Vehicle Cloning is a highly lucrative crime these days. The use of fake vehicles for criminal purposes is a growing problem that law enforcement should be aware of. Counterterrorism authorities have expressed concern about these cloned vehicles, which include trucks made to look exactly like commercial trucks as well as government vehicles. In the past there have been several incidents where cloned vehicles have been involved. These incidents also emphasize the dangers that cloned vehicles represent when they are used by extremists to conceal items such as Improvised Explosive Devices (IED’s) in attempt to gain access to restricted areas in order to execute an attack.
Incident Warranting Vigilance:
This truck was traveling south on the Florida Turnpike. The vehicle appeared at first glance to be an official rescue vehicle from the fire department. The truck had a “Fire Rescue Advance Support” sign on it but didn’t have the logo of an actual fire department on it, however, it looked a lot like an authentic fire rescue unit. Easily, this vehicle may get access to restricted areas where an ordinary vehicle could not gain access. [March 2010 Miami Dade Fire Rescue — Terrorism Response Bureau]
Previous Incidents:
- - - - - - - - -
In September 2009, terrorists who invoked Islam to pursue their violent agenda posed as United Nations (UN) personnel and drove stolen UN vehicles into the headquarters of a peacekeeping mission in Mogadishu, Somalia. The trucks were waived through security and subsequently detonated inside the compound, killing at least 21 people. [November 2009- DHS- IA-0039-10]
In March 2007, several explosives-laden vehicles, one of which was an ambulance, were used in a coordinated series of attacks against a market, a courthouse, and an army base that was under construction in Iraq. Over 40 people died, and many others were wounded. [November 2009- DHS- IA-0039-10]
In April 2005, three explosives-laden vehicles, one of which was a fire truck, attacked a U.S. military facility in Iraq, wounding several and causing minor damage to the facility and a nearby mosque. [November 2009- DHS- IA-0039-10]
Border patrol agents stopped a suspicious Budweiser delivery van traveling northbound from the border. One of the agents noticed something abnormal about the van, which bore the name Golden Eagle Distribution, Inc., a Tucson distributor. Inside the van, agents discovered 13 illegal aliens, of which 8 were citizens of China and the other 5 were citizens from Mexico. [November 2008- NOC]
Department of Public Safety agents in Arizona pulled over what they believed was a UPS truck. To their surprise, the truck was actually a picture-perfect clone of a UPS truck whose purpose was to hide smuggled goods. Inside the vehicle, agents seized 2,118 lbs of marijuana worth over $1 millions on the street. [November 2007 — WWW.CBP.Gov]
Other vehicles that have been cloned and used in criminal activities in the past are: U.S. Border Patrol van, FedEx, Southwestern Bell Telephone Company, Wal-Mart, Direct TV, Dish Network, Comcast, Mountain Dew Cola, and an Ambulance Emergency Vehicle. Law enforcement should be on alert for the following indicators of suspicious delivery, commercial and/or government vehicles during patrol, routine traffic stops and large scale public events.
Possible Indicators:
- No company phone numbers displayed.
- Personalized license plate or no license plate attached.
- Chrome license plate brackets.
- Several different Cable Company names listed (Companies that are rivals).
- Very low service vehicle numbers (0007-0025).
- Closer look at the insignia indicated that the images were made larger, thus distorting the image.
- The 800 number listed as a call center for bad driving is spelled wrong (ADVICE vs. ADVISE).
- The ladder, tools and cones attached to the vehicle appeared to not have been used in a long period of time, due to the presence of dust, old dirt and discoloration from the sun.
This bulletin’s intent is to provide situational awareness concerning domestic and international terrorist tradecraft and evolving tactics. Although there is no specific or credible intelligence to suggest that individuals, extremists, and terrorist organizations are planning to conduct attacks, first responders should remain cognizant and continue to be vigilant of detecting suspicious vehicles, for example, delivery vehicles in large scale events, vehicles blocking entrances, and/or illegally parked of vehicles. Information related to or comments, suggestions about the content of this report should be directed to MDFR Terrorism Response Bureau at the Miami-Dade Fusion Center at 305-470-3951 or mdfrterrorismresponse@miamidade.gov
Miami-Dade Fire Rescue
Terrorism Response Bureau
9300 NW 41st ST, Doral, FL, 33178
Headquarters Office: (786)331-5312
Fax: (786)331-5311
Miami-Dade Fusion Center Desk: (305)470-3951
4 comments:
pdf: HighwayISAC/DHS - Cloned Vehicles: More than Meets the Eye March 20, 2009
In the case of government vehicles and those belonging to large corporations, a simple system based upon IFF (Identification Friend or Foe) can be used to distinguish genuine emergency or service vehicles from their cloned counterparts.
Many firms already use satellite-based GPS tracking for tracing the locations of their vehicles on a real time basis. Geographical positioning exclusion software could readily determine if the reported coordinates of a specific vehicle did not match those already in a continuously updated data base.
Theft of a genuine vehicle could be rendered ineffective by interlocking the IFF beacon to a "smart key" that must be in proximity for it to operate. Further security measures could take the form of biometric sensing systems similar to those used to prevent drivers with prior DUI convictions from operating their vehicle while intoxicated.
The transponder of a stolen vehicle could be shut off remotely in order to inhibit its ability to be used for criminal activities. While this could not prevent all misuse scenarios, it would certainly discourage a large percentage of them. The overall expense of this is not prohibitive and uses existing technology. More importantly, it does not infringe upon the rights of individual citizens.
However, it should be noted that this is but one more layer of cost that Islamic terrorism continues to add to our everyday life. However expensive it might seem now, it is far less costly to eradicate terrorism root and branch in order to forego all of the insane extra pricetags attached to airport security and many other business-inhibiting measures made necessary by Islam's perpetuation of jihad.
Simply put, ending Islamic terrorism is far less expensive that the cumulative cost of protecting against it. Additionally, it is no small coincidence that Muslims will likely have to bear much of the cost of ending terrorism just as they currently continue to profit by remaining silent about its unacceptability. That is the price of having tacitly supported terrorism with their zakat and silence for all these decades.
"War is deceit."
@AA--
Agreed. In this case, they're deceiftul parasites, wouldn't you say?
The creepy part is the way they take icons which represent the compassionate impulse, e.g., rescue vehicles, fire engines, etc., and turn them into the black-hearted opposite. Instead of rescue, we get death, delivered massively.
Post a Comment
All comments are subject to pre-approval by blog admins.
Gates of Vienna's rules about comments require that they be civil, temperate, on-topic, and show decorum. For more information, click here.
Users are asked to limit each comment to about 500 words. If you need to say more, leave a link to your own blog.
Also: long or off-topic comments may be posted on news feed threads.
To add a link in a comment, use this format:
<a href="http://mywebsite.com">My Title</a>
Please do not paste long URLs!
Note: Only a member of this blog may post a comment.