Free Republic
Browse · Search
General/Chat
Topics · Post Article

This thread has been locked, it will not receive new replies.
Locked on 01/26/2004 2:00:53 PM PST by Admin Moderator, reason:

The size of this thread is causing FR to slow down whenever it is accessed. It is going to be locked and moved to the chat/general interest forum. If anyone wants to post a ‘Part 2’ thread, go ahead, but post it to chat. Thank You http://www.freerepublic.com/focus/f-chat/1065689/posts



Skip to comments.

Al Qaeda again threatens New York, Washington and Los Angeles - Daily Terror Threat
Debka ^ | 11-3-2003 | Staff

Posted on 11/03/2003 9:17:27 AM PST by tubavil

Edited on 01/26/2004 3:58:09 PM PST by Sidebar Moderator. [history]

Monday, November 3, 2003

A new message was posted in the last few hours by the Jeddah-based al-Qaeda-linked Al-Islah (Reform) society calling on Muslims to flee New York, Washington and Los Angeles in advance of major al Qaeda attacks in those cities. This is revealed by DEBKAfile.

The message accuses the United States of predetermining its end (doom) by its policies. ?The Jews rule the Pentagon by remote control and (are the cause) of Muslims being killed in every corner of the world. The United States should therefore expect more blows.?

The message is signed on behalf of the al Bayan (The Threat) movement by ?your warrior brother, Abul Hassan al Khadrami?.

Our Muslim expert identifies the name of the signatory as belonging to a Yemeni from Hadhrameuth, the Bin Ladens? place of origin where Osama enjoys substantial tribal support.

DEBKAfile?s counter-terror sources stress that warnings appearing on these forums are taken both very seriously and with caution by the intelligence services keeping track of the terrorist network?s electronic traffic.

Last November, Jeddah-based fundamentalist forums addressed a message to an Al Qaeda member, saying whoever understands ? understands; whoever knows, knows, but we are marching towards an operation that will take us to Paradise. Three days later, the Mombasa Paradise hotel was blown up killing 12 Kenyans and 3 Israelis and a failed shoulder-launched Strela anti-air missile missed an Israeli airliner at Mombasa airport.

Link to Thread 2


TOPICS: Miscellaneous
KEYWORDS: threatmatrix
Navigation: use the links below to view more comments.
first previous 1-20 ... 9,461-9,4809,481-9,5009,501-9,520 ... 15,461-15,468 next last
To: Revel
Feel free to ping me when you want something translated - I tend to not be up too late at night during the week but will be happy to translate Arabic to English during the day and early evening :)
9,481 posted on 01/12/2004 3:53:52 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9348 | View Replies]

To: LayoutGuru2
I've glanced at the message in Arabic - looks like it has a PGP encrypted message embedded. Tarjim doesn't know what to do with the PGP encryption. Let me get the kids off to school and get a cup of coffee and I'll get started translating shortly.

9,482 posted on 01/12/2004 4:27:01 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9474 | View Replies]

To: Revel; LayoutGuru2; Sean Osborne Lomax; Calpernia; Cindy; JustPiper; FairOpinion
Translation post 14 from Call19 Yahoogroup (Sun 1/11)

In the name of Allah Most Gracious Most Merciful

As we promised, this is part 2 of the lecture address of the taped message, thanks be to Allah.

Jihad is your path to immortality: A wonderful lecture and effective instructions for infiltrates (agents).

Advise on the listening to it and its distribution
Not present in all markets. Rush towards the hidden groups of sheikhs among them Suleiman Boo Ghaith

Part 1 sound file size 5.3 MB
Press here

Part 2 sound file size 5.2 MB
Press here
9,483 posted on 01/12/2004 4:46:37 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9482 | View Replies]

To: StillProud2BeFree; All
OK, I have been absent for the last 500 post or so,my mother and my kids all visited this past weekend and it has been busy.Three birthdays to celebrate and a lot of catching up to do. My oldest got back from Iraq in august and he and his wife are on there way to Oregon for school.With out having to read the last 500 post or so could someone give me a short synopsis of any meaningfull events for the last three days, please, thanks.
9,484 posted on 01/12/2004 4:54:05 AM PST by eastforker (The color of justice is green,just ask Johny Cochran!)
[ Post Reply | Private Reply | To 9482 | View Replies]

To: Revel; LayoutGuru2; Sean Osborne Lomax; Calpernia; Cindy; JustPiper; FairOpinion
Translation post 16 from Call19 Yahoogroup Mon 1/12

This appears to be a poem of some sort.

There she is, the lions of Islam are coming
She dusts off the dust of humiliation and disgrace
She sweeps away hamlet and tyranny
The wind of triumph have blown from their land
Redolent with the scent of their martyrs
With the hurricane strength wind of destruction,
So that she uproots the remnants of the unbelievers
It is Al Faloga
It is the honour land
The land of pride
The striving land and the power


Translation from the graphic says:
On the black flag:
There is no God but Allah
Jihad is the path of honor

Help (support) is coming with the permission (will) of Allah

We have exhausted them and they are ready for your will
9,485 posted on 01/12/2004 5:05:24 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9483 | View Replies]

To: Revel; LayoutGuru2; Sean Osborne Lomax; Calpernia; Cindy; JustPiper; FairOpinion
OK I stand corrected - I was looking at a different post. This one does NOT have PGP embedded in it. My apologies.

Post 15 from Call19 is basically a guide to protecting your computer on the internet. If I were a DHS analyst I would be considering the possibility of a cyberattack - this posting seems to be warning people what steps to take to protect themselves on the internet. I would be concerned about timing.

I've read this and I am going to defer doing a full typed human translation at this point due to time constraints. I have run it through a software translator and am posting that translation for everyone to read. The wording may seem a little strange but I think it's for the most part understandable.

BEGIN TRANSLATION Message 15 Call19, Jan 12, 2004

The security of the Internet

In an atmosphere of the suppression and the silence and the closure and the official masses media failed about the satisfaction of the people needs to the information and the opinion that the Internet became a refuge to who searches for the information and the comment and the bare analysis distant from the interference of the system . And the people resorted to the Internet also because they want the safe platform that makes in it their word a read and their sound heard away from the influence of the ruler . He changed this feeling is with the safety not necessarily in its place then the Internet became not an entrusted network after the arts of the electronic penetration developed and in it the drawing means became numerous . And response to the brothers demands in this side we allocate this bulletin to the Internet security case and postpone our comments on affairs this week to a special appendix that spread it soon God willing . And which the notification for it is necessary that the talk about the securit
y in the Internet the assertion does not become possible in it by a thing a cutting decisive from towards the artistic and therefore the human caution remains a top in this side .

The penetration forms

The Internet user is exposed to several forms from the penetration some of it technical and some of it is human .

The human penetration depends throughout the wit of the user and its confidence in the others and the permission for them with the knowledge of its privacies .

The technical penetration related to three kinds of the penetration,

(1)My system from the authorities in a declared way or not declared, and all of the countries approximately in it are a penetration from this kind including America and Europe countries .

(2)A direct and momentary penetration from power the hackers in it the hacker finds a hole in the user contact outlets and can the wander between files and the user programs and its copying or its reading or the sabotage of the user system or the work of any other grilling .

(3)A penetration by the espionage viruses and he is the more seriousness from the previous where an Alhakr manages the stabilization of espionage virus in the user system and the virus carries out sending information according to the way that was programmed by it .

The browsing

That the provider of the service can theoretically that they follow the employees so that it is about to that turns the application of this service periodically on all . And a reason of the non following the country is its discovery that this following is not practical and therefore the concerned authorities to a deduction early arrived that she abandons the follow-up of the people concerning the void browsing . As an example of an impossibility that follows the movement site readers it became clear that the movement site that tens of thousands visits daily and the hundred thousands from the surfaces its opening take place for example then how does the following of this terrific issue from the people become possible ?

Lowering the files

There are many sites in the Internet displaying files from as different kinds free programs or flashes or books or pictures or other matters . And what these sites were not known and trusted then he prefers not to lowering files takes place from it because some of it full of the espionage viruses .

The partnership is in the sites

The safety depends in the participation in some of the sites ( the forums and what he resembled ) throughout the security of the site and the penetration of the Saudi authorities of it . There are some of the forums that for example the Saudi Arabia Alstat managed its penetration whether an electronic or with employment who shows them its details . In these sites enables the Saudi authorities that she proves on the verses me to the user and perhaps the recognition of it is personally by a more effort few . As for the sites that can not that the country arrives to it then he assumes that it is safe for the participation . And we can that we assert God willing that the reform site is very safe and no danger at all on the participants in it is from that the recognition of Al Ay Bi Ou takes place any information about them . And the movement is ready that she shows who requests from the public information about the safe forums and not safe but we do not prefer that we declare it here .

The electronic mail

If the electronic mail was recorded that in the kingdom ends by a sa. Then this a post open necessarily and its protection does not become possible at all and the Saudi authorities can the arrival at it at any time . As for the registered mail in the other side and specially an Alhotmil or Alyaho then the origin is that the authorities can not the arrival at it but no escape from the measures next its protection from the hackers that may be among them many they do for the sake of the regime .

(1)The post himself prefers not to he declares and if he declares in the forums or another, the advertiser uses except to official matters for it a relation by the forums and a last post arises related to the special use .

(2)He is preferred that she uses a long and difficult Basoord and a change between a moment and other .

(3)He prefers not to the messages remain in the post wallet ( the mentioned box ) and the user maintains its deletion always .

(4)He prefers not to the user corresponds any to the side of he does not know it and do not accept any message and specially the messages laden with the files and takes the initiative in its deletion before its opening .

(5)The user avoids at all the use of its true name or the situation of any information in recording the post that shows its character but the post is declared and known to reasons that concern the work kind .

An Almsangr

The use of an Almasngr spread largely very and an effective tool became to the hackers in the recognition of the employees secrets . And for the safety from Almasngr dangers we advise on the next steps :

(1)If the user is forced that an appointed Masngra is declared then it should assumes that this declared is subject to the penetration and maintains the possession of another Masngr not declared .

(2)Almsangr user avoids the acceptance of the addition of any person or an authority that do not know it because the penetration chance after the addition increases and a more increases after the entrance into a talk .

(3)Almasngr user avoids the acceptance of the files transfer from an Almasngr because the transfer of the file from Almsangr executor does not pass by the operation of the examination on the viruses that take place in the Internet .And this applies until on the persons who trust they them because a person trusted in it its system may be penetrating or injured with the viruses and he do not know

(4)Almasngr user avoids the entrance into a sound talk or the operating of a special camera with the one(s) who do not know them because this service opens holes that the protection programs can not its closure .

(5)The user avoids at all the use of its true name or the situation of any information in an Almasngr that shows its character . Also the indication of any side avoids from its character in its talks to who do not know .

(6)The attention becomes necessary that Almasngr name do not suffice for the judgement on the character of the return but the attention to the post becomes necessary himself because the post is the one that defines Almasngr personality .

(7)The user avoids the pressure on the links that is put to it in an Almsangr because it is with the possibility the knowledge of many of the information about the user system through the pressure on any a connection .

The mind is your just

In the sentence your just applies to the mind what applies on an Almasngr what are except the next points :

(1)For to the general chambers there is no any danger from the merely of these rooms attendance and all what it is said that is for frightening the people from the participation in the mind your just .

(2)For to the participation in the talk in the general chambers the matter depends on the knowledge of the speaker sound only and he is not for it a relation by what is said about the knowledge of the verses by me .

(3)For to the special rooms the technology in it is still not complete and the penetration of these rooms becomes possible if she was clear in the list then therefore he advises who uses these rooms by that he puts it in the list of languages rooms other than the Arabic .

(4)For to the direct talk on a form similar to the telephone in the mind your just there is still in it some of the holes and the safety percentage in it he is not complete .

(5)In the mind your just is found a problem becomes obscure to some of the peoples she is a possibility that the user appears in the name of totally a name resembles another person then the return is deceived by it that where one of them carried out for example the use of a name resembles doctor Saad 's name totally .

The protection culture

He is necessary on all using and keen on the safety of its personal information and on its system and on its contacts and its correspondents that he learns and if a simple thing about the penetration ways as its above clarified it . And with the abundance of saboteurs and corrupt and the spies that follow different sides then is the origin in the interaction with the others is the caution and the non donation of any information she shows the personality or the residence or details about the work kind or the study kind which lead to the recognition of the personality . And the post user or an Almsngr or the mind should abstain your just from the declaration of its name or the facilitation of the arrival of the other employees to it except if the nature of its work was requiring that .

The programs of the direct protection

The programs of the direct protection are from the direct momentary penetration a many and the companies that between it a big competition in the protection power and each user produces he prefers a kind that appeals to it from the programs . But perhaps was is Althon the ÇáÅÑã who the easiest use may be considered from another from the programs and prove its ability for the effective protection from the direct penetration . From the other programs the program of Sikoriti Internet belonging to group Alnortn and do not prevent that the user rides the programs both of .

The protection is from the viruses

Its execution becomes possible by the programs opposite to the viruses and that from a more famous my groan 's Alnortn program is a virus and also the new copies from Althon the ÇáÅÑã . And to who can not the acquisition of an Alnortn with its ability that he gets programs an effective and strong protection he enables its lowering sites in the Internet ( an as I answer Si two torrents ) free copies to limited periods give .

The continuous modernization and a knowledge are the way of the preparation of the protection programs

He is preferred that the Internet user holds a periodic modernization of the protection programs as prefers that dressing and roses that use it in the post change a Walmasngr and the mind your just . And we notify of the necessity of the preparation of the protection programs the preparations suitable to the acquisition at the utmost the safeties degree .

END TRANSLATION







9,486 posted on 01/12/2004 5:25:38 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9482 | View Replies]

To: eastforker
It's basically more cryptic messages and warnings.
Some planes were stolen in Brazil and the pilots murdered, but Brazil is at war with itself and it could be just their having fun, or maybe something with the meeting of the sellout of the Americas.

Looks like they claim that London will go first, and then whatever they plan for here will be next.

Despite the lowering of the alert level, Sean and others are saying it's not safe.

If you haven't gathered survival stocks, it's time. Here in New England, we're about toi have a storm and then the coldest weather in decades, so being prepared is wise, anyway.

Rumours of EOM being caught, but then he/she appears to surface.

Looks like we'll hit ten thousand posts on this thread.
9,487 posted on 01/12/2004 5:47:18 AM PST by the gillman@blacklagoon.com (The only thing standing between the rule of law and anarchy is that conservatives are good losers!)
[ Post Reply | Private Reply | To 9484 | View Replies]

To: Revel; JustPiper; hummingbird
If EOM is anybody then these messages sound a like a warnning of something pretty emminant. EOM seems to be impling that this will be our last night of rest.

I HIGHLY doubt EOM is "real".

I've read the blubber on the CN&Y board for weeks now, and it's always "you're all going to die 'SOON'". "Soon" has been for a long time now.

My opinion is that this person is mentally disturbed and is a "terrorist" in imagination only.

9,488 posted on 01/12/2004 5:51:42 AM PST by jstolzen
[ Post Reply | Private Reply | To 9429 | View Replies]

To: SpoofChicken
that could be a possibility. i think that they had good reason to go down, though. if there is a nuclear attack, and they tried blaming going to yellow on incompetance..

IMHO, there is NO WAY we would go to yellow if we were being threatened with a nuclear attack.

That would be the END of the Administration, and like all pols, these guys are too into getting another term to let something like that happen. Self-preservation of political office dictates proper alignment of alert level with threat, IMHO.

9,489 posted on 01/12/2004 5:55:18 AM PST by jstolzen
[ Post Reply | Private Reply | To 9444 | View Replies]

To: LayoutGuru2
There she is the Islam lions A coming

"She'll be comin' 'round the mountain when she comes..."

???!!!??? This is really getting muddy at best.

9,490 posted on 01/12/2004 5:58:50 AM PST by mhking (MaldiciĆ³n justa.)
[ Post Reply | Private Reply | To 9477 | View Replies]

To: the gillman@blacklagoon.com
Thanks for the update.What kind of planes were stolen?FWIW the events leading up to WWII started several years before we got involved, I think these events today could lead us into WWIII. Quadaffi could see this as well I believe, watch for OBL to try and destroy the house of Saud in a coup attempt and at the same time quida capturing Pakistans nukes.
9,491 posted on 01/12/2004 5:59:18 AM PST by eastforker (The color of justice is green,just ask Johny Cochran!)
[ Post Reply | Private Reply | To 9487 | View Replies]

To: eastforker
They were small planes, if I recall correctly.

Yes, WWII started in the mid thirties, then went dormant a few years til all hell broke loose.

Technically, I consider the cold war WWIII, this will be IV.
It's already on, first will be terrorism and betrayal, then a few smaller operations before it really gets going.

While from a historical perspective, there was no way Germany and Japan could ever have won WWII, and it was very unlikely the Soviets would have survived a hot war, this one we may well lose because we are so divided and so morally weak.

Divided by region, by class,by race, by party, within party,now religon,(Islam in America)and political correctness and cowardice rule the American elites.

And Islam is only the first wave.
9,492 posted on 01/12/2004 6:32:57 AM PST by the gillman@blacklagoon.com (The only thing standing between the rule of law and anarchy is that conservatives are good losers!)
[ Post Reply | Private Reply | To 9491 | View Replies]

To: Revel
In the past he has referenced that he lives in NJ. I'm thinking Bloomfield, NJ. And, that "Death to America" phrase is all too reminiscent of the warning on the Anthrax letters.
9,493 posted on 01/12/2004 6:56:58 AM PST by freeperfromnj
[ Post Reply | Private Reply | To 9424 | View Replies]

To: StillProud2BeFree
>>>>>Post 15 from Call19 is basically a guide to protecting your computer on the internet. If I were a DHS analyst I would be considering the possibility of a cyberattack - this posting seems to be warning people what steps to take to protect themselves on the internet. I would be concerned about timing.



http://news.yahoo.com/news?tmpl=story&u=/cmp/20040112/tc_cmp/17300373

Trojan Horse Poses As Windows XP Update
Sun Jan 11,11:00 PM ET Add Technology - TechWeb to My Yahoo!


Gregg Keizer, TechWeb News

A new Swen-style Trojan horse posing as a critical update from Microsoft has been detected on the Internet, and users who open the e-mail message may find their machines loaded with a back-door Trojan that can steal passwords or be used in conjunction with other systems to conduct major denial-of-service (DoS) attacks.

9,494 posted on 01/12/2004 7:00:13 AM PST by Calpernia (Innocence seldom utters outraged shrieks. Guilt does.)
[ Post Reply | Private Reply | To 9486 | View Replies]

To: jstolzen
Ditto. I think we need to keep our heads about us. The gov't does NOT want to appear incompetent!

I'm not denying that there are diamonds in the rough, but the majority of this information is strictly manure. Granted, the daily threat matrix the president reviews is mostly manure, too, but I don't see him running around in a panic because of some Internet posts. EOM and Daleel WANT to be detected, discovered, etc. That right there has to tell you these guys aren't for real. The perpetrators of 9/11 were extremely discreet (except for that dunderhead Moussaoui -- "Yes, I'd like to learn how to fly a plane, but not how to land". Yeah, I'd like to learn how to drive, but not how to brake.) This is either a diversion, a U.S. intelligence agent trying to draw out sympathizers, or pure fantasy. There are much more salient sources deeper below the surface on the Internet that the gov't is tracking, I guarantee.

That said, it's all very intriguing, and there is a slive of possibility that there is truth among these posts, but not enough of a possibility to keep me up at night.
9,495 posted on 01/12/2004 7:20:12 AM PST by Rutles4Ever
[ Post Reply | Private Reply | To 9489 | View Replies]

To: Rutles4Ever
Everyone here hopes and prays that you are 100% correct.

Stay safe and vigilant!
9,496 posted on 01/12/2004 7:26:33 AM PST by Mossad1967
[ Post Reply | Private Reply | To 9495 | View Replies]

To: jstolzen
The Navy posters with the slogan "Loose Lips Sink Ships" come to mind: If EOM has any real operational knowledge, he's altogether too much of a blabbermouth.

IMHO there are only 3 reasonable possibilities for EOM's identity:

1) A hoax - perhaps some bored college kid somewhere who likes pulling everyone's chains for the fun of it.

2) A net.kook - someone who's mentally disturbed or even insane: perhaps he thinks he's the reincarnation of Saladin or somebody.

3) A propagandist - All of his messages are being posted for purely propaganda purposes. Perhaps he has a real connection with a real organization, perhaps he's a freelancer. Perhaps he hopes to spread fear and advance the terrorist cause (most likely), or perhaps he hopes to eventually discredit them with continual implausibility.

In any event it's quite clear that he can't be taken seriously: If he had real knowledge and was this loose-lipped about actual plans, any intelligence organization with any discipline at all would have seen to it that he was silenced one way or another. On the other hand if he's been tasked with creating FUD (Fear, Uncertainty, and Doubt) then he has no reason for his talk to be connected to actual events (threatened events are sufficient for his purposes). For example, think of Lord Haw Haw during WWII.
9,497 posted on 01/12/2004 7:31:50 AM PST by brucecw
[ Post Reply | Private Reply | To 9488 | View Replies]

To: JustPiper
Revel, these remarks are very disconcerting

Yep I agreee Piper..... But in a way I am also releived a bit too at the same time since nothing happened and the alert has been knocked back down a notch. Now before you and others go scratching your heads about why I would say that I'll explain.

My resoning for being relieved a bit is because I have a strong feeling that they stopped some of the attacks that were supposed to happen and have very good intel on what is to happen next. So they bring the alert down to give the al-jerks a false sense that we are not on our highest guard as we have been.

Now if I'm right then even though the alert is back down a notch publicly it is still at orange privately. This gives somewhat of a greenlight for the terrorists to try and pull off their attacks and our guys can be there waiting to nab them before they pull it off.

I know it sounds like a huge gamble if this is what they are doing but if it is then I hope our guys have their ducks all in a row and get them. Also I could be wrong and they just brought down the alert leaving us exposed to a hell on earth senario in some parts of the country. Let's just hope I'm at least half-ass right!!!
9,498 posted on 01/12/2004 7:51:16 AM PST by RepublicanArmy (God bless our Troops, Our President, & God Bless America!!!)
[ Post Reply | Private Reply | To 9360 | View Replies]

To: RepublicanArmy
have very good intel on what is to happen next. So they bring the alert down to give the al-jerks a false sense that we are not on our highest guard as we have been.

Seems very plausible and I think your more than 1/2 @ssed right ;)

9,499 posted on 01/12/2004 8:05:42 AM PST by JustPiper (Register Independent and Write-In Tancredo for March !!!!)
[ Post Reply | Private Reply | To 9498 | View Replies]

To: Calpernia
>>>IF a small plane is flying over a residential neighborhood..is it ALWAYS on someone's radar? Or, just if it's around an airport (and picked up by airtraffic control)? HOTD, can you answer that?

I am not sure what the issue is here, but there are lots of places where there is no radar coverage, or where there is definately not good radar all the way to the ground due to terrain or even city ground clutter. The ATC centers would adjust their radars to not see ground clutter, or even lower traffic that is not their concern. Better to only divide one's attention to what one needs to see. So, in the realm of many sight-seeing and VFR traffic that is within a thousand feet or two.... they may or may not be seen.

Also... VFR and uncontrolled traffic does not send a unique 'ping'... Planes who are not required to be tracked all ping the same VFR code 1200... ATC can see them, assuming they are high enough, and direct their controlled traffic around them, but they do not ~watch~ or keep track of where they are going. Only if they are entering airspace that is controlled, such as an Aiport Traffic Area, would they pay a lot of attention to a plane that is not in contact.

9,500 posted on 01/12/2004 8:05:52 AM PST by HairOfTheDog (Off to Entmoot!)
[ Post Reply | Private Reply | To 9359 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 9,461-9,4809,481-9,5009,501-9,520 ... 15,461-15,468 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson