Pages

Thursday, July 17, 2025

What to Do When You See ICE in Your Neighborhood

 Case closed after ‘Russian disinfo’ claims led to persecution of NZ journalist GrayZone 


Bunker Busters

Mark Magazine #66 February/March 2017 – “Contemporary warriors are retreating more and more from the battle field and exchange guns for computers like the one this article is written with. But unlike me, these warriors are sitting in maximum security installations like bunkers. 


Therefore, hitting a bunker is a military jackpot, eliminating drone pilots, cyber warriors and military command. These ever deeper and more reinforced bunker installations are designed by engineers and architects. Thickness and designs are measured against their biggest threat, the Bunker Busters. A Bunker Buster is a bomb which is able to delay its explosion after it penetrated layers of earth or concrete with the help of a timer and a propeller.


 More advanced bombs detect the sound of impact and delay detonation until a specific number of floors in a structure have been penetrated. Although the first earth-penetrating weapons have been used in WWII by the British Army, the first real Bunker Busters appeared just in the early 1990s. During Operation Desert Storm (1991), a sudden need for a deep penetration bomb appeared. Within only 28 days the laser “Guided Bomb Unit-28 (GBU-28)” was developed. 


The bomb was unofficially nicknamed “The Saddamizer” referring to its initial purpose of bombing Saddam Hussein’s bunker. Despite their high amount of collateral damage, Bunker Buster usage is in full swing. Currently the West is accusing Russia and the Syrian government to trop the Russian designed bunker buster KAB-1500L-Pr in Aleppo, while the Royal Air Force is using a GBU-50 EPII against Islamic State fighters in Iraq. 


And the collateral damage is about to increase. In November 2015, a test of the B61-12 a nuclear Bunker Buster, was conducted by the US army. Being able to penetrate underground reduces its radioactive fallout risk, but lowers the threshold for their actual usage. The Bunker Buster is about to open the back door for the use of nuclear warheads by blurring the sharp line between conventional weapons and weapons of mass destruction. The withdrawal of the armies from the planet’s surface into the air or underground leave civilians literally alone in the middle.


 The fact that cities are the contemporary battlegrounds seems to prove that the only wall that armies hesitated to break through is the human shield. Text and graphics: Theo Deutinger, Liam Cooke and Stefanos Filippas.”


Pete Recommends – Weekly highlights on cyber security issues, July 12, 2025 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Employees are quietly bringing AI to work and leaving security behind; AI could harm your critical thinking skills. Should that change how you use it?; Device disregard is multiplying digital ghosts across federal agencies; Fake online stores look real, rank high, and trap unsuspecting buyers; and Appeals court strikes down ‘click-to-cancel’ 


What to Do When You See ICE in Your Neighborhood

The Intercept – How can you deter the Trump administration’s immigrant deportation machine when it pops up in your community? Follow these steps

Out running errands and see a cluster of weirdos kitted out for war, milling about like they’re stuck in a Call of Duty matchmaking lobby? Grab some pics and vids to raise the alarm. Keep in mind that specificity is paramount when logging these sightings, both to increase efficacy and avoid panic. Fortunately, one of master’s own tools has proven itself an invaluable counterintelligence asset. Plucked straight from U.S. military field books, the acronym S.A.L.U.T.E. can help you gather the most pertinent details. It’s also the practice almost universally recommended by the groups I spoke to.

Size: How many people and/or vehicles do you see?
Activity: What, specifically, are they doing that’s suspicious?
Location: What address, cross streets, or landmark are they at (the more specific the better)?
Uniform: What are they wearing, whether it’s fatigues, nondescript civilian clothes, or something else entirely?
Time: What date and time did you observe them?
Equipment: What guns, weapons, or devices do they appear to be carrying?

See also The ICE List is an open journalistic project, created by the Crustian Daily, aimed at collecting and sharing information that can hold ICE members legally accountable. We document and publish the names, faces, and roles of individuals involved in ICE operations, especially those linked to abuse, misconduct, or deportations.  Agents are identified through open-source investigations, FOIA records, news reports and public testimony. Each profile is vetted and categorized by involvement level, providing a clear view of who’s behind the system.