The Democratic Party
leaders called for the abolition of the Central Intelligence Agency (CIA) and
to transfer its foreign intelligence activities to the US Department of State
as well as the CIA’s paramilitary operations to the Pentagon. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span style="mso-no-proof: yes;"&gt;The demise of the USSR and the Warsaw Pact
countries—considered as the “A” list nations in terms of threat to national
security—has caused the United States’ foreign policy on security to shift to
the “B” list nations (e.g., Iraq and North Korea) &amp;nbsp;and to the “C” list
nations (e.g., Bosnia, Somalia).&lt;/span&gt; Accordingly, the immediate attention
given to the “B” list nations is to preempt these countries to fill the void
left by the “A” nations and to counter the proliferations of weapons of mass
destruction. Security experts claimed that, because the focus of the IC
resources in the past decade was shifted to the “B” list nations, the IC had
never seen the emerging threats coming from the Islamic radical groups,
particularly the MAK—the forerunner of AQ network, after the Soviet-Afghan war.
&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
There were estimated 40,000 displaced had-core mujahideens, who came from
various Muslim countries around the world to fight in Afghanistan. &amp;nbsp;With
no more war to win and no more battle to fight, these seasoned fighters went back
to their respective countries and became leaders of terrorist groups in their
localities. For example, the late Abdurajik Abubakar Janjalani, who founded the
notorious Abu Sayaff Group in the Philippines, was a veteran of the
Soviet-Afghan war. Others had surreptitiously relocated to the West and
secretly formed cell groups in Germany, France, and Spain. These developments
were not seen by the IC as a gathering threats to the security of United States
until the 9/11 attacks happened. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Before the 9/11, there were 14 organizations that comprised IC—six from the
civilian sector and eight from the military sector. &lt;span style="mso-no-proof: yes;"&gt;Its mandate came from the Executive Order 12333 (United States
Intelligence Activities), which provides, among others, to “collect information
concerning, and the conduct of activities to protect against, intelligence
activities directed against the United States, international terrorist and
international narcotics activities, and other hostile activities directed
against the United States by foreign powers, organizations, persons, and their
agents.”&lt;/span&gt; &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The US Intelligence Community members were as follows:&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin: 0in 0in 0pt; text-align: justify;"&gt;
&lt;u1:p&gt;&amp;nbsp;&lt;/u1:p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Civilian Sector &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin: 0in 0in 0pt; text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
1. Central Intelligence Agency&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
2. Federal Bureau of Investigation&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
3. US State Department&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
4. Treasury Department&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
5. Energy Department&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
6. Coast Guard&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u1:p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Military Sector&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/u1:p&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="margin: 0in 0in 0pt;"&gt;
&lt;u1:p&gt;&amp;nbsp;&lt;/u1:p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
1. Defense Intelligence Agency&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
2. National Security Agency&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
3. National Reconnaissance Office&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
4. National Imagery and Mapping Agency&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span lang="FR" style="mso-ansi-language: FR;"&gt;5. Army Intelligence&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="FR" style="mso-ansi-language: FR;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6. Navy
Intelligence&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="FR" style="mso-ansi-language: FR;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7. Air
Force Intelligence&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="FR" style="mso-ansi-language: FR;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;8.
Marine Intelligence&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;
&lt;u1:p&gt;&lt;/u1:p&gt;&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkFkgxFI9UDPhb2k2ffxBq0N8CgqF47OKol9z2YQE6TZsBPzZ7siOxgZunJVIT6AcaDu5EHoou2qSVbl7Av9xY_RIi3GZZxmdOBbQ6UorCf5m-__BwmsaD0ezXgRHnaGS7WB8frvxO3xI/s72-c/WTC+Picture.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Agenda Setting: The State-Centric Approach (Creation of the Department of Homeland Security)</title><link>http://josilagan.blogspot.com/2016/01/agenda-setting-state-centric-approach_40.html</link><category>George Tenet</category><category>George W. Bush</category><category>House Permanent Select Committee on Intelligence</category><category>Jane Harman</category><category>Khalid al-Mihdar</category><category>Peter Goss</category><category>Robert Mueller</category><category>Special Agent Kenneth Williams</category><pubDate>Mon, 4 Jan 2016 13:58:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-8424046908551650543</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;

&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLb2G3qjCvo5KmH6di-2caTUkAM9hoxjA8Jm3t3GX8y08GMF8zJsYSS2tKxGku_IaLPHYFJB7F7RE8RrvUAtO9oWaOpxWaQpU2UPnCY4GvSgnYI0gP0iSzs8Ez-Rq_S6v2OshbEKc1IOw/s1600/US+Congress.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="209" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLb2G3qjCvo5KmH6di-2caTUkAM9hoxjA8Jm3t3GX8y08GMF8zJsYSS2tKxGku_IaLPHYFJB7F7RE8RrvUAtO9oWaOpxWaQpU2UPnCY4GvSgnYI0gP0iSzs8Ez-Rq_S6v2OshbEKc1IOw/s320/US+Congress.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: Courier; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace; font-size: xx-small;"&gt;(United States Congress, Photo by Susan Sterner.
Wikimedia Commons)&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Prominent leaders in the US Congress have demanded explanations from President
George W. Bush why the federal government failed to detect, monitor, and negate
the terrorist attacks. The most vocal critic on this issue was New York Sen.
Hillary Rodham Clinton (D) when she told the reporters on May 16, 2002, that
“the public demands answers immediately . . . And the people of New York
deserve those answers more than anyone.” &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The Director of the CIA and the Director of the Federal Bureau of Investigation
(FBI) were not spared from the blame-game either. In the midst of this
political turmoil, the people demanded accountability. There was a public
outcry for the resignations of DCI George Tenet and Director Robert Mueller.
The actions and inactions of their organizations were reflective of the way
they led and managed the CIA and the FBI before the 9/11 attacks. The public
clamor for an explanation of what caused the massive intelligence and security
failure has not only reverberated in the streets of America but also rang in
the halls of US Congress.&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Rep. Peter Goss (R), Chairman of the House Permanent Select Committee on
Intelligence, himself a former CIA Intelligence Officer, said that “over the
years, success in the FBI meant ‘to go out and apprehend criminals’ prosecute
them and ‘get them off the streets’ . . . that approach is still needed but
with terrorism, there is a new element of integrating overseas intelligence to
prevent acts &lt;span style="mso-no-proof: yes;"&gt;inside&lt;/span&gt; the United States.”
Likewise, Rep. Jane Harman (D), a ranking member of the intelligence committee,
said that “the CIA, which by law operates overseas, and FBI, which operates
within the United States, have to rethink their separate roles when it comes to
dealing with terrorism. . . I still see a separate law enforcement and
intelligence function, but if we stop at the border's edge, we may not be
preventing terrorism.” &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The political activists and the Democratic Party leaders demanded that the Bush
Administration be held accountable for the 9/11 tragedies as they happened
under his watch. The Republicans countered that the terrorist plan was hatched
during the time of the Clinton Administration, which had failed to detect and
negate the attack including those that had happened before 9/11. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
On the span of just nine years—from February 26, 1993, in the first bombing of
the World Trade Center, to its second attack on September 11, 2001—the United
States had encountered ten major terrorist hits on US mainland and on US
interests overseas. These attacks have resulted in the total death of 6101
people and injuries to 19,735. The blame game and political mudslinging from
both parties have not produced any positive results to address the problems of
terrorism. On the other hand, the crisis had spotlighted the years of
dysfunctional relationship in the IC, which were then revisited by the members
of the US Congress through the fact-finding commission. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The US Congress noted the professional jealousies in the IC and this harmful
rivalry among the members had hampered the coordination and sharing of
information about the terrorists. Reports gathered by the media, the
revelations of FBI whistleblowers, and the results of the congressional
investigation have concluded that there were operational leads in the hands of
the IC members, and had that information been shared with one another, it could
have been used to negate the AQ network from carrying the attacks. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Moreover, the congressional leaders had also seen the weakness of the FBI in analyzing
and assessing the raw information coming from the field offices. For instance,
Special Agent Kenneth Williams of Phoenix FBI Field Office wrote a five-page
memorandum on July 10, &lt;span style="mso-no-proof: yes;"&gt;2001&lt;/span&gt; about a
possible attack on the United States. His report did not reach the key Bureau
officials. Senator Richard J. Durbin (D), who attended the closed-door
congressional hearing when Williams testified before the Judiciary Committee, &amp;nbsp;learned
that the memorandum did not go up to the chain of command. Durbin commented
that the report was “never treated seriously within the FBI, never circulated,
never analyzed, nor referred to the CIA." &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The responsibility of securing the mainland from terrorist attack is the
primary assignment of the FBI. However, the FBI had no strategic plan to
address the rising danger posed by the Islamist terrorists that time. The
Bureau came up with a draft assessment entitled “FBI Report on the Terrorist
Threat to the United States and a Strategy for Prevention and Response” in
September 2001. The lack of strategic planning on terrorism has clearly
reflected in the Bureau’s organizational behavior towards terrorism. &lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The FBI serves as the federal government’s lead agency in charge to respond,
investigate, and prosecute terrorists. However, it will only pursue the
terrorists after they struck, not while they are still in the planning stage.
As an example, a request to conduct manhunt on AQ operative Khalid al-Mihdar in
the United States was denied by the Bureau heads because the FBI Special Agents
are criminal investigators and not intelligence operators. Al-Mihdar was one of
the terrorists that crashed American Airlines Flight 77 into the Pentagon
building.&lt;u1:p&gt;&lt;/u1:p&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The 9/11 tragedies created a groundswell in the US Congress to review the FBI’s
role as the lead agency that oversee the efforts in counter-terrorism because
its organizational culture and operational thrusts are not suitable for
counter-terrorism. It took the lives of thousands of people for the federal
government to finally admit that there is a need to create an organization that
will focus mainly on countering the threats of terrorism in US mainland. Thus,
after so much discussions and hesitations, the proposal to create a super
organization that is distinct from the FBI and CIA has been proposed to the
members of the US Congress by the Bush Administration. The US Congress, on the
other hand, had its own version of a domestic agency, which was incorporated
later on in the White House’s proposal.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;u1:p&gt;&lt;/u1:p&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin: 0in 0in 0pt;"&gt;
&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,serif; font-size: 12pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;﻿&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLb2G3qjCvo5KmH6di-2caTUkAM9hoxjA8Jm3t3GX8y08GMF8zJsYSS2tKxGku_IaLPHYFJB7F7RE8RrvUAtO9oWaOpxWaQpU2UPnCY4GvSgnYI0gP0iSzs8Ez-Rq_S6v2OshbEKc1IOw/s72-c/US+Congress.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Policy Formulation: The Key Government Players (Creation of the Department of Homeland Security)</title><link>http://josilagan.blogspot.com/2016/01/policy-formulation-key-government_4.html</link><category>Hart-Rudman Commission</category><category>House Armed Services Committee</category><category>National Office for Combating Terrorism</category><category>Office of Homeland Security</category><category>Office of National Drug Control Policy</category><category>S.1534</category><category>Senator Joseph Lieberman</category><pubDate>Mon, 4 Jan 2016 13:50:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-2682803381729224897</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjI1eiCtzaVF7yuWX1C6GedaMJuhMGcDK6f4DtOIIg-xQRKWT0UGoQYF7hkn6aZgzPL2dRrVmthF04RH2hF9PDXQ7Gjhg6V-igXXXiw4_WjxGibnSNO1YMNaE0dHcc269bIKz0w6cTxCM/s1600/President+Bush.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjI1eiCtzaVF7yuWX1C6GedaMJuhMGcDK6f4DtOIIg-xQRKWT0UGoQYF7hkn6aZgzPL2dRrVmthF04RH2hF9PDXQ7Gjhg6V-igXXXiw4_WjxGibnSNO1YMNaE0dHcc269bIKz0w6cTxCM/s320/President+Bush.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace; font-size: xx-small;"&gt;(President Bush Addressing Joint Session of Congress. Photo from Wikimedia Commons)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;!--[if !supportLists]--&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Even
before the 9/11 tragedies, there was already a call for major changes in
governmental structures, &lt;span style="mso-no-proof: yes;"&gt;infrastructures,&lt;/span&gt;
and processes that relate to protecting the homeland from terrorist threats.
During the Clinton Administration, a bipartisan commission known as the US
Commission on National Security for the 21st Century (Hart-Rudman Commission) had
existed to review, among others, the US national security apparatus. The
14-member Commission were headed by former Senators Gary Hart (D) and Warren Rudman
(R). The Commission stated, “The combination of unconventional weapons
proliferation with the persistence of international terrorism will end the
relative invulnerability of the U.S. homeland to catastrophic attack. A direct
attack against American citizens on American soil is likely over the next &lt;span style="mso-no-proof: yes;"&gt;quarter-century&lt;/span&gt;. The risk is not only death and
destruction but also a demoralization that could undermine US global
leadership. In the face of this threat, our nation has no coherent or
integrated governmental structures.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
Commission recommended the creation of a super organization to be called the
National Homeland Security Agency (NHSA) that would be in charge of “planning,
coordinating, and integrating various US government activities involved in
homeland security.” The Commission pointed out that was very important to
consolidate the various organizations in the federal &lt;span style="mso-no-proof: yes;"&gt;government as&lt;/span&gt; the Federal Emergency Management Agency (FEMA), Coast
Guard, Border Patrol and Bureau of Customs to name some. The NHSA, as
envisioned, will be created by &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt;
and will be funded by the body, too. The Commission submitted its final report
to the US &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt; in February 2001. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;On
April 2001, US Representative William Thornberry (R), a member of the House
Armed Services Committee, introduced House Resolution 1158, which called for
the creation of NHSA. The resolution did not gain support &lt;span style="mso-no-proof: yes;"&gt;from&lt;/span&gt; his peers. &lt;span style="mso-no-proof: yes;"&gt;Some&lt;/span&gt;
House Resolutions and Senate Bills were later on submitted to the US &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt; purposely to create a domestic
security agency.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Days
after the terrorist attacks, President Bush, &lt;span style="mso-no-proof: yes;"&gt;in&lt;/span&gt;
his address to a joint session of &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt;
&lt;span style="mso-no-proof: yes;"&gt;on&lt;/span&gt; September 20, 2001, announced the
creation of the Office of Homeland Security (OHS). The OHS is created under the
Presidential Executive Order and function to “coordinate executive branch’s
efforts to detect, prepare for, prevent, protect against, respond to, and
recover from terrorist attacks within the United States.” Bush hand-picked his
personal friend Pennsylvania Governor and former Congressman Tom Ridge to
direct the OHS. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Many
believed the OHS had not met its mission and had not &lt;span style="mso-no-proof: yes;"&gt;operated&lt;/span&gt; freely under its functions because of the way the
organization was designed. Senator Joseph Lieberman (D) said, “This is the most
important responsibility the federal government will have &lt;span style="mso-no-proof: yes;"&gt;in the near future&lt;/span&gt;, and to give Mr. Ridge less
power in this office is just not what the nation needs.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;On
September 21, 2001, Senator Bob Graham (D) introduced S. 1449 that will
establish the National Office for Combating Terrorism (NOCT). It gained seven
co-sponsors, and they were Evan Bayh, Richard Durbin, Barbara Mikulski, Jay
Rockefeller, Dianne Feinstein, Bill Nelson, and Susan Collins. The Bill
proposed that the NOCT be established under the Executive Office of the
President and to be modeled after the Office of National Drug Control Policy
(ONDCP). US Representative Alcee Hastings (D) introduced a counterpart bill in
the House of Representatives under H.R. 3078. Senator Graham and Representative
Hastings reportedly “promoted the findings of the Advisory Panel to Assess
Domestic Response Capabilities for Terrorism Involving Weapons of Mass
Destruction under Gilmore Commission.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Having
seen the weakness of the OHS, Senator Lieberman gained a co-sponsor to
introduce S.1534 which will establish the Department of National Homeland
Security (DNHS). Together with Senator Arlen Specter (R), Senator Lieberman
sent the proposed bill to the US Senate on October 11, 2001, which was read
twice and referred to the Committee on Governmental Affairs. The Bill 1534,
among others, will transfer the authorities, functions, personnel and assets of
several agencies in the federal government that deal with security and disaster
operations. &lt;span style="mso-no-proof: yes;"&gt;The Agencies were affected were the
FEMA, United States Custom Service, Border Patrol of the Immigration and
Naturalization Service (INS), United States Coast Guard, Critical
Infrastructure Office and the Institute for Information Infrastructure
Protection of the Department of Commerce, and both the National Infrastructure
Protection Center and the National Domestic Preparedness Office of the FBI.&lt;/span&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;A
year later, on May 2, 2002, after refining and widening the scope of his
original resolution, Congressman Thornberry joined with Senator Lieberman to
introduce H.R. 4660 and S. 2452 that will establish the Department of National
Homeland Security and the National Office for Combating Terrorism. Thornberry
got 40 co-sponsors and Lieberman got 5 co-sponsors after two Senate amendments
in the proposed bill.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-no-proof: yes;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;On&lt;/span&gt; June 6, 2002, President
Bush appeared &lt;span style="mso-no-proof: yes;"&gt;on&lt;/span&gt; the national TV for a
televised address from the White House to call for the members of the &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt; to create a Cabinet-level Department
of Homeland Security, which was envisioned to be the central agency that will
consolidate the domestic security apparatus against threats of terrorism.
Leaders from both parties accepted the announcement in a &lt;span style="mso-no-proof: yes;"&gt;positive manner&lt;/span&gt; and promised to work a
bipartisan bill to make sure of speedy passage in the US Congress. In response
to the President’s request, Representative Richard Armey (R) introduced H.R.
5005 on June 24, 20002 that will establish the Department of Homeland Security
(DHS), and for other purposes. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjI1eiCtzaVF7yuWX1C6GedaMJuhMGcDK6f4DtOIIg-xQRKWT0UGoQYF7hkn6aZgzPL2dRrVmthF04RH2hF9PDXQ7Gjhg6V-igXXXiw4_WjxGibnSNO1YMNaE0dHcc269bIKz0w6cTxCM/s72-c/President+Bush.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Decision Making: Analyzing the Costs and Benefits (Creation of the Department of Homeland Security)</title><link>http://josilagan.blogspot.com/2016/01/decision-making-analyzing-costs-and_4.html</link><category>1947 National Security Act</category><category>American Civil Liberties Union</category><category>American Federation of Government Employees</category><category>National Security Council</category><category>Senior Executive Association</category><pubDate>Mon, 4 Jan 2016 13:43:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-3743912727377720724</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA6WAAPaISpkWo7AQvZTZVZ0x4LT3Y0JRyZEyaDS9IRDPesjWaaawwH39NIX1m6bLRBf7v3h-dNVqSBohigVhXszqIPprtdf20b_2VPyAiXw4qkQRGxU_v66jPzPEk-bv_oaPrhcx7PHg/s1600/US+CAPITOL.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA6WAAPaISpkWo7AQvZTZVZ0x4LT3Y0JRyZEyaDS9IRDPesjWaaawwH39NIX1m6bLRBf7v3h-dNVqSBohigVhXszqIPprtdf20b_2VPyAiXw4qkQRGxU_v66jPzPEk-bv_oaPrhcx7PHg/s320/US+CAPITOL.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace; font-size: xx-small;"&gt;(US Capitol, Washington DC. Courtesy photo by Andrew Bossi. From Wikimedia Commons)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.5in; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -0.5in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
DHS was established amidst strong challenges and oppositions from union
leaders, political &lt;span style="mso-no-proof: yes;"&gt;activists,&lt;/span&gt; and civil
libertarians and from members of &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt;
themselves. The monetary costs of establishing the DHS became a big issue.
Oppositions said that that Bush Administration has created a “big government”
that added burden to the tax-paying public for the big expenditures. &lt;span style="mso-no-proof: yes;"&gt;Also&lt;/span&gt;, the fear that DHS would infringe the
civil liberties of the citizens were sounded-off by the civil libertarians.
There were trade-offs on the costs and benefits of establishing the DHS, but &lt;span style="mso-no-proof: yes;"&gt;in the end,&lt;/span&gt; the benefits &lt;span style="mso-no-proof: yes;"&gt;of&lt;/span&gt; security to the nation had outweighed the
cost in monetary obligations. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
Bush Administration’s original plan was to have different personnel systems in
the DHS. The plan will allow the Homeland Security Secretary to regulate the
pay schedule, performance measures and termination policies. The American
Federation of Government Employees (AFGA) opposed this as the proposal
accordingly would diminish the rights of the federal employees to form and join
unions. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;However,
the Senior Executive Association (SEA) supported the President on the ground
that “the organizational challenges inherent in creating this new Department
and the importance of its mission to all Americans necessitate maintaining
current Presidential authority related to national security exclusions from
collective bargaining.” Because of the controversy on the civil service issue
the legislative proposal has created and the fear that the legislative proposal
would be stranded in the Senate, the Republican House leaders Dick Armey and
Rep. Rob Portman modified the H.R. 5005 to include the traditional rights of
the employees.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
American Civil Liberties Union was very vocal against the establishment of DHS
because of the fear that it would operate in secrecy and with no public
accountability. On their press release on June 25, &lt;span style="mso-no-proof: yes;"&gt;2002,&lt;/span&gt; ACLU legislative counsel Timothy Edgar said, “If you like the
idea of a government agency that is 100 percent secret and 0 percent
accountable, you'll love the new Homeland Security Department . . . The
Administration's plan exempts the new agency from a host of laws designed to
keep the &lt;span style="mso-no-proof: yes;"&gt;government&lt;/span&gt; open and accountable
and to protect whistleblowers." &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;One
of the &lt;span style="mso-no-proof: yes;"&gt;oppositions&lt;/span&gt; to H.R. 5005 is
Congressman Ron &lt;span style="mso-no-proof: yes;"&gt;Paul,&lt;/span&gt; who said, “Congress
was led to believe that the legislation would be a simple reorganization aimed
at increasing efficiency, not an attempt to expand federal power. Fiscally
conservative members of Congress were even told that the bill would be budget
neutral! Yet, when the House of Representatives initially considered creating a
Department of Homeland Security, the legislative vehicle almost overnight grew
from 32 pages to 282 pages- and the cost had ballooned to at least $3 billion.”
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-no-proof: yes;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Moreover, some Democratic Party
leaders like Senator Tom Daschle opposed certain provisions of the bill.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;He was against giving the pharmaceutical
companies who make vaccines the protection from liability.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;He did not like the creation of a research
center in the Texas A&amp;amp;M University for Homeland Security programs. He also
contested the holding of secret meetings by the advisory committee that will
favor the corporate lobbyists and the protection from liability of the
companies who make anti-terror technologies or products.&lt;/span&gt; The Democrats
found a supporter in Senator John McCain (R). The opponents to the provisions
contend that the Bush administration had politicized the establishment of the
DHS by catering to the interests of the special groups.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
consolidation of other government agencies into the Homeland Security was not
met favorably by congressmen in charge of the committees that supervise the affected
offices. The agency-transfer would mean losing oversight, influence, and
budgetary control. Because the &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt;
has the control on the budget of &lt;span style="mso-no-proof: yes;"&gt;Homeland&lt;/span&gt;
Security, it was not surprising that the establishment of DHS fell &lt;span style="mso-no-proof: yes;"&gt;to&lt;/span&gt; the whims and caprices of congressmen who
worried more &lt;span style="mso-no-proof: yes;"&gt;about&lt;/span&gt; losing their &lt;span style="mso-no-proof: yes;"&gt;clout&lt;/span&gt; over their committees than the threats
the terrorists posed to the nation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
process of identifying the costs of establishing the DHS and the benefits
coming from its existence were debated passionately throughout the
deliberations in &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt; and in the
public hearings by the committee. The &lt;span style="mso-no-proof: yes;"&gt;positive
angles, as well as the negative sides of establishing a central domestic
anti-terror agency outside the FBI,&lt;/span&gt; was seriously studied. &lt;span style="mso-no-proof: yes;"&gt;In&lt;/span&gt; the end, the benefits DHS will provide to
the nation outweighed the monetary costs and complexities of consolidating
other federal agencies into one organization. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;H.R.
5005, which had 118 co-sponsors, was passed in the House of Representatives by
a YES vote of 295 and &lt;span style="mso-no-proof: yes;"&gt;a NO&lt;/span&gt; vote of 132.
H.R. 5005 was received in the Senate on July 30, &lt;span style="mso-no-proof: yes;"&gt;2002,&lt;/span&gt; and was passed with an &lt;span style="mso-no-proof: yes;"&gt;amendment&lt;/span&gt;
by a YES vote of 90 to a No vote of 9 on November 19, 2002. The H.R. 5005 was
subjected to 409 amendments in the House and the Senate floors, and finally on
November 25, 2002, H.R. 5005 was signed by President Bush. H.R. 5005, otherwise
known as the Homeland Security Act of 2002, had paved the way for the largest
reorganization of the federal government since the passage of the 1947 National
Security Act that created the Department of Defense, the National Security
Council, and the Central Intelligence Agency. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA6WAAPaISpkWo7AQvZTZVZ0x4LT3Y0JRyZEyaDS9IRDPesjWaaawwH39NIX1m6bLRBf7v3h-dNVqSBohigVhXszqIPprtdf20b_2VPyAiXw4qkQRGxU_v66jPzPEk-bv_oaPrhcx7PHg/s72-c/US+CAPITOL.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Implementation Stage: Integration of Government Agencies (Creation of the Department of Homenad Security)</title><link>http://josilagan.blogspot.com/2016/01/implementation-stage-integration-of_4.html</link><category>CBRN Countermeasures Programs</category><category>Critical Infrastructure Assurance Office</category><category>Federal Protective Service</category><category>Homeland Security Act of 2002</category><category>National Infrastructure Protection Center</category><pubDate>Mon, 4 Jan 2016 13:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-1348173662477016360</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE7MVsXnE3aTO0_-ADe5mjV8zXPxkra850XjZZRIce1qpvOjzvWnITujMXKK3TW1GzHYg2SCjCjt1EQMikOTAi3tMvdtb_Zuduuww4jrqzuZTuzb4kull8xlmAMw3DtTLh0Qg0nv9uz44/s1600/Border+Patrol.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE7MVsXnE3aTO0_-ADe5mjV8zXPxkra850XjZZRIce1qpvOjzvWnITujMXKK3TW1GzHYg2SCjCjt1EQMikOTAi3tMvdtb_Zuduuww4jrqzuZTuzb4kull8xlmAMw3DtTLh0Qg0nv9uz44/s320/Border+Patrol.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace;"&gt;(US Customs and Border Protection, from Wikimedia Commons)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;After
President Bush had signed the Homeland Security Act of 2002, the H.R. 5005
became Public Law no. 107-296. After the policy formulation has transpired, the
policy implementation came next. Peters said, “ Once a piece of legislation or
a regulation has been accepted as a legitimate public law, in some ways the
easiest portion of the policymaking process has already transpired, for
government must then put the legislation into effect.” The effect of the
legislation established the DHS, which created the newest and second largest
executive department second to the size of Department of Defense. The policy of
the government on anti-terrorism has now been implemented through the DHS. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
DHS is consists of four line directorates, which are the Border and
Transportation Security (BTS), Emergency Preparedness and Response (EPR),
Science and Technology (ST), and the Information Analysis and Infrastructure
Protection (IAIP). The US Secret Service and the US Coast Guard &lt;span style="mso-no-proof: yes;"&gt;remained&lt;/span&gt; intact and report directly to the DHS
while the INS Adjudications and Benefits Program reports directly to the Deputy
Secretary. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-no-proof: yes;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The BTS is composed of the US
Customs Service (Treasury), The Immigration and Naturalization Service (part)
(Justice), The Federal Protective Service, Transportation Security
Administration (Transportation), Federal Law Enforcement Training Center
(Treasury), Animal and Plant Health Inspection Service (part)Agriculture), and
the Office for Domestic Preparedness (Justice).&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
EPR is comprised of the Federal Emergency Management Agency (FEMA), Strategic
National Stockpile and the National Disaster Medical System (HHS), Nuclear
Incident Response Team (Energy), Domestic Emergency Support Teams (Justice) and
the National Domestic Preparedness Office (FBI).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
ST directorate includes the CBRN Countermeasures Programs (Energy),
Environmental Measurements Laboratory (Energy), National BW Defense Analysis
Center (Defense), and the Plum Island Animal Disease Center (Agriculture).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Lastly,
the IAIP was formed from Critical Infrastructure Assurance Office (Commerce),
Federal Computer Incident Response Center (GSA), National Communications System
(Defense), National Infrastructure Protection Center (FBI) and the Energy
Security and Assurance Program (Energy).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE7MVsXnE3aTO0_-ADe5mjV8zXPxkra850XjZZRIce1qpvOjzvWnITujMXKK3TW1GzHYg2SCjCjt1EQMikOTAi3tMvdtb_Zuduuww4jrqzuZTuzb4kull8xlmAMw3DtTLh0Qg0nv9uz44/s72-c/Border+Patrol.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Evaluation Process: Performance Measures and Goals (Creation of the Department of Homeland Security)</title><link>http://josilagan.blogspot.com/2016/01/evaluation-process-performance-measures.html</link><category>Department of Homeland Security</category><category>Emergency Medical Services</category><category>Gilmore Commission</category><category>Government Performance and Results Act of 1993</category><pubDate>Mon, 4 Jan 2016 13:16:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-7790152601613040872</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
&lt;o:p&gt;&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim44ewT_dZTtNI2X46EdnTqyu2M8JQf13bIBvckKeOFOBUh-m1Czh-UX5p0aYnNqxCnLaXJoOtNJJEzoZoYExjy6rWZgR1qKS3B67UmkzNbCsd4VztLyk5K574HB0jTcKtmOlTBV8mMo4/s1600/FDNY+Firefighter.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim44ewT_dZTtNI2X46EdnTqyu2M8JQf13bIBvckKeOFOBUh-m1Czh-UX5p0aYnNqxCnLaXJoOtNJJEzoZoYExjy6rWZgR1qKS3B67UmkzNbCsd4VztLyk5K574HB0jTcKtmOlTBV8mMo4/s1600/FDNY+Firefighter.jpg" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;(&lt;span style="font-family: &amp;quot;Courier New&amp;quot;, Courier, monospace; font-size: xx-small;"&gt;FDNY Firefighter on Ground Zero. Photo by Preston Keres, USN. Wikimedia Commons.)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Peters
said, “The first step in evaluation is to identify the goals of the program,
but even this seemingly simple task &lt;span style="mso-no-proof: yes;"&gt;may be&lt;/span&gt;
difficult, if not impossible.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
DHS has set of strategic goals that are defined by the words: Awareness,
Prevention, Protection, Response, Recovery, Service, and Organizational
Excellence. The goals are clearly stated publicly and the next step was laying
out performance measure to evaluate the goals. Federal agencies are mandated by
law under the Government Performance and Results Act of 1993 (GPRA) to set
goals, measure performance, and report their accomplishments. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;On
a report to President Bush and the Congress, the Gilmore Commission said, “the
United States needs an improved homeland security strategy to strengthen
security communities facing the greatest risk, improve the use of intelligence,
increase the role of the state and local officials, and sharpen disaster
response c&lt;span style="mso-no-proof: yes;"&gt;apabilities&lt;/span&gt;.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
Clinton and Bush Administrations had enacted 87 percent of the recommendations
of the Gilmore &lt;span style="mso-no-proof: yes;"&gt;Commission&lt;/span&gt; on security
related matters. The Gilmore Commission was headed by former Virginia Gov.
James S. Gilmore III. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-no-proof: yes;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The important recommendations of the
Commission are as follows, “Combine all departmental grant making programs into
a single entity in DHS; establish an interagency mechanism for homeland
security grants, revise the homeland advisory system to include a regional
alert system, training to emergency responders about preventive actions, and
specific guidance to potentially affected regions; establish sustained funding
to enhance EMS response capacity for acts of terrorism; and establish
comprehensive procedures for sharing information with relevant state and local
officials”&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim44ewT_dZTtNI2X46EdnTqyu2M8JQf13bIBvckKeOFOBUh-m1Czh-UX5p0aYnNqxCnLaXJoOtNJJEzoZoYExjy6rWZgR1qKS3B67UmkzNbCsd4VztLyk5K574HB0jTcKtmOlTBV8mMo4/s72-c/FDNY+Firefighter.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Conclusion: The Policy Choice, Output, and Effect (Creation of the Department of Homeland Security)</title><link>http://josilagan.blogspot.com/2016/01/public-policy-process-creation-of.html</link><category>Bush Administration</category><category>civil libertarians</category><category>congressional leaders</category><category>H.R. 5005</category><category>political think-tanks</category><pubDate>Mon, 4 Jan 2016 11:48:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-4917789128471923680</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELhhJxY5RFJaUAtwv2qKOcY1XnT2PyZLNReEPe3DmC4VfEqWYbsO_y9IrurUTOC3uxa_2M07YgXX1ihYGR75Nek-3RVjtDhf8eFVR6CQVxv_87R9EReoO6cQALma0PXZRVy5beRHc448/s1600/DHS+LOGO.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELhhJxY5RFJaUAtwv2qKOcY1XnT2PyZLNReEPe3DmC4VfEqWYbsO_y9IrurUTOC3uxa_2M07YgXX1ihYGR75Nek-3RVjtDhf8eFVR6CQVxv_87R9EReoO6cQALma0PXZRVy5beRHc448/s1600/DHS+LOGO.png" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace; font-size: xx-small;"&gt;(DHS Coat of Arms, from Wikimedia Commons)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
creation of DHS was an avowed public-policy statement of the federal
government in protecting and securing the homeland. It was the pro-active approach of the Bush
Administration on its domestic policy on terrorism. DHS carries all of the &lt;span style="mso-no-proof: yes;"&gt;government’s&lt;/span&gt; anti-terrorism activities and programs.
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;DHS was a product of the policy choice of the elected officials,
and their policy output had resulted &lt;span style="mso-no-proof: yes;"&gt;into&lt;/span&gt;
the creation of the Department. On the other hand, the policy impact was the
effect of both the policy choice and policy output,
which is to protect and secure the homeland from another terrorist attacks. The process of
establishing the DHS went through five stages&amp;nbsp;and
these are the: agenda setting, policy formulation, &lt;span style="mso-no-proof: yes;"&gt;decision-making&lt;/span&gt;,
&lt;span style="mso-no-proof: yes;"&gt;implementation stage,&lt;/span&gt; and evaluation phase. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-no-proof: yes;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;To&lt;/span&gt; legitimize the policy
choice of the Bush Administration, the legislative proposal H.R. 5005 was
submitted to the &lt;span style="mso-no-proof: yes;"&gt;Congress&lt;/span&gt; for enactment
into law. The choice to confront the terrorists through a new government agency
was not a result of an &lt;span style="mso-no-proof: yes;"&gt;outburst&lt;/span&gt; of
emotion over the tragic incidents of 9/11, rather, the choice to establish the
DHS was the outcome of careful studies and recommendations made by congressional
leaders, commissions, political think-tanks and by the Bush Administration.
There were also insights and suggestions from the civil libertarians, union
organizations and even from officials of the affected government offices. All
were taken and reviewed for considerations during the &lt;span style="mso-no-proof: yes;"&gt;public&lt;/span&gt; hearing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
policy output was the result of the policy choice made by the federal government.
Quoting &lt;span style="mso-no-proof: yes;"&gt;Peters&lt;/span&gt; again, he said, “Policy
outputs are policy choices being put into action.” The choice to confront
head-on the threats from homegrown and transnational terrorist groups had resulted &lt;span style="mso-no-proof: yes;"&gt;in&lt;/span&gt;
the formulation of counter-terrorism programs that will prepare,&amp;nbsp;prevent,
and respond to terrorist attacks. This policy output had resulted &lt;span style="mso-no-proof: yes;"&gt;in&lt;/span&gt; the consolidation of 180,000 federal
employees from around 50 agencies who are involved in homeland-security efforts.
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Policy
output also means policy action of the government on anti-terrorism, such as the
development and training of the DHS personnel on techniques in covert
operations, improvement of the technological &lt;span style="mso-no-proof: yes;"&gt;equipment&lt;/span&gt;
in the field to monitor the activities of target personalities, and to maintain
active coordination with the IC members.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
policy effects--intended results of policy choice and policy output--have
 been the protection of the people from terrorist attacks and
the apprehension of the terrorists operating inside the &lt;span style="mso-no-proof: yes;"&gt;United States&lt;/span&gt;.&amp;nbsp;Moreover,
according to &lt;span style="mso-no-proof: yes;"&gt;Peters,&lt;/span&gt; “the policy effects
may be influenced by the success and failures of the policy choice and policy
output.” &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DHS cannot win the fight on terrorism alone. The support
and guidance of the originators of the policy (i.e., Bush Administration and
the US Congress), were important ingredients in the success of its
anti-terrorism programs. The homeland-security managers are given the important
tasks of running the second biggest department in the federal government and the
expectation for them to lead the agency in combating the
terrorists has never been so great.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
REFERENCES&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
CDI Terrorism &lt;span style="mso-no-proof: yes;"&gt;Project,&lt;/span&gt;
Chronology of Major Terrorist Attacks Against U.S. Targets, Retrieved 10 May
2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Intelligence Reforms 1900s, CIA Specific Reforms
Proposal. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
How Will the Post Cold-War Era End? Background
Observations for Session on "Defense Against External Enemies"
Visions of Governance for the Twenty-First Century, by Bretton Woods and Ashton
B. Carter, July 20-23, 1997 &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Executive Order 12333 – United States
Intelligence Activities, Federal Register, &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Carl Limbacher, Hillary Demands “Immediate”
answers on Bush 9-11 Heads-Up, Newsmax Retrieved May 16, 2002&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
St. Petersburg Times On-Line, “Goss: FBI Not
Capable of Preventing Terrorism,” St. Petersburg Times, Retrieved May 27, 2002 &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
CDI Terrorism Project, Chronology of Major
Terrorist Attacks Against U.S. Targets, &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Phil Brennan, “We could have prevented 9-11,
Congressional Intelligence Chairman &lt;span style="mso-no-proof: yes;"&gt;Says.”&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Don Van Natta Jr., and David Johnston, “Anti-U.S.
Views at Pilot Training School Prompted Agent’s Alert”, The New York Times, May
22, 2002&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Ibid.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Pearce, Jean. The ACLU’s War on Homeland
Security, FrontPageMagazine.Com, 11 June 2003, Retrieved 11 May 24&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
US Department of State, International Information
Programs, Washington File, Executive Summary of US Commission on National
Security Report, 31 January 2001, Retrieved 11 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Executive Summary of US Commission on National
Security Report, US Department of State&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
New Bill Aims to Create Homeland Defense Agency,
National Guards Association of United States, Retrieved April 2001&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Executive Order Establishing Office of Homeland
Security and the Homeland Security Council, Retrieved 08 October 2001&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Daalder, Ivo H, and Destler I.M., Organizing for
Homeland Security, Statement Before the Committee on Governmental Affairs,
United States Senate, Retrieved 12 October 2001&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
S. 1449, Bill Summary &amp;amp; Status for the 107th
Congress, Retrieved 13 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Scardaville, Michael, Principles of Creating an
Effective U.S. Department of Homeland Security, The Heritage Foundation, 12
June 2002, &lt;span style="mso-no-proof: yes;"&gt;Retrieved&lt;/span&gt; 18 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
S.1534 (To Establish the Department of &lt;span style="mso-no-proof: yes;"&gt;National&lt;/span&gt; Homeland Security) 107th Congress, 1st
Session, October &lt;span style="mso-no-proof: yes;"&gt;11, 2001&lt;/span&gt;, Retrieved 12
May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
King, John, Wallace, Kelly, and Meserve, Jeanne,
Bush Wants broad ‘Homeland Security’ overhaul, CCN.com, 7 June 2002, Retrieved
18 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Mescolotto, Andrew N., SEA States Opposition to
Nelson, Breaux, Chafee Amendment, Retrieved 26 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
ACLU Says Homeland Security Department Long on
Secrecy, Short on Needed Accountability, ACLU Press Release, June 25, 2002,
Retrieved 13 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Congressman Ron Paul, 13 November 2002, U.S.
House of Representatives, Retrieved 19 May 2002&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Loughlin, Sean, Democrats question items in
Homeland bill, CNN Website, 18 November 2002, Retrieved 14 may 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Bill Summary &amp;amp; Status for the 107th Congress&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
King, John, Wallace, Kelly, and Meserve, Jeanne,
Bush Wants broad ‘Homeland Security’ overhaul, CCN.com, 7 June 2002, Retrieved
18 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Peters, Guy, B., American Public Policy (Promise
and Performance), CQ Press: Washington DC, 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
DHS Organization, Who Will be Part of the New
Department?&lt;span style="mso-no-proof: yes;"&gt;,&lt;/span&gt; Department Of Homeland
Security, Retrieved 18 May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Peters, p.168&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
The DHS Strategic Plan – Securing our Homeland. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Government Performance and Results Act of 1993&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Bennet, Jeremy, 18 Dec 2003, Gilmore Commission
Releases Final Report on Homeland Security, Government Technology, Retrieved 12
May 2004&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Peters, p4.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Peters, p.5&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELhhJxY5RFJaUAtwv2qKOcY1XnT2PyZLNReEPe3DmC4VfEqWYbsO_y9IrurUTOC3uxa_2M07YgXX1ihYGR75Nek-3RVjtDhf8eFVR6CQVxv_87R9EReoO6cQALma0PXZRVy5beRHc448/s72-c/DHS+LOGO.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>A Basic Study of Threat and Threat Groups</title><link>http://josilagan.blogspot.com/2015/12/a-basic-study-of-threat-and-threat.html</link><category>Abu Nidal Organization</category><category>Black September</category><category>Carlos the Jackal</category><category>CIA</category><category>Counter-Terror</category><category>FBI</category><category>ISIS</category><category>Paris Massacre</category><category>San Bernardino Carnage</category><category>Types of Terrorism</category><pubDate>Sat, 5 Dec 2015 23:18:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-5646216458366512033</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiWGQqairixwuhM_wcV0mATOpBZWpljmHIwfMM5uHiYBHMV67uL62Cc89f_Lio6V6q9AXSNp4ZmpsYknbJJAgpGlENpyBv1w3ZlqrTiuhu7w9TST6k8_7wsn31J07wTph8EONFk_96zg/s1600/Eifel+Tower.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiWGQqairixwuhM_wcV0mATOpBZWpljmHIwfMM5uHiYBHMV67uL62Cc89f_Lio6V6q9AXSNp4ZmpsYknbJJAgpGlENpyBv1w3ZlqrTiuhu7w9TST6k8_7wsn31J07wTph8EONFk_96zg/s400/Eifel+Tower.jpg" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;(Eifel Tower after the Paris Massacre. Courtesy of XtoF, Wikemedia Commons)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;Let me ask you this—do you know anything about the Abu Nidal Organization, the Black September, the Baader-Meinhoff Gang, and the Venezuelan-born Illich Ramirez Sanchez aka Carlos the Jackal? If you answered "Yes" to this question, I would think then that you are from the old generation. &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;If you recalled the intermittent campaigns of terror in Europe and in the Middle East in the 1960s and the 1970s, &lt;span&gt;&amp;nbsp;&lt;/span&gt;you would surely agree the al-Qaeda attacks in the World Trade Centers and the Pentagon Building were unprecedented in the annals of terrorism compared to the pre-9/11 era.&lt;/span&gt;&amp;nbsp;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Now, if you answered "No" to the above question, I would assume that you are&amp;nbsp;from the 1980s,&amp;nbsp; 1990s or from the early 2000s.&amp;nbsp;&lt;/span&gt;&lt;span&gt;You—from the younger generations—who have a slightest idea about terrorism, have now become aware of the horrible consequences of ideological extremism&amp;nbsp;gone berserk after&amp;nbsp; the Paris Massacre&amp;nbsp;and the&amp;nbsp;San Bernardino Carnage. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;In light of the recent terror activities in France and the United States, those who seek to understand the intricacies of threats and threat groups would find this topic informative because this article discusses the various types of terrorism. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Terrorism is a relative term, as other people would say. We heard so much about the truism “One man’s terrorist is another man’s freedom fighter.” People in the &lt;span&gt;United States&lt;/span&gt; might condemn Usama bin-Laden as a terrorist, but to some people in the Muslim world, he was glorified like a hero ala Che Guevarra. (Regan 2005). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Robert S. Barbers defined terrorism as a “cause, attempt, or threat of destruction of properties or death by showing terror to the public, disturbing peace and order internationally or domestically due to ideological, political, religious, ethnic or cultural belief.” (Barbers 2004). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The Federal Bureau of Investigation defined terrorism as “a violent act or an act dangerous to human life, in violation of the criminal laws of the United States or of any state, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social goals.”&lt;/span&gt; (Cooper 1995). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Another definition of terrorism is “the use of covert violence by a group for political ends and is usually directed against a government, but is also used against other ethnic groups, classes or parties. The aims and objectives may vary from the redress of specific grievances to the overthrow of a government and the seizure of power, or to the liberation of a country from foreign rule.” (Lacquer 1977). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The definitions of terrorism entail conceptual and syntactical. It is not surprising that alternative concepts with more positive connotations—guerrilla movements, underground movements, national liberation movements, &lt;span&gt;commandos—are &lt;/span&gt;often used to describe and characterize the activities of terrorist organizations, &lt;span&gt;thus establishing their activities on a more positive and legitimate foundations.&lt;/span&gt; (Ganor 2005). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;In the past decades, numerous terror groups came &lt;span&gt;into existence&lt;/span&gt; to advance their struggle either for economic, political, or religious battles. Security experts have categorized these groups into six major types, namely: the nationalist-terrorism, state-sponsored terrorism, left-wing terrorism, r&lt;span&gt;ight-wing&lt;/span&gt; terrorism, anarchist-terrorism, and &lt;span&gt;religious-terrorism&lt;/span&gt;. (CFR 2004). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;1.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span&gt;Nationalist-Terrorism&lt;/span&gt; is a “form of terrorism through, which participants attempt to form an independent state against what they consider an occupying, imperial, or otherwise illegitimate state.” (Wikepedia 2005). The nationalist-terrorists are individuals who resort to terrorism as a means of achieving independence from foreign control. These groups &lt;span&gt;include&lt;/span&gt; the Basque Separatists-ETA (Euskadi &lt;span&gt;ta&lt;/span&gt; Askatasuna), which fought for independence from Spain; the Irish Republican &lt;span&gt;Army, which &lt;/span&gt;fought against the British &lt;span&gt;rule;&lt;/span&gt; and the Kurdistan Worker’s &lt;span&gt;Party,&lt;/span&gt; which wages war against the Turkish government.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;2.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;State-Sponsored-Terrorism refers to foreign government providing “supplies, &lt;span&gt;training and&lt;/span&gt; other forms of support to non-state terrorist organizations. One of the most valuable types of this support is the provision of &lt;span&gt;safe haven&lt;/span&gt; or physical basing for the terrorists' organization.” (Terrorism-Research 2005). The groups belonging to the state-sponsored terrorism are the Japanese Red Army, which was once financed by Libya; and the ANO, which was once bankrolled by Saddam Hussein before his defeat in Operation Iraqi Freedom. (U.S. Department of State 2004). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;3.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Left-Wing Terrorism “seeks to destroy capitalism and replace it with socialism or anarchism. Extreme cases of radical environmentalism verge on ecoterrorism, which is pushed primarily by left-wing radicals” (Wikepedia 2005). The BMG and the Brigada Rossi (Red Brigade) are examples of groups associated with left-wing terrorism. The Communist Party of the Philippines/New Peoples Army (CPP/NPA) falls under this category also and has been fighting for the eradication of the capitalist society of the Philippines since 1969. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;4.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Right-Wing Terrorism, also called as neo-fascist terrorism, is known for their “reactionary violence to what &lt;span&gt;is seen&lt;/span&gt; as perceived threats to a group's value system. Right-wing terrorist ideology tends to be a belief in a religious, political, &lt;span&gt;or ethnonational&lt;/span&gt; &lt;span&gt;superiority&lt;/span&gt; while &lt;span&gt;often&lt;/span&gt; supporting the status quo” (Wikepedia&amp;nbsp;2005). The Ku Klux Klan, the South Africa’s Warriors of the Boer Nation, and Russia’s &lt;span&gt;Skiff&lt;/span&gt; are groups that engage in right-wing terrorism. &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;5.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Anarchist-Terrorism has originated in the late 1800s, and through the years &lt;span&gt;has developed&lt;/span&gt; into a different philosophical idea. Anarchism “in its most general meaning, is the belief that the rulership is unnecessary and should &lt;span&gt;be abolished&lt;/span&gt;. The word anarchy, as most anarchists use it, does not imply chaos or anomie, but rather a stateless society with &lt;span&gt;voluntary social&lt;/span&gt; harmony” (Wikepedia 2005). Through the years, the real meaning of &lt;span&gt;anarchist-terrorism&lt;/span&gt; has &lt;span&gt;changed,&lt;/span&gt; and its definition evolved into something new that now carries a violent connotation.&amp;nbsp;The present-time anarchists &lt;span&gt;are identified&lt;/span&gt; with violent demonstrations &lt;span&gt;and they have&lt;span&gt;&amp;nbsp;&lt;/span&gt;been&lt;/span&gt; constant protesters in the World Trade Organization meetings. Anarchists &lt;span&gt;co-exist &lt;/span&gt;&lt;span&gt;with&lt;/span&gt; eco-terrorists, and eco-terrorism is a neologism from anarchist-terrorism.&amp;nbsp;Some&amp;nbsp;&amp;nbsp;of&amp;nbsp;the anarchist-inspired groups are the Animal Rights Militia&amp;nbsp;&lt;span&gt;and also&amp;nbsp; t&lt;/span&gt;&lt;span&gt;he&amp;nbsp;&lt;/span&gt;Green&amp;nbsp;Anarchists, which was formerly&amp;nbsp;known&amp;nbsp;as the Earth&amp;nbsp;Liberation&amp;nbsp;Front&amp;nbsp;(ELF).&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="margin-left: 0.75in; text-align: justify; text-indent: -0.25in;"&gt;
&lt;!--[if !supportLists]--&gt;&lt;span&gt;6.&lt;span style="font: 7pt &amp;quot;times new roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;Religious-Terrorists “use violence &lt;span&gt;to further what they see&lt;/span&gt; as divinely commanded purpose.” (Wikepedia 2005). The Lebanese Shiite group Hezbollah, the doomsday cult Aum Shinrikyo of Japan, the al-Qaeda (AQ) network and its affiliates, Jemaah Islamiyah (JI), the Abu Sayyaf &lt;span&gt;Group,&lt;/span&gt; and &lt;span&gt;the Islamic State of Iraq and Syria (ISIS) are&lt;/span&gt; examples of organizations engage in &lt;span&gt;religious-terrorism&lt;/span&gt;. The suicidal mindset of the &lt;span&gt;religious-terrorists&lt;/span&gt; &lt;span&gt;deepens&lt;/span&gt; the degree of concern of their existence because of their religious adherence to &lt;i&gt;jihad&lt;/i&gt; (holy war). Their willingness to die for their cause make them dangerous as exemplified by the suicidal operations of al-Qaeda on 9/11 &lt;span&gt;and of ISIS attacks in Paris and San Bernardino.&lt;/span&gt; The heavenly rewards—72 virgins and 80,000 servants—are incentives to the Islamist recruits to engage in martyrdom. (Warraq 2002). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;In recent years, there was a gradual and steady shift of mode of attacks from conventional to a more sophisticated form of terrorism using biological and chemical weapons. For instance, the &lt;span&gt;religious-terrorist&lt;/span&gt; group Aum Shinrikyo used a chemical &lt;span&gt;weapon-like&lt;/span&gt; Sarin (deadly nerve agent) and Botulin Toxin in the 1990s to spread terror in Japan. (Olson 1999). Security experts consider &lt;span&gt;religious-terrorism&lt;/span&gt; as the most dangerous kind compared to the other types of terrorism because the religious members are the ones most likely to procure or develop weapons of mass destruction and use them in pursuit of their messianic or apocalyptic visions. (Hudson 1999). Associated Press reports indicated that ISIS has a branch dedicated to creating chemical weapons. (AP 2015). &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The modern day terrorists are no longer confined &lt;span&gt;in&lt;/span&gt; one geographical area as exemplified by the operations of JI and AQ networks in the Philippines, Indonesia, Malaysia, &lt;span&gt;Singapore,&lt;/span&gt; and Thailand. (CFR 2004). Past terrorist events suggest that the AQ network is also active in Europe, Africa, and the &lt;span&gt;Middle East&lt;/span&gt;. For instance, The bombings in London on July 7, &lt;span&gt;2005, has&lt;/span&gt; confirmed the overseas infrastructure of AQ network in Europe, which was reported supervised by one Mustafa Setmariam Nasar, a British national of Syrian-descent. (Fielding and Walsh 2005). JI, AQ, and ISIS &lt;span&gt;are transnational terrorists&lt;/span&gt;, which means, “involving or operating in several nations or nationalities.” (WordNet 2.0 2005). &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;After the 9/11 attacks, the emergence of &lt;span&gt;transnational-terrorists&lt;/span&gt; and the imminent danger they present to global security did not escape the attention of the United Nations (UN). On its proactive stance, the UN prodded its members under the UN Security Council Resolutions 1368 and 1378 to work closely with one another in the global war on terror. The call to form security alliances was answered favorably by the democratic nations around the world as they looked up to the &lt;span&gt;United States&lt;/span&gt; for &lt;span&gt;leadership.&amp;nbsp;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="margin: 0in 0in 8pt; text-align: justify;"&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqiWGQqairixwuhM_wcV0mATOpBZWpljmHIwfMM5uHiYBHMV67uL62Cc89f_Lio6V6q9AXSNp4ZmpsYknbJJAgpGlENpyBv1w3ZlqrTiuhu7w9TST6k8_7wsn31J07wTph8EONFk_96zg/s72-c/Eifel+Tower.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Post Paris Attacks: Countering Terrorism from the Intelligence Production Side</title><link>http://josilagan.blogspot.com/2015/11/post-paris-attacks-countering-terrorism.html</link><category>al-Qaeda</category><category>Critical Analysis</category><category>Homeland Security</category><category>Intelligence Analysis</category><category>ISIS</category><category>Terrorism</category><category>USIC</category><pubDate>Sat, 28 Nov 2015 20:42:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-6466755912801435777</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiXQX6EsoKEy0tVNfJs2A_QF3Oib7sHvecTajTzdt9Si9nJxy3KvsKFPHMKUH8tITCf8dIjyQc9klyrIo5GkZb4NnPzqTU3F72DAHIDABIpP_P_R2R3jvk54bYlPAMHMUGiHdPgPPHPpM/s1600/Dynazoom.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiXQX6EsoKEy0tVNfJs2A_QF3Oib7sHvecTajTzdt9Si9nJxy3KvsKFPHMKUH8tITCf8dIjyQc9klyrIo5GkZb4NnPzqTU3F72DAHIDABIpP_P_R2R3jvk54bYlPAMHMUGiHdPgPPHPpM/s320/Dynazoom.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: 10px;"&gt;&lt;span style="font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , serif;"&gt;(A Dynazoom, circa 1960s-1970s.&amp;nbsp; Used by the CIA intelligence analysts &lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 10px;"&gt;&lt;span style="font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , serif;"&gt;for viewing of satellite and aircraft films. Wikimedia Commons.)&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;

&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: 15.6pt; margin: 0in 0in 0pt; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;On July
10, 2001, FBI Special Agent Kenneth Williams of Arizona Field Office wrote a
five-page memorandum about a possible attack &lt;span style="mso-no-proof: yes;"&gt;on&lt;/span&gt;
the United States by Middle Eastern students enrolled in flight schools in the
country.&amp;nbsp; (Van Natta Jr. and Johnston 2002).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Williams reportedly came up &lt;span style="mso-no-proof: yes;"&gt;to&lt;/span&gt; this
conclusion after interviewing some Arab students who had&amp;nbsp;expressed great
animosity towards the United States.&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Senator Richard J. Durbin &lt;span style="mso-no-proof: yes;"&gt;(D),&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;after&lt;/span&gt; the closed-door congressional
hearing where Williams testified before the Judiciary &lt;span style="mso-no-proof: yes;"&gt;Committee,&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;was&lt;/span&gt; &lt;span style="mso-no-proof: yes;"&gt;surprised&lt;/span&gt; when he learned that the memo did not
go up to the Bureau's chain of command&amp;nbsp;and&amp;nbsp;&amp;nbsp;was “never treated
seriously, never circulated, never analyzed, nor referred to the CIA.”&amp;nbsp;
(Van Natta Jr. and Johnston 2002).&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The reason why the Phoenix Memo did not get its proper attention was due to the
weak analytical capability of the Federal Bureau of &lt;span style="mso-no-proof: yes;"&gt;Investigation to&lt;/span&gt; process raw intelligence report that time.&amp;nbsp;
Director Mueller admitted this handicap when he said, “What did not happen with
the memo from Phoenix points squarely at our analytical capacity.&amp;nbsp; Our
analytical capability is not where it should be…”&amp;nbsp;(Mueller 2002).&amp;nbsp;
Unlike the Central Intelligence Agency, the FBI on pre-9/11 era was a reactive
agency being a law enforcement &lt;span style="mso-no-proof: yes;"&gt;unit&lt;/span&gt; and
not a proactive on its terrorism coverage&amp;nbsp;like the CIA.&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The FBI, by not having competent intelligence analysts devoted to
counter-terrorism matters, had failed to thwart the terrorists’ attacks &lt;span style="mso-no-proof: yes;"&gt;on&lt;/span&gt; the homeland.&amp;nbsp; This fiasco had
triggered&amp;nbsp;a major overhaul of the US Intelligence Community apparatus and
most of the upgrade had been directed &lt;span style="mso-no-proof: yes;"&gt;to&lt;/span&gt;
the hiring and training of new pools of intelligence analysts. The necessity to
train new recruits and develop others to become adept in their field are
crucial to the success in the war on terror.&amp;nbsp; Since then, each USIC member had
elevated its fight against terrorism to the next level by improving the
capability of its personnel to &lt;span style="mso-no-proof: yes;"&gt;produce critical&lt;/span&gt;
analysis and provide timely intelligence to the end-users in the federal
government.&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Why
are the intelligence analysts important in counter-terrorism operations?&amp;nbsp;
The intelligence analysts—whether in the military units or civilian
agencies—create a clear and big picture of the terrorist groups'&amp;nbsp;intents
and plans by piecing together the little information collected via overt
sources and covert methods.&amp;nbsp; The analysts “sift through the giant haystack
of information . . . &lt;span style="mso-no-proof: yes;"&gt;to&lt;/span&gt; find the little
needles that are really important.”&amp;nbsp; (Hess 2001).&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Moreover, the intelligence analysts perform link analysis and timeline analysis
to monitor the trends of terrorists activities/operations at home and
overseas.&amp;nbsp; The similarities of data obtained from open source intelligence
(e.g., newspapers, think-tank reports, speeches, the &lt;span style="mso-no-proof: yes;"&gt;internet&lt;/span&gt;) and from covert sources (e.g., action agents, wiretaps,
surveillance) would show patterns and trends, which could become a baseline in
predicting future attacks.&amp;nbsp; The threat analysis helps the decision makers
in the government, especially the President of the United States and the
National Security &lt;span style="mso-no-proof: yes;"&gt;Council, prepare&lt;/span&gt; a proactive
national strategy and anti-terrorism policy to address the threats of radical
Islamists here and abroad. Similarly, the threat analysis gives&amp;nbsp;&lt;span style="mso-no-proof: yes;"&gt;the top brass&lt;/span&gt; in the military and the heads of
federal law enforcement units the opportunity to prepare tactical
counter-measures to preempt the destabilization plans of the
enemies.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&amp;nbsp;What had happened in Paris on &lt;span style="mso-no-proof: yes;"&gt;November&lt;/span&gt;
13&lt;sup&gt;th&lt;/sup&gt; was &lt;span style="mso-no-proof: yes;"&gt;the best&lt;/span&gt; example of a
government who had failed to act on &lt;span style="mso-no-proof: yes;"&gt;the available&lt;/span&gt;
intelligence. &lt;span style="mso-no-proof: yes;"&gt;It was reported that the Iraqi
government warned France of imminent attacks from the Islamic State of Iraq and
Syria (ISIS).&amp;nbsp;&amp;nbsp;Could we say that the info from the Iraqis was “&lt;/span&gt;never
treated seriously, never circulated, never analyzed” just like the Phoenix
Memo? &lt;span style="mso-no-proof: yes;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;The
intelligence analysts&amp;nbsp;should &lt;span style="mso-no-proof: yes;"&gt;be&lt;/span&gt;
aware of the local, national, and &lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;garamond&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;global
threats &lt;/span&gt;&lt;span lang="EN" style="color: #222222; font-family: &amp;quot;garamond&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-bidi-font-family: Arial;"&gt;vis-à-vis&lt;/span&gt;&lt;span lang="EN" style="color: #222222; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN;"&gt; &lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;requirements of the policymakers to produce timely and
actionable intelligence.&amp;nbsp;To accomplish their &lt;span style="mso-no-proof: yes;"&gt;tasks&lt;/span&gt;, the analysts must lay &lt;span style="mso-no-proof: yes;"&gt;down &lt;/span&gt;the
hypotheses that need to be confirmed and disproved—including the plausible
hypothesis and deception hypothesis.&amp;nbsp;Some hypotheses lack immediate
support (i.e., intelligence gap), and &lt;span style="mso-no-proof: yes;"&gt;this
vacuum&lt;/span&gt; &lt;span style="mso-no-proof: yes;"&gt;needs&lt;/span&gt; to be filled-in to
get the full picture of a threat.&amp;nbsp; (Heuer 1999)&amp;nbsp; &lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&amp;nbsp;&lt;span style="mso-no-proof: yes;"&gt;To&lt;/span&gt; predict future events, the
intelligence analysts explore and evaluate the collected information through
the process of assumptions and interpretations using their hypotheses as
guides. &lt;span style="mso-no-proof: yes;"&gt;And the&lt;/span&gt; hypothesis that has the
highest probability or possibility of &lt;span style="mso-no-proof: yes;"&gt;occurring is
passed on to the decision makers for appropriate action. T&lt;/span&gt;he analysts
continue to monitor the hypothesis they chose even as new information comes in
daily from the field.&amp;nbsp;The fresh information collected from covert and
overt sources may open new possibilities or probabilities.&amp;nbsp; As such, the
analysts may change or modify their initial predictions or may suggest an &lt;span style="mso-no-proof: yes;"&gt;acceleration&lt;/span&gt; of occurrence of such events to
the end-users.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;The
capability of the intelligence analysts to draw hypotheses from raw information
and&amp;nbsp;come up with a critical interpretation that could predict possible or
probable terrorists’ action is vital to the homeland security. With the recent
threats from &lt;span style="mso-no-proof: yes;"&gt;multi&lt;/span&gt;-national terrorists
such as ISIS and al-Qaeda, the work of the &lt;span style="mso-no-proof: yes;"&gt;intelligence&lt;/span&gt;
analysts &lt;span style="mso-no-proof: yes;"&gt;has&lt;/span&gt; never been so &lt;span style="mso-no-proof: yes;"&gt;critical in the protection of the United States government
interests and installations, personnel, and American citizens
overseas.&amp;nbsp;&amp;nbsp; sDg&lt;/span&gt;.&lt;/span&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 12pt; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;
&lt;/span&gt;&lt;div class="MsoNormal" style="margin: 0in 0in 8pt;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;&lt;span lang="EN" style="font-size: 12pt; line-height: 107%; mso-ansi-language: EN;"&gt;&lt;o:p&gt;&lt;span style="font-family: &amp;quot;calibri&amp;quot;;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12pt; line-height: 107%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-US;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiXQX6EsoKEy0tVNfJs2A_QF3Oib7sHvecTajTzdt9Si9nJxy3KvsKFPHMKUH8tITCf8dIjyQc9klyrIo5GkZb4NnPzqTU3F72DAHIDABIpP_P_R2R3jvk54bYlPAMHMUGiHdPgPPHPpM/s72-c/Dynazoom.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item><item><title>Then and Now: The Goals and Objectives of Terrorism</title><link>http://josilagan.blogspot.com/2015/11/then-and-now-goals-and-objectives-of.html</link><category>ACLU</category><category>Berlin Wall</category><category>Christian Martyrs</category><category>Definition of Terrorism</category><category>ISIS</category><category>Jemaah Islamiyah</category><category>Pesmargah</category><category>PFLP</category><category>PLO</category><category>Types of Terrorism</category><pubDate>Wed, 25 Nov 2015 23:04:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5199899167716490203.post-354565188166038811</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcBp9lRX4Q7xkikfKhi6yc_Z61VLD9g2S2Qdb7ngeeOFjatCe9slXnI9UT1kKZaA6Kt6hAwNW85dGULL5bep2vHaOZNVb_GOdLsEtRegKtlbOyLgtsm-satKC_rQkQVQeU7b2Jmid0udc/s1600/Dar+Es+Salaam+Bombings.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcBp9lRX4Q7xkikfKhi6yc_Z61VLD9g2S2Qdb7ngeeOFjatCe9slXnI9UT1kKZaA6Kt6hAwNW85dGULL5bep2vHaOZNVb_GOdLsEtRegKtlbOyLgtsm-satKC_rQkQVQeU7b2Jmid0udc/s320/Dar+Es+Salaam+Bombings.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: x-small;"&gt;(US Embassy building in Dar Es Salaam after the 1998 bombing.&amp;nbsp;Courtesy of &lt;span style="font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , serif;"&gt;&amp;nbsp;WikimediaCommons.) &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: x-small;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div align="justify"&gt;
&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;/span&gt;
&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;

&lt;/span&gt;&lt;br /&gt;
&lt;div align="justify"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:DoNotShowPropertyChanges/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri",sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:"Times New Roman";
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;After the Friday the 13th massacre in Paris, people wonder&amp;nbsp;why
certain extreme religious groups (or political groups) resort to violent acts
and destroy&amp;nbsp;properties in the pursuit of their goals and
objectives.&amp;nbsp;Only &lt;span style="mso-no-proof: yes;"&gt;a handful of terrorists
carried the attacks, but the carnage had resulted in the death of 130 innocent
people. To understand why those committed individuals would carry such
terroristic acts, the&lt;/span&gt; reader must understand &lt;span style="mso-no-proof: yes;"&gt;what terrorism&lt;/span&gt; is all about.&amp;nbsp; &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Terrorism
is a relative term as some people would say.&amp;nbsp; We heard so much about the
truism “One man’s terrorist is another man’s freedom fighter.”&amp;nbsp; People in
the &lt;span style="mso-no-proof: yes;"&gt;United States&lt;/span&gt;&amp;nbsp;branded Usama
bin-Laden as a terrorist, but those in the Muslim world regarded him as&amp;nbsp;a
hero ala Che Guevarra. (Regan 2005).&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;There
is no precise meaning of terrorism and political scientists define it in many
forms, depending on what side of the political spectrum they belong.&amp;nbsp; &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; However,
terrorism—even if defined with a political slant or with a positive
overture---has always resulted in the deaths of innocent people &lt;span style="mso-no-proof: yes;"&gt;and the&lt;/span&gt; destruction of public and private
properties.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Dr.
James M. Smith, former Director of the United States Air Force Institute for
National Security Studies (INSS), once said, “Terrorism is a physical attack
intended to produce a psychological effect.”&amp;nbsp; (Smith 2003).&amp;nbsp; On the
other hand, Gorski said, “Terrorism intends to cause a chronic state of
psychological vulnerability and instability in the targeted population.&amp;nbsp;
Death and destruction are merely a &lt;span style="mso-no-proof: yes;"&gt;mean&lt;/span&gt;
to achieve these ends.”&amp;nbsp; (Gorski 2002).&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
By and large, terrorism is a form of psychological warfare that intends to
diminish the will of the people and influence their collective frame of mind
against the established government.&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span style="mso-no-proof: yes;"&gt;Given&lt;/span&gt; the &lt;span style="mso-no-proof: yes;"&gt;preceding&lt;/span&gt;,
the terrorists seek to cause "political, social and economic disruption,
and for this purpose frequently engage in planned or indiscriminate
murder.”&amp;nbsp; (Lacquer 1977).&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
A terrorist leader once said,&amp;nbsp;"A terrorist is like a bee and the
government is like a &lt;span style="mso-no-proof: yes;"&gt;man;&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;when&lt;/span&gt; the bee keeps stinging his target
on the various parts of his body, the man will attempt to slap the bee from
every direction until he loses control of
himself.&amp;nbsp;"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;In their fight, the terrorists want the democratic government to act recklessly
to their bloody handiwork.&amp;nbsp; The goal is to pressure the government to
impose draconian measures that would lead to the curtailment of civil liberties
and constitutional rights of the people.&amp;nbsp; For example, in response to&lt;span style="mso-no-proof: yes;"&gt; the 9/11&lt;/span&gt; attacks, the United States government
had enforced stringent controls in the airport and harbors in an attempt to
ferret out suspected terrorists and to stop them from inflicting further
damages to the homeland.&amp;nbsp; But then again, the 19 al-Qaeda members had
different objective on their minds, which was to “use violence to further what
they see as divinely commanded purpose.” (Wikepedia 2005).&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&amp;nbsp;&amp;nbsp;The imposition of rigid security measures and the limitation of
movements in public places had received unfavorable response and condemnation
from progressive groups.&amp;nbsp;&amp;nbsp;For instance, the American Civil Liberties
Union decried the post 9/11 security controls as “blatant discrimination and
state-sanctioned bigotry to outright physical brutality,” which allegedly
targeted the people of Arab-descent living in the &lt;span style="mso-no-proof: yes;"&gt;United States&lt;/span&gt;.&amp;nbsp; (Porter 2002).&amp;nbsp; &lt;span style="mso-no-proof: yes;"&gt;The terrorists' goal is to portray the United States government as
helpless and incapable of protecting the security and well-being of its
citizens. And by sowing terror and creating destruction, the terrorists hope to
stir up the government to use unpopular extra-legal measures (e.g., martial
law) and anticipate the citizenry to rise up.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Augusto
Angcanan Jr., a retired Filipino police general, suggests a positive way to
deal with terrorism, and he shares his opinion in the following
statement.&amp;nbsp; Angcanan said, “Terrorism is the means to an end, not an end
in itself.&amp;nbsp; Let alone, terrorism can accomplish nothing &lt;span style="mso-no-proof: yes;"&gt;in terms of&lt;/span&gt; political goals; it can only aim at
obtaining a response that will achieve those goals for it.&amp;nbsp; Said another
way, terrorist violence is aimed not so much &lt;span style="mso-no-proof: yes;"&gt;on&lt;/span&gt;
the target upon which the initial act is committed &lt;span style="mso-no-proof: yes;"&gt;but to&lt;/span&gt; much wider audience who will view and interpret the act.
&amp;nbsp;The success of terrorism is due in large part to the miscomprehension of
the strategy by its opponents, which is a &lt;span style="mso-no-proof: yes;"&gt;failure&lt;/span&gt;
to focus on the critical issue of how to respond properly to provocations and
threats. &amp;nbsp;Brutality and repression are induced responses that will
alienate the government from the masses, thus set the stage for revolution.
&amp;nbsp;In dealing with the problem of terrorism, &lt;span style="mso-no-proof: yes;"&gt;paramount&lt;/span&gt;
is the rule of law and our respect for human rights.” &amp;nbsp;(Angcanan
2005).&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Terrorists
do not place a demarcation line between themselves and their targets because
they consider everyone and anything as front-line targets.&amp;nbsp; There are no women,
children, and old folks in their psychotic eyes.&amp;nbsp; Buildings and structures--whether private or public-- are not exempt for destruction if it would advance their struggle.&amp;nbsp; In this regard, they
would kill and destroy in an &lt;span style="mso-no-proof: yes;"&gt;indiscriminate&lt;/span&gt; fashion
and in vicious disregard of human lives and properties.&amp;nbsp; Terrorists sow terror acts in
the hearts and minds of the people as means to advance their ultimate cause
whether for political, religious, or economic reasons.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;From
the 1960s up to the 1980s, the struggle for worldwide revolution and
transformation of social order were the dominant themes of the decades.&amp;nbsp;
The battle &lt;span style="mso-no-proof: yes;"&gt;was between&lt;/span&gt; Capitalism and
Communism. It was the &lt;span style="mso-no-proof: yes;"&gt;United States of America&lt;/span&gt;
versus the Union of Soviet Socialist Republic.&amp;nbsp; The fight was against two
competing political ideologies.&amp;nbsp; It was also a war of attrition between
the State of Israel and Yasser Arafat's Palestinian Liberation Organization. &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
For three decades, some communist-leaning groups and PLO factions came into &lt;span style="mso-no-proof: yes;"&gt;existence, and the rest was history.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;Each&lt;/span&gt; group had its own objectives yet
had similarity &lt;span style="mso-no-proof: yes;"&gt;in&lt;/span&gt; its protracted war
against the United States and the free world—the use &lt;span style="mso-no-proof: yes;"&gt;of terrorism&lt;/span&gt; as a form of weapon to fight its &lt;span style="mso-no-proof: yes;"&gt;target-government enemies.&lt;/span&gt; Groups like the Black
September, Popular Front for the Liberation of Palestine (PFLP),
Baader-Meinhoff, and Brigada Rossi made their political statements through
assassinations, bombings, hijackings, and kidnappings.&amp;nbsp; Their ilks come and
go, but history shows these terror &lt;span style="mso-no-proof: yes;"&gt;groups hardly&lt;/span&gt;
ever grab hold of power and always fail to accomplish their ultimate
aspiration.&amp;nbsp; (Lacquer 1977).&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style="mso-no-proof: yes;"&gt;After the collapse of the Berlin Wall, the battle had
shifted from political to religious issues with the creation of transnational
religious terror groups like al-Qaeda, Jemaah Islamiyah, Boko Haram, and the
recent Islamic State of Iraq and Syria (ISIS).&amp;nbsp; It appears the
definitions above of terrorism no longer apply to these current crops of
terrorist groups. Or are they still?&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The communist leaning groups
fought for political and societal causes and not for a religious war like what
the world is facing right&amp;nbsp;now.&amp;nbsp; The old-era terrorists killed their targets,
not themselves. Now, &lt;span style="mso-no-proof: yes;"&gt;the&lt;/span&gt; modern
terrorists not only kill innocent people but also themselves. Strapping their bodies with bombs
and blowing up themselves in public are now common &lt;span style="mso-no-proof: yes;"&gt;occurrence whether in the urban areas like Paris or in the rural spots like
Kabul.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;The
terrorists of the past &lt;span style="mso-no-proof: yes;"&gt;always&lt;/span&gt;
bargained with the Western governments to achieve their goals and&amp;nbsp;to raise
global awareness to their cause (e.g., PFLP clamoring for a Palestinian
state).&amp;nbsp; This isn’t true with the&amp;nbsp; current terror groups nowadays. ISIS didn't
bargain with the United States when it beheaded the American journalist Steven
Sotloff, and neither talked &lt;span style="mso-no-proof: yes;"&gt;with&lt;/span&gt; the
United Kingdom when it killed British aid worker David Haines.&amp;nbsp; Boko &lt;span style="mso-no-proof: yes;"&gt;Haram members&lt;/span&gt;&amp;nbsp;kidnapped hundreds of girls
and they too didn’t negotiate with the Nigerian government. Instead, the group
killed their victims unmercifully. &amp;nbsp;The Taliban didn't seek a trade with
the Pakistani government when it killed 132 people in Peshawar. &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The genocides of &lt;span style="mso-no-proof: yes;"&gt;Christians &lt;/span&gt;in Iraq and
Syria by ISIS are testaments that the goals and objectives of terrorism &lt;span style="mso-no-proof: yes;"&gt;have&lt;/span&gt; clearly changed.&amp;nbsp; Today, all
the Islamist-terrorists&amp;nbsp;wanted is to kill infidels&amp;nbsp;and demolish all
landmarks that &lt;span style="mso-no-proof: yes;"&gt;symbolize&lt;/span&gt; Christianity and
Western civilization.&amp;nbsp;And &lt;span style="mso-no-proof: yes;"&gt;asking the&lt;/span&gt;
American government and the European Union for concessions or telling the free
world to capitulate to their demands is not their game anymore. &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;span lang="EN" style="color: black; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-ansi-language: EN; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;To
know the current crop of Islamist-terrorists better is to understand the
pronouncement of Hussein Massawi, a former Hezbollah &lt;span style="mso-no-proof: yes;"&gt;Leader,&lt;/span&gt; when he said: “We are not fighting so the enemy will offer
us something.&amp;nbsp; We are fighting to wipe out the enemy."&amp;nbsp; sDg. &lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style="font-size: x-small;"&gt;
&lt;span style="font-size: small;"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: 15.6pt; margin: 0in 0in 0pt; text-align: justify;"&gt;
&lt;span style="font-size: x-small;"&gt;&lt;span lang="EN" style="color: black; font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: small; mso-ansi-language: EN; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;&amp;nbsp;&lt;span style="mso-tab-count: 1;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcBp9lRX4Q7xkikfKhi6yc_Z61VLD9g2S2Qdb7ngeeOFjatCe9slXnI9UT1kKZaA6Kt6hAwNW85dGULL5bep2vHaOZNVb_GOdLsEtRegKtlbOyLgtsm-satKC_rQkQVQeU7b2Jmid0udc/s72-c/Dar+Es+Salaam+Bombings.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>jo1ranger@gmail.com (Jos. Ilagan)</author></item></channel></rss>