This thread has been locked, it will not receive new replies. |
Locked on 07/25/2004 12:30:06 PM PDT by Admin Moderator, reason:
Thread FIFTEEN: http://www.freerepublic.com/focus/f-news/1178024/posts |
Posted on 07/18/2004 6:57:48 PM PDT by JustPiper
ON THE NET...
http://alfalluja.3.forumer.com/index.php?s=a7a30e138d5b50ecd3df81aab354dedb&showtopic=435
http://firdaws.reco.ws/
http://firdaws.virtue.nu/
http://alfirdaws.envy.nu/
http://www.amrkhaled.net/
http://www.anashed.net/anashed/
Thank you for posting this, the Clinto mecury spill leaves alot to be answered IMO with the update I posted
WSJ: Berger Took Secret 9/11 Docs on Five Occasions
http://www.newsmax.com/archives/ic/2004/7/20/110408.shtml
Laughing....
Cyber-Attacks by Al Qaeda Feared
Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say
Late last fall, Detective Chris Hsiung of the Mountain View, Calif., police department began investigating a suspicious pattern of surveillance against Silicon Valley computers. From the Middle East and South Asia, unknown browsers were exploring the digital systems used to manage Bay Area utilities and government offices. Hsiung, a specialist in high-technology crime, alerted the FBI's San Francisco computer intrusion squad.
Working with experts at the Lawrence Livermore National Laboratory, the FBI traced trails of a broader reconnaissance. A forensic summary of the investigation, prepared in the Defense Department, said the bureau found "multiple casings of sites" nationwide. Routed through telecommunications switches in Saudi Arabia, Indonesia and Pakistan, the visitors studied emergency telephone systems, electrical generation and transmission, water storage and distribution, nuclear power plants and gas facilities.
Some of the probes suggested planning for a conventional attack, U.S. officials said. But others homed in on a class of digital devices that allow remote control of services such as fire dispatch and of equipment such as pipelines. More information about those devices - and how to program them - turned up on al Qaeda computers seized this year, according to law enforcement and national security officials.
Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshold of using the Internet as a direct instrument of bloodshed. The new threat bears little resemblance to familiar financial disruptions by hackers responsible for viruses and worms. It comes instead at the meeting points of computers and the physical structures they control.
U.S. analysts believe that by disabling or taking command of the floodgates in a dam, for example, or of substations handling 300,000 volts of electric power, an intruder could use virtual tools to destroy real-world lives and property. They surmise, with limited evidence, that al Qaeda aims to employ those techniques in synchrony with "kinetic weapons" such as explosives.
"The event I fear most is a physical attack in conjunction with a successful cyber-attack on the responders' 911 system or on the power grid," Ronald Dick, director of the FBI's National Infrastructure Protection Center, told a closed gathering of corporate security executives hosted by Infraguard in Niagara Falls on June 12.
In an interview, Dick said those additions to a conventional al Qaeda attack might mean that "the first responders couldn't get there . . . and water didn't flow, hospitals didn't have power. Is that an unreasonable scenario? Not in this world. And that keeps me awake at night." (Snipped)
Officials said Osama bin Laden's operatives have nothing like the proficiency in information war of the most sophisticated nations. But al Qaeda is now judged to be considerably more capable than analysts believed a year ago. And its intentions are unrelentingly aimed at inflicting catastrophic harm.
One al Qaeda laptop found in Afghanistan, sources said, had made multiple visits to a French site run by the Societé Anonyme, or Anonymous Society. The site offers a two-volume online "Sabotage Handbook" with sections on tools of the trade, planning a hit, switch gear and instrumentation, anti-surveillance methods and advanced techniques. In Islamic chat rooms, other computers linked to al Qaeda had access to "cracking" tools used to search out networked computers, scan for security flaws and exploit them to gain entry -- or full command.
Most significantly, perhaps, U.S. investigators have found evidence in the logs that mark a browser's path through the Internet that al Qaeda operators spent time on sites that offer software and programming instructions for the digital switches that run power, water, transport and communications grids. In some interrogations, the most recent of which was reported to policymakers last week, al Qaeda prisoners have described intentions, in general terms, to use those tools. (snipped)
A computer seized at an al Qaeda office contained models of a dam, made with structural architecture and engineering software, that enabled the planners to simulate its catastrophic failure. Bush administration officials, who discussed the find, declined to say whether they had identified a specific dam as a target. (snipped)
To destroy a dam physically would require "tons of explosives," Assistant Attorney General Michael Chertoff said a year ago. To breach it from cyberspace is not out of the question. In 1998, a 12-year-old hacker, exploring on a lark, broke into the computer system that runs Arizona's Roosevelt Dam. He did not know or care, but federal authorities said he had complete command of the SCADA system controlling the dam's massive floodgates.
Roosevelt Dam holds back as much as 1.5 million acre-feet of water, or 489 trillion gallons. That volume could theoretically cover the city of Phoenix, down river, to a height of five feet. In practice, that could not happen. Before the water reached the Arizona capital, the rampant Salt River would spend most of itself in a flood plain encompassing the cities of Mesa and Tempe with a combined population of nearly a million.
Bush has launched a top-priority research program at the Livermore, Sandia and Los Alamos labs to improve safeguards in the estimated 3 million SCADA systems in use. But many of the systems rely on instantaneous responses and cannot tolerate authentication delays. And the devices deployed now lack the memory and bandwidth to use techniques such as "integrity checks" that are standard elsewhere.
In a book-length Electricity Infrastructure Security Assessment, the industry concluded on Jan. 7 that "it may not be possible to provide sufficient security when using the Internet for power system control." Power companies, it said, will probably have to build a parallel private network for themselves.(snipped)
The U.S. government may never have fought a war with so little power in the battlefield. That became clear again on Feb. 7, when Clarke and his vice-chairman at the critical infrastructure board, Howard A. Schmidt, arrived in the Oval Office.
They told the president that researchers in Finland had identified a serious security hole in the Internet's standard language for routing data through switches. A government threat team found implications -- for air traffic control and civilian and military phone links, among others -- that were more serious still.
"We've got troops on the ground in Afghanistan and we've got communication systems that we all depend on that, at that time, were vulnerable," Schmidt recalled. (snipped)
http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26?
BOTTLE Bombs Warning
WROC - Rochester,NY,USA
Last night, two homemade pipe bombs exploded on Lover's Lane Road in Batavia.
A third bomb was also discovered. Authorities say ...
http://www.wroctv.com/news/story.asp?id=14333&r=l
PROBLEM with "bottle bombs" in Syracuse
Capital News 9 - Albany,NY,USA
Police in Syracuse are concerned about a problem with "bottle bombs." A bottle bomb is basically a mix of chemicals in a soda bottle, that cause an explosion. ...
http://www.capitalnews9.com/content/headlines/?ArID=85024&SecID=33
UNEXPLODED ORDNANCE FOUND AT PLUM TREE ISLAND
BOMBS litter refuge
Hampton Roads Daily Press - Newport,VA,USA
... McCauley said. They found about 40 pieces of bombs, each estimated to weigh 100 pounds or more, in various stages of decomposition. "We ...
http://www.dailypress.com/news/local/dp-46954sy0jul20,0,6031420.story?coll=dp-news-local-final
FIRE Bombs
WIFR - Rockford,IL,USA
... fire. The question is whether this weekend's fire bomb is random or gang related. Gasoline fire bombs strike again. Early Sunday ...
http://www.wifr.com/home/headlines/887432.html
"WHO WANTS TO EMAIL AL-QAEDA?"
http://www.e-prism.org/images/PRISM_no_2_vol_2_-_Who_Wants_to_Email_Al-Qaeda.pdf
Thank you JP.
LINKS OF INTEREST
http://www.truthusa.com/LinksOfInterest.html
Works for me.
Let ScubaTeddy lead the group there with snorkels only.
CLINTON aide removed terror memos
BBC News - London,England,UK
... It was during this work, according to Mr Berger and his lawyers, that he removed notes he had made about the anti-terror papers he consulted.
http://news.bbc.co.uk/2/hi/americas/3909659.stm
HEATHROW anti-terror plan found
Gulf Daily News - Manama,Bahrain
... an interview with a junior government minister advising the public to stock up on food and other emergency supplies in case of a possible terror attack. ...
http://www.gulf-daily-news.com/Story.asp?Article=87265&Sn=WORL&IssueID=27122
US digs for Iran link to terror cells
The Australian - Australia
... Mr Bush claimed Iran was already harbouring al-Qa'ida leaders who had fled there after the Afghanistan war, aiding the Hezbollah anti-Israel terror group and ...
http://www.theaustralian.news.com.au/common/story_page/0,5744,10199145%255E2703,00.html
RUSSIA Seeks Another Extension for Destroying Chemical Weapons
Cybercast News Service - USA
... He has also pointed out that apart from seven official storage facilities,hundreds of caches of old chemical weapons randomly buried throughout the former ...
http://www.cnsnews.com/ViewForeignBureaus.asp?Page=%5CForeignBureaus%5Carchive%5C200407%5CFOR20040720c.html
IT'S Not The People's Republic of Al-Qaeda
Useless-Knowledge.com - USA
... Please sight me chapter and verse those that approve be-heading civilians,using religious centers as ammunition storage facilities, training children of ten ...
http://www.useless-knowledge.com/articles/apr/july175.html
Welcome to our TM Bo ;)
Fine with me.
Perhaps Siberia for the UN.
Or maybe hell.
Bill Gertz lived, breathed, never slept the Clinton China sellout, check out his site Ma
Any clue Jill, to the date of the death?
Uhhh, am interested in novel keyboards.
What's with this one?
This information is especially concerning given the number of power outages around the country. Many have suspected cyber-terrorism in these outages, and this article from the Washington Post seems to add weight to those suspicions.
Where did you go?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.