Posted on 06/24/2004 12:40:07 AM PDT by JustPiper
Picture credit: TheCabal
"I will never cower before any master nor bend to any threat"
Iran seeks swap of Brits for suicide attackers
Report says 40 Revolutionary Guard 'volunteers' held by UK
Iran apprehended British military personnel and Navy vessels earlier this week in order to secure release of 40 "suicide operations volunteers" held by the UK, according to an Iranian Revolutionary Guard source.
The source told the London Arabic-language daily Al-Sharq Al-Awsat that the British Army command in Iraq received the demand from the Revolutionary Guard, reported the Middle East Media Research Institute.
According to the source, the content of the message was very simple: "Release our comrades, whom you are holding, and we will release your soldiers."
We are the "Stotters" who make ourselves aware of the enemy who wishes to do us harm
Hmmmm. Why am I not surprised.
Think: If there was no 4x4 or off road capability, then there would be no way to get to the hunting grounds and no way to transport a dead animal back home. Thus no "sporting need" to own what will instantly become an ultra accurate long range SNIPER RIFLE.
If the Gov't suddenly goes into a martial law scenario, then it's easier to get control if folks don't have access to 4x4 so they can take the zillions of unmarked (on maps) and unpaved local county roads to circumvent any road blocks that may be set up. How's THAT for tinfoil hattery?
"FBI WARNS OF FLOATING BOMB DEVICES"
And all those cities we listed on TM that are on the water....'
_____
And the above all fits with part of what the Cuba article I translated inferred that their marine tests were likely being used by higher up folk to test sending things via water from the coasts of Cuba to the Gulf type area of the US... Not that that necessarily really will happen...but...just thought of that since I just read that article. At least another possible scenario at some point.
Hey! The same Cuba guy I just translated (just different articles)...
Wonder if he speaks English or if the site you got the English one from translated it...perhaps some of the others are actually in English already.
If you guys want the Cuba stuff, another thing I thought of instead of just translating it straightaway, is that I could list all the titles (translated) and then if there are ones you guys think are relevant I could do those? Maybe that's a better solution?
Anyway, that article you posted was very interesting...and after I read those others it's definitely frightening the potential Cuba has...I think they're oftentimes a little overlooked.
I always will run something through a machine to double check my 'human' translation, especially if there is a part where it just doesn't 'sound' right to me...and I had to chuckle that it always switches Castro to the verb connected with castration :-) Hee, hee!
"ALSO, this morning MSNBC reported there are videos of children practicing beheadings which came from the same mosque that Moussaoui and Richard Reid belonged to. How's that for the religion of peace???"
WHAT!
Bulldoz the Terror Mosque immediately. ZERO TOLERANCE.
bookmark
"Wonder where Cuba got all the money to do all this..."
OPINION-SPECULATION: China, Venezuela, maybe Russia, maybe Iran....just a guess....
New attack hitting Web users through major sites
James Niccolai, IDG News Service
25/06/2004 11:21:43
Internet users visiting some of the most popular sites on the Web may unwittingly be downloading malicious code that compromises their computers and sets up a relay network for a future onslaught of spam, a security services company warned Thursday.
NetSec, which provides managed security services for large businesses and government agencies, began detecting suspicious traffic on several of its customers' networks on Thursday morning, said Chief Technology Officer Brent Houlahan.
Examining firewall logs and other data points on those networks, NetSec found that when users visit certain popular Web sites -- including an online auction, a search engine and a comparison shopping site -- they unwittingly download a piece of malicious JavaScript code attached to an image or graphics file on the site.
Without the user's knowledge, the code connects their PC to one of two IP (Internet Protocol) addresses in North America and Russia. From those systems they unknowingly download a piece of malicious code that appears to install a keystroke reader and probably some other malicious code on the computer, Houlahan said.
The code may be gathering the addresses of Web sites visited by affected users and the passwords used to access them. In addition, the IP address in Russia is a known source of spam, and the code may be creating a network of infected machines that could be used to relay spam across the Internet at some later date, he said.
He stressed that NetSec is still examining the code and has yet to determine the exact payload or the intent of the attack. The SANS Institute is also studying the outbreak, he said.
NetSec declined to name the affected Web sites for liability reasons but said they are "big, big sites." It is probably the Web hosting facilities that cache content for those sites that are infected, rather than the "origin servers" at the Internet service providers themselves, Houlahan said.
"The tricks used in this particular attack method are nothing new. What's significant about this is the fact that it impacts major Web hosting facilities," said Dan Frasnelli, who manages NetSec's technical assistance center.
The attack affects only users running Microsoft's Windows operating system and Internet Explorer browser, he said. It was unclear Thursday how the attack originated, but it may exploit a known vulnerability in Microsoft's IIS (Internet Information Services) Web Server software at the Web hosting facilities, Frasnelli said.
It was also unclear Thursday afternoon how many systems had been compromised and how widespread was the problem. NetSec said it had protected its own customers by writing custom intrusion detection signatures and blocking its customers' PCs from visiting the IP addresses involved in the attack.
"There's a potential for widespread impact because currently the (antivirus) vendors don't have a signature for it," Frasnelli said.
http://www.computerworld.com.au/index.php/id;161263733;fp;16;fpid;0
PHP-Nuke Multiple Vulnerabilities
Secunia, UK - Jun 14, 2004
Janek Vind has reported multiple vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose path ...
http://news.google.com/news?hl=en&edition=us&ie=ascii&q=PHP-nuke+&btnG=Search+News
IF YOU ARE A PRAYER WARRIOR,
Please consider doing something about the Cuba hazard.
Please read the message at post #39 on thread:
http://www.freerepublic.com/focus/f-chat/1157571/posts
re Castro's request for a prayer team to pray for his cancer and for some Native Americans to explain their reasons for becoming Christians. The prayer team is in Cuba now and will return 29 June. They need our support. This could radically change out the Cuban hazard for looming WWIII scenarios.
How can we check. What can we do?
It is very noisey tonight and has been since yesterday. Now I don't know if it is because I read the TM before I left work, but tonight feels weird. I have also noticed more police cars and helicopters. A little while ago while thinking about the weirdness, not quite right, feeling I had the thought of "What would they gain launching their terror strike tomorrow?" I would think next week would be better because as I read on here the NATO Summit and Iraq handover happen. However, if they struck then these things would not happen. I don't know just some thoughts and tonight really does feel weird.
I will pray for the prayer team.
Thank you Quix.
where in CA do you live? I couldnt sleep last night....woke up at 4am wondering if things were going on.
Big thanks to you.
Much appreciated.
Nemo?
That's interesting.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.