Free Republic
Browse · Search
News/Activism
Topics · Post Article

This thread has been locked, it will not receive new replies.
Locked on 08/02/2004 5:38:02 PM PDT by Admin Moderator, reason:

Thread Sixteen: http://www.freerepublic.com/focus/news/1183755/posts



Skip to comments.

Threat Matrix: Daily Terror Threat - Thread Fifteen
CNN ^ | 07/25/04 | N/A

Posted on 07/24/2004 9:37:20 PM PDT by JustPiper

Edited on 07/25/2004 2:39:52 PM PDT by Admin Moderator. [history]

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 3,681-3,7003,701-3,7203,721-3,740 ... 4,101-4,115 next last
To: DAVEY CROCKETT

Absolutely an excellent, astounding and well-written post!!


3,701 posted on 08/01/2004 8:40:51 PM PDT by Indie (Ignorance of the truth is no excuse for stupidity.)
[ Post Reply | Private Reply | To 3679 | View Replies]

To: DAVEY CROCKETT

WOW!


3,702 posted on 08/01/2004 8:47:23 PM PDT by Imperialist
[ Post Reply | Private Reply | To 3686 | View Replies]

To: DAVEY CROCKETT

Both of those posters are too eloquent not to be the real deal.


3,703 posted on 08/01/2004 8:49:11 PM PDT by Indie (Ignorance of the truth is no excuse for stupidity.)
[ Post Reply | Private Reply | To 3699 | View Replies]

To: BagCamAddict

Excellent point, thanks BCA.


3,704 posted on 08/01/2004 8:50:40 PM PDT by Oorang ( Those who trade liberty for security have neither)
[ Post Reply | Private Reply | To 3654 | View Replies]

To: All

WARNING FROM IH INTERRESTING...

Re: Messages, Coding, Hiding




The coding at the Islamic groups - do he is really an useful ? ( a message of the sharp camp )

First I beg the supervisor the non deletion of the subject because I see it a political subject from the side of the work of the political groups

I love that I notify the brothers the supervisors on the sharp camp concerning the coding subject that mentioned in the number 15
- the mentioned ways are for the coding primitives and unsafe at all with all respect to the subject writer Saif Aladl

- is using more complicated ways from that by many in the First World War between the countries, and they have succeeded in breaking codes many of them,

- he can any university student in the specialization of the mathematics and has taken a subject into the coding science basics that he clarifies a code the mentioned Baltriqtan complied with the number by means of statistical information about the used language ( the used letters with abundance in any language )

- from the safe ways now for the coding the use of AES way - 128, and she is a complicated mathematical way, and the use of any program is possible for coding any file at you by that wording
There are many of the free programs that carry out this work like Axcrypt program

The butter : I do not advise at all on use the mentioned ways by the magazine, but it used any program that uses the mentioned way,

Also the mentioned way in another Islamic site ( I believe that it is the site of the army of the Sunna supporters ) or he is properly speaking a done program by one of the brothers it carries out the exchange of the letters for other letters
I say that that way is unsafe at all




Coding favoured that suited it he that it does not use the coding at all

And he used an allowance about it the camouflage and the blackout and the concealment



The dear sir is terrorist¡

Layta you clarify your viewpoint a more is !Why does she think that the coding is not useful ? even if it was with a power that exceeds 500 bits¿

And what means with the camouflage ? does she mean what knows Steganography mind ¿ any hiding the information inside a picture or the file of my sound¿

Allah guided you and benefitted in your knowledge ..




The coding many kinds, their simpler are the exchange of the message letters by other letters with the use of a specific key,
An example :
The message :
He met me in a specific place
The key : a change the ( Þ ) by a letter the ( í ), a governor ( Ç ) by an edge ( ä ) and so to all of the letters
She becomes the coded message :
Ynskhzkh Thkh Kgnz Kaoukhz
This way names or
Simple Substitution Cipher

And to she disconnects the thesis, should know the key ( each letter by what was replaced )
And this the simplest ways of the coding and their use has started since more than 150 years

And the way of dismantling the coded message very simple ( without that it has the key ) but it takes for some time ( from 6 - 7 hours )

The idea is that it in each language letter is found they are used with more than abundance the other letters, for example, in the English the e letter on what mention I am the most using letters ( more than recurs all other letters ) then comes after it in the repetition other letters,
With the use of these statistical information, the clarification of the code is possible very simple about noticeable way with more letters a repetition, ( all the blade not was longer all their dismantling not was below, this for the mentioned way at the beginning of my subject )

Why he became possible breaking the blade ¿ ¿ simply because the coded message herself carries many of the information ( the repetition of the letters )

A return to the main subject : the mentioned ways in the sharp camp do not differ many about this way, where that each letter takes place its exchange for another letter, then the change of the letters places takes place ( this is the additional thing )
She way similar to this is used in the international war by the century beginning, and the clarification of all its codes have taken place

To the brother Vailed Knight
I did not mean at all what mentioned from that the coding not Majdi, all I not was meaning that I clarify it he is that the coding ways are very many, from them the simple, and from them the object and from them what is he the easy of the breaking and from them what is he the difficult of the breaking ( reaching a way did not take place for his breaking as he is the state with AES way )
And my subject was an expression about a warning that the mentioned coding way in the last issue from the sharp is not strong at all, and very a possible broke it ( as in the way Allti in the first example )

The study of the Internet is possible about the AES way working way and its basics
And the brotherhood in the sharp they do not need the knowledge of its technical details, but that enables them if they wanted
She is found many of the programs that uses the AES way for coding the files, and the use of these programs is possible with safety

And he grieved if my explanation was not understood
To more of the information study the Internet about
Cryptography
simple substitution cipher
polyalphabatic cipher
AES

To the brother a terrorist :
The camouflage is good, but there is the AES way as mentioned then she is safe

And I suggest that she writes the thesis in a file and a prayer for example or any other wording, then it codes the file by any program with the use of that wording

Then the sole way becomes for the return of the file to its original wording before the coding by means of the password, if it was lost, with it the message was lost

As finds programs enable you making the key ( or the password ) more than part

In other words, if there is a message, and no the divine decree the enemy could that the message holder at it that does not can dismantling the thesis and its reading except at the knowledge of the password afflicts you
And if she was more than part, then sends the leader two messengers, one of them he carries the thesis with part of the password, and the other carries the other part from the password, then no enables to the enemy the reading of the message except after the arrest of the two persons that know both of the parts from the password, the leader Al-Zarqawi if he used this way, what the Americans managed the reading of his message directed to the sheikh Ben Laden




To who did not understand the first example, this a clarification of the simplest ways of the coding and the blade breaking way
http://www.trincoll.edu/depts/cpsc/...ubstitution.htm

I love that I hint that there are free programs by the Internet that carries out breaking the mentioned way of the coding, and I have passed on some of them sometime ago



The In the Name of Allah Most Gracious Most Merciful
I praise him and invoke peace upon its noble messenger and after :


The generous brother is Mofateh :

There is more than from a famous Khwarizmi for the coding from it for example :




DES

triple DES

RC4

RC5

AES



And other many, this is in the coding, as for sending the messages then there many ways from their more important are the way of the general and special keys

And its idea is that the sheikh Osama possesses two keys one of them are special he does not know of him one of and the others are a year that all of the peoples possesses

, if he wants that he spreads a message of the Muslims, he codes it ( or drops it electronically ) by its special key, if it opened the message it is not opened except by Moftah the general sheikh

Then when since the future makes sure that it is from the sheikh ( because the secret key that only the sheikh knows alone )

And if the future wants that it answers the sheikh, it codes the response by the key general to the sheikh and who clarifies its coding of only the key related to Abu Abd Allah

That is Ok I the time urgent Wmrtbsh takes this connection and two dimensions we agree

http://www.pgp.com/products/freeware.html

Goodbye
__________________


3,705 posted on 08/01/2004 8:55:23 PM PDT by DAVEY CROCKETT (There is no such thing as coincidence, GOD is in control.)
[ Post Reply | Private Reply | To 3700 | View Replies]

To: Oorang

bump


3,706 posted on 08/01/2004 8:55:42 PM PDT by null and void (Nothing like a near-death experience to change bad habits...)
[ Post Reply | Private Reply | To 3704 | View Replies]

To: MamaDearest

Great Advice!


3,707 posted on 08/01/2004 8:56:14 PM PDT by JustPiper
[ Post Reply | Private Reply | To 2089 | View Replies]

To: DAVEY CROCKETT
"You might find out they are Jew's. Just a guess no agenda on my part."

I know you don't have an agenda; but really that is a popular myth, that all the big bankers are Jews. It's one of the myths that Hitler used to vault himself into the German leadership, by blaming Germany's economic woes after WWI on "Jewish Bankers."

The most powerful world bank consortium is the House of Rothschild. True, they are Jewish and that's how myths get started, with a grain of truth. I would think however, that the buildings you speak of in this country are probably owned by the Hose of Morgan....as in J.P. Morgan.

3,708 posted on 08/01/2004 8:57:51 PM PDT by ExSoldier (M1A: Any mission. Any conditions. Any foe. At any range.)
[ Post Reply | Private Reply | To 3700 | View Replies]

To: Bethshaya

THANKS.


3,709 posted on 08/01/2004 8:58:18 PM PDT by Quix (PRAYER WARRIORS, DO YOUR STUFF! LIVES, SOULS AND NATIONS DEPEND ON IT)
[ Post Reply | Private Reply | To 3509 | View Replies]

To: WestCoastGal

Hey also:
Chief'sCoCoGal ;)


3,710 posted on 08/01/2004 8:59:06 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3610 | View Replies]

To: JellyJam; All

Any NewYorkers or anyone in the NYC area please keep us updated to how things appear to you please


3,711 posted on 08/01/2004 9:00:13 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3612 | View Replies]

To: DAVEY CROCKETT

"May Allah destroy the myth of the superpower and turn America into a shadow of it's former self"

To the POS author (not you Davey): THAT WILL NEVER HAPPEN.


3,712 posted on 08/01/2004 9:01:14 PM PDT by Imperialist
[ Post Reply | Private Reply | To 3696 | View Replies]

To: JellyJam
Too risky. If they dared to eat on the metro they would be arrested imediately. Imaging trying to lug a heavy suitcase up one of the many broken Metro escalators.

Much less risky to drive a car, as long as you don't use a hand held cell phone, or run a red light or speed or park illegally.

3,713 posted on 08/01/2004 9:02:06 PM PDT by relee
[ Post Reply | Private Reply | To 3684 | View Replies]

To: crabbie

Thank you sweets! I know I'm always asking them to park it next to you!


3,714 posted on 08/01/2004 9:02:55 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3616 | View Replies]

To: ExSoldier

hhhummmm have to think of another idea now:)


3,715 posted on 08/01/2004 9:08:26 PM PDT by DAVEY CROCKETT (There is no such thing as coincidence, GOD is in control.)
[ Post Reply | Private Reply | To 3708 | View Replies]

To: MamaDearest

Thank you for noticing ~Hugz


3,716 posted on 08/01/2004 9:08:45 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3626 | View Replies]

To: JustPiper

My friends who know him personally insist he's one of the highest quality people they know. They insist he's NO screwball.


3,717 posted on 08/01/2004 9:09:02 PM PDT by Quix (PRAYER WARRIORS, DO YOUR STUFF! LIVES, SOULS AND NATIONS DEPEND ON IT)
[ Post Reply | Private Reply | To 3545 | View Replies]

To: thecabal

Hope you are happy about the move J! I will be looking for you!


3,718 posted on 08/01/2004 9:09:42 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3630 | View Replies]

To: Indie

Ireland Dr. P? ;)


3,719 posted on 08/01/2004 9:10:29 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3635 | View Replies]

To: nwctwx

Not good for my town but I honestly believe they will be going to plan B


3,720 posted on 08/01/2004 9:16:26 PM PDT by JustPiper
[ Post Reply | Private Reply | To 3656 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 3,681-3,7003,701-3,7203,721-3,740 ... 4,101-4,115 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson