Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $35,139
43%  
Woo hoo!! And we're now over 43%!! Thank you all very much!! God bless.

Keyword: code

Brevity: Headers | « Text »
  • FBI raid at meat processor believed tied to immigration irregularities [UPDATE:TERROR PLOT -ARRESTS]

    10/21/2009 12:39:00 AM PDT · by Cindy · 162 replies · 5,266+ views
    CHICAGO TRIBUNE.com ^ | October 20, 2009 | Tribune staff report
    SNIPPET: "Search at Grundy County plant called part of ongoing probe" SNIPPET: "But a source said the owner of the plant, which processes lamb and goat, was taken into custody at his home in Chicago. Documents and records were taken from the plant and from a Chicago travel agency on West Devon Avenue, also owned by the same person, the source said."
  • Secret code saves man who spied on flatmates

    10/22/2009 7:09:31 AM PDT · by BGHater · 10 replies · 1,868+ views
    Courier Mail ^ | 19 Oct 2009 | Jeremy Pierce
    A MAN who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police were unable to crack an encryption code on his home computer. Rohan James Wyllie, 39, yesterday pleaded guilty in Southport District Court to charges of attempting to visually record one of his flatmates when she was in a private place without her consent. But police were unable to prove his elaborate surveillance system had actually been used. Wyllie's three flatmates, two women and a man, grew suspicious that he was up to something when they noticed lights...
  • Feds: Sudbury man planned terror attacks on malls

    10/21/2009 1:58:09 PM PDT · by Blood of Tyrants · 51 replies · 2,831+ views
    My Fox Boston ^ | 10/21/09 | Mike Levine
    BOSTON - A pharmacy college graduate conspired with two other men on a terror plot to kill two prominent U.S. politicians and carry out a holy war by attacking shoppers in U.S. malls and American troops in Iraq, prosecutors said Wednesday. But their plans — in which the men used code words like "peanut butter and jelly" for fighting in Somalia and "culinary school" for terrorist camps — were thwarted in part when they could not find training and were unable to buy automatic weapons, authorities said. Tarek Mehanna worked with the men from 2001 to May 2008 on the...
  • New Threat Message Warns: Al-Qaeda Will Attack Germany on a Sunday in October

    10/05/2009 1:02:38 AM PDT · by Cindy · 33 replies · 2,978+ views
    MEMRI.org ^ | October 4, 2009 | n/a
    Special Dispatch - No. 2576 October 4, 2009 New Threat Message Warns: Al-Qaeda Will Attack Germany on a Sunday in October Introduction The Al-Falluja jihadist forum has posted a new threat message to Germany specifying that attacks will be carried out on one of the Sundays in October. It is titled "To the Infidel German Nation: We Bestow on You the Kindness, for the Third Time, of Specifying the Appointed Day!" The message, which is being heavily promoted by Al-Falluja, is the latest in a series of threats to appear on the forum [1] following the release of Al-Qaeda videos...
  • Dan Brown's 'Lost Symbol' details local mystery (CIA HQ, Langley, Virginia)

    09/21/2009 4:32:02 PM PDT · by HokieMom · 19 replies · 1,613+ views
    WTOP ^ | 9/21/09 | JJ Greene
    LANGLEY, Va. - Part of the new Dan Brown novel is based on a local mystery. In the introduction to his new best-selling novel, "The Lost Symbol," author Dan Brown lists the following: "In 1991, a document was locked in the safe of the director of the CIA. The document is still there today, its cryptic text includes references to an unknown location underground. The document ... includes the phrase, 'It's buried out there somewhere.'" Brown says the 20-year-old document contains the answers to a 20-year-old mystery. WTOP's National Security Correspondent J.J. Green investigated the claim, and found out it's...
  • "Terror Suspect's Computer Said to Show Sports Stadiums, Fashion Sites"

    09/19/2009 2:23:40 PM PDT · by kozanne · 15 replies · 1,557+ views
    ABC News "The Blotter" ^ | 9-19-2009 | RICHARD ESPOSITO, BRIAN ROSS and CLAYTON SANDELL
    Terror Suspect's Computer Said to Show Sports Stadiums, Fashion Sites Officials Report Denver Man Sent Texts Suggesting Attack Coming; 'Wedding Cake' Is Ready By RICHARD ESPOSITO, BRIAN ROSS and CLAYTON SANDELL Sept. 19, 2009— --snip-- A computer belonging to alleged al Qaeda suspect Najibullah Zazi showed he had researched baseball and football stadiums and sites used in the recent Fashion Week event in New York City, law enforcement officials tell ABCNews.com. Zazi, 24, had been scheduled to spend a fourth day today being questioned by the FBI but his lawyer, Arthur Folsom, canceled the session. "He has taken the day...
  • FBI raid Queens, NY home in terror investigation

    09/14/2009 12:50:55 PM PDT · by Fali_G · 650 replies · 21,606+ views
    BULLETIN -- NEW YORK POLICE AND FBI RAID HOMES IN QUEENS IN TERRORISM INVESTIGATION.6 minutes ago from BNO Headquarters
  • Target Of NY Bomb Plot Probe Admits Terrorist Ties

    09/19/2009 1:42:26 AM PDT · by Cindy · 11 replies · 1,421+ views
    WCBSTV.com ^ | Sep 18, 2009 11:50 pm US/Eastern | Marcia Kramer NEW YORK (CBS), Reporting
    SNIPPET: "The ties between Najibullah Zazi and al-Qaida are growing. A source who gets high-level intelligence briefings told CBS 2 HD that law enforcement officials have recorded a number of conversations between Zazi and a known al-Qaida operative in Pakistan. The key parts of the conversation? The operative told Zazi what to say if stopped by police, and there is also a reference to a "wedding," which American agents believe is a code word for an attack. Sources said the formula for the explosive TATP was found in Zazi's computer when they seized his car, and with President Barack Obama...
  • Man Says He's Cracked Code to Multiply Any 2 Numbers in Your Head-He'll share it for a Price

    08/11/2009 7:48:27 AM PDT · by rawhide · 30 replies · 1,797+ views
    FoxNews.com ^ | 08-11-09
    A North Carolina man who allegedly cracked the code to mentally calculate any multiplication problem is now offering to reveal his secret - for the bargain price of $33. Albert Clay said he came up with his system as a high school junior, but never showed anyone aside from a high school math teacher who shrugged off the achievement, the News & Observer reported. Now 75 years old, the retired pharmacist has copyrighted the formula, "How to Multiply Any Number by Any Number in Your Head," and hopes to demonstrate it in schools, books or even personal mailings to anyone...
  • Bonnie Henry : Exhibit showcases Code Talkers' story (Saluting Navajo contribution to WWII victory)

    07/20/2009 7:10:38 PM PDT · by SandRat · 7 replies · 464+ views
    Arizona Daily Star ^ | Bonnie Henry
    Detractors called it "Indian gibberish." But not for long. During World War II, more than 400 Navajos serving with the U.S. Marine Corps transmitted vital communications throughout the Pacific theater, using a code known only to them. Developed by the Navajos themselves, the code completely stymied the Japanese and was never broken. After the battle for Iwo Jima, Maj. Howard Connor, a signal officer from the 5th Marine Division, was widely quoted as saying: "Were it not for the Navajos, the Marines would never have taken Iwo Jima." "They were used at every level, from reconnaissance to the battlefield, to...
  • Code-cracking and computers ( WWII and German Codes )

    05/31/2009 9:41:54 AM PDT · by Ernest_at_the_Beach · 39 replies · 1,375+ views
    BBC ^ | Thursday, 6 November 2008 | Mark Ward Technology correspondent, BBC News
    By the end of WWII, 11 Colossus machines were in use Bletchley Park is best known for the work done on cracking the German codes and helping to bring World War II to a close far sooner than might have happened without those code breakers. But many believe Bletchley should be celebrated not just for what it ended but also for what it started - namely the computer age. The pioneering machines at Bletchley were created to help codebreakers cope with the enormous volume of enciphered material the Allies managed to intercept. The machine that arguably had the greatest influence...
  • Ali Al-Marri Pleads Guilty to Conspiracy to Provide Material Support to Al-Qaeda

    04/30/2009 5:10:56 PM PDT · by Cindy · 19 replies · 1,627+ views
    US DOJ.gov/opa - Press Release ^ | April 30, 2009 | n/a
    Note: The following text is a quote: Ali Al-Marri Pleads Guilty to Conspiracy to Provide Material Support to Al-Qaeda Ali Saleh Kahlah al-Marri, 43, a dual national of Saudi Arabia and Qatar, has pleaded guilty to one count of conspiracy to provide material support to al-Qaeda. Al-Marri entered his guilty plea at a hearing this afternoon before Judge Michael M. Mihm in U.S. District Court for the Central District of Illinois. In so doing, al-Marri admitted that he agreed with others to provide material support or resources to al-Qaeda in the form of personnel, including himself, to work under al-Qaeda’s...
  • Whose Land Is Israel?

    04/04/2009 7:41:41 PM PDT · by SunkenCiv · 32 replies · 1,588+ views
    While getting a new clutch installed on our Ford pick-up in Petach Tiqvah, the garage accountant, wearing a kippa, noticed the B'nai No'ach bumper sticker and asked, "What is B'nai No'ach?" "You are a religious Jew and you have to ask me 'what is B'nai No'ach?'" "I know what is B'nai No'ach, but I want to know what B'nai No'ach is to you." In a few words I gave him an answer that satisfied him. Then, he asked, "Who do you think this Land of Israel belongs to, the Jews or the Arabs?" "This Land belongs neither to the Jews...
  • In the Beginning Was Information: Information in Living Organisms (Ch 6)

    04/02/2009 7:05:41 PM PDT · by GodGunsGuts · 229 replies · 2,518+ views
    AiG ^ | April 2, 2009 | Dr. Werner Gitt
    Information in Living Organisms Theorem 28: There is no known law of nature, no known process, and no known sequence of events which can cause information to originate by itself in matter... (for remainder, click link below)
  • CAN YOU CRACK A CODE? Try Your Hand at Cryptanalysis

    12/30/2008 10:38:42 PM PST · by Cindy · 65 replies · 1,438+ views
    FBI.GOV ^ | 12/29/08 | n/a
    CAN YOU CRACK A CODE? Try Your Hand at Cryptanalysis Last year, we challenged you to crack a code created by the “cryptanalysts” in our FBI Laboratory, who are experts in breaking ciphers of all kinds. Tens of thousands of you did so. Are you ready for round two? We hope so. But bear in mind, this year's code is slightly more difficult. Once again: if you want a primer on basic cipher systems and how to break them, see the article "Analysis of Criminal Codes and Ciphers." And if you’re a youngster, we suggest you start with the code...
  • America’s passage of nuclear power (the nuclear "football" passes to Mr. Obama)

    12/26/2008 12:55:13 AM PST · by 2ndDivisionVet · 37 replies · 1,977+ views
    It is a simple transfer of immense power. On Jan. 20, an unobtrusive military officer carrying a small leather-bound metal briefcase will follow President George W. Bush up to Capitol Hill. After the inauguration ceremony, he will accompany President Barack Obama back to the White House. Inside the attache, known as “the football,” are the codes to identify and authenticate a presidential order that could launch nuclear weapons and ignite a global holocaust. Routine to most Americans, perhaps astonishing to much of the world, this peaceful passing of “the football” will propel Obama into a maelstrom. What awaits the new...
  • Secret Service Code Names for the Obamas

    11/11/2008 6:19:25 PM PST · by The Big Feed · 27 replies · 550+ views
    courant.com ^ | 11/11/08 | The Big Feed
    I reckon this is safe to print. It was on the internet. I would have gone with Remus for Obama. It seems like a natural fit. Remus was a black man who was always spinning the obvious. The Secret Service code names for the First Family-elect are another odd assortment of seemingly random words, all starting with the letter R. John McCain may have been a self styled Maverick, but Barack Obama's Secret Service code name is Renegade. Michelle Obama, a woman of wide interests, is Renaissance (which sounds like the beginning of a perfume campaign). Malia Obama did not...
  • IPhone software developers stifled under Apple's gag order

    08/25/2008 10:51:21 AM PDT · by ken21 · 39 replies · 155+ views
    the lost angeles times ^ | 08.25.08 | Michelle Quinn
    The software development kit that Apple Inc. distributed to programmers bound them to not discuss the process of creating programs for the iPhone. Companies typically waive such legal restrictions once the product in question launches, but Apple didn't. And it won't say why.
  • RNC Accuses Obama Bundler of Supporting Iraq Insurgency

    08/19/2008 8:13:06 AM PDT · by kristinn · 25 replies · 839+ views
    PRNewswire ^ | Tuesday, August 19, 2008
    The Republican National Committee (RNC) published an update at its BarackBook.com website yesterday that accuses Barack Obama presidential campaign bundler Jodie Evans of supporting the insurgency in Iraq. http://www.barackbook.com/Profiles/JodieEvans.htm Evans is co-founder of the so-called antiwar group Code Pink. The RNC quoted a January 15, 2006 column by Robert Novak that said, "Code Pink, At A Mock War Crimes Tribunal In Istanbul June 27, Signed A Declaration That The Iraqi Insurgency 'Deserved The Support Of People Everywhere Who Care For Justice And Freedom.'" Evans represented Code Pink at the mock war crimes tribunal. In addition to expressing Code Pink's support...
  • Bug-free software, possible?

    07/19/2008 3:01:10 PM PDT · by CarrotAndStick · 88 replies · 1,927+ views
    The Times of India ^ | 20 Jul 2008, 0056 hrs IST | IANS
    LONDON: European researchers are working on mathematical foundations of programming to create fault free software in the future. People are remarkably tolerant of software that goes wrong, but when it comes to faulty cars or TV sets, they would insist that they be set right without much ado, the researchers said. "The software industry is still very immature compared to other branches of engineering," says Bengt Nordström, computer scientist at Chalmers University, Göteborg. "We want to see programming as an engineering discipline but it's not there yet. It's not based on good theory and we don't have good design methods...