Skip to comments.
Threat Matrix: Daily Terror Threat - Thread Sixteen
Yahoo ^
| 8-02-04
| AP
Posted on 08/02/2004 5:12:31 PM PDT by JustPiper
TOPICS: News/Current Events; War on Terror
KEYWORDS: muslims; terror; threatmatrix; threats
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120, 121-140, 141-160 ... 4,001-4,012 next last
To: cajungirl
It is great to have you here. I have seen your posts here on TM (early on, I believe) and especially on other FR threads.
To: JustPiper
Heavenly Father, we return to give You thanks for the dedication shown by those who guide these threads and for those who post. The information is invaluable, O God, for extraordinary analysis has gone into formulating possible scenarios from which we glean ways to keep our nation and our communities and our loved ones safer. Continue to guide us in abilities to discern and assess and project, for our need is to defeat an enemy who wishes to remain hidden.
May wisdom fall mightily upon all those charged with our security ... from the highest in office to the citizen on the street ... cause the enemy to be drawn out before his plan of devastation can be enacted. Thank You that we can continue to go about the ordinary details of our lives, but may it be with an increased awareness of the potential danger around us. We offer our prayers of praise and thanksgiving for those who have averted many disasters that have been wished upon us ... how extraordinarily fatiguing it is, O God, to maintain this level of awareness for endless days. Give respite to those who serve ... refresh them anew with others who are willing to take hold of this task.
Merciful Father, we grieve that our country is targeted for slaughter ... that our beloved leaders are at risk ... that the blood of our countrymen could be spilled in our towns and cities for no other reason than we are Americans. But it is because we are Americans that we have hope ... our beloved country has been blessed by You since its founding. Our years of history are marked by the blood of patriots who have defended liberty and freedom ... it is now our task to decimate the evil that is upon us and to erase it from our soil and our shores. Lead us in battle, Almighty God, for the cause is just; grant victory, that we might continue to be One Nation Under God. In the Name of Jesus, I pray, Amen ...
122
posted on
08/02/2004 8:27:37 PM PDT
by
Pegita
('Tis so sweet to trust in Jesus, just to take Him at His Word ...)
To: cibco; judicial meanz; ExSoldier; Myrddin; All
We may be missing something here.
Never EVER put all of your eggs in one basket. Redundancy is absolutely critical to any system. JM knows what I mean.
Let's say they have 2 more methods for communication, each of different types. That's no arbitrary, 2 easy ones come to mind.
Let's also consider the possibility that this is the tip of the iceberg; consider that there are at least 3 methods of communication overall for each plan, and backup personnel. There are probably secondary and tertiary targets as well.
If we play with the 70,000 number that ExSoldier supplied, how many plans may be in place at once, all using these same type of system?
This particular warning has the "financial" theme. What other themes are there that we need to look at NOW? What targets within those themes?
123
posted on
08/02/2004 8:29:12 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: BagCamAddict
Well then let's be sure to broadcast it on the internet. ;-)Unless you know something I don't. I was just talking in generalities about the primary vulnerability of one time pads - I have no earthly idea if we've been that lucky. It's a rather obvious vulnerability too, so it's not even as if writing about it ought to surprise anyone.
But of course one of the fallibilities of human nature is the belief that one's own plans will always proceed as anticipated, so that (in this case) they might not have worried enough about their worst enemy getting hold of all their computer data.
Take care. :-)
124
posted on
08/02/2004 8:29:13 PM PDT
by
brucecw
To: JustPiper
Great site again, Kinetic and JP! Can't believe we are up to #16.
Any thoughts of a one year anniversary special, especially if our country has remained safe?
125
posted on
08/02/2004 8:33:15 PM PDT
by
crabbie
To: All
OK one more time, new volunteers.
UPDATED EMERGENCY CONTACT LIST
MamaDearest --------- Idaho
judicial meanz --------- Virginia
JustPiper -------------- Illinois
thecabal ---------------Oregon (ham op)
Rickylc-----------------Michigan
all4one-----------------Pennsylvania
tmp02------------------Maryland
Honestly ---------------Kansas City
mfccinsd ---------------San Diego
little jeremiah-----------Oregon
WestCoastGal ---------Palm Springs, California
drymans wife-----------Missouri
Donna Lee Nardo------NY/NE
ExSoldier--------------Miami, Florida
Quix-------------------NW New Mexico
nwctwx----------------Connecticut
Gorilla Ma-------------Minnesota
freeperfromnj----------NY/NJ
RushmoreRocks-------Western SD & Eastern Wyoming
flutters-----------------Columbus, Ohio
Chaos-----------------SE Tennessee
Grammy---------------Tennessee (ham op)
null and void-----------California Silicon Valley
Indie-------------------Dallas/Ft Worth Texas
HipShot---------------Tennessee
DAVEY CROCKETT Georgia & Western NC
Thanks to all who volunteered!!! Anyone who wishes to can check in with these FReeper volunteers to let them know you live in their area.
126
posted on
08/02/2004 8:35:20 PM PDT
by
WestCoastGal
(aka Coco ****** Love, Freeping & Nascar >>>>>>>> How Bad Have You Got It????)
To: JustPiper; pauldingbabe
I'm not a big fan of wishing happy birthday to anyone, but y'all have a GREAT day!
Birthdays were only mentioned twice in the bible, and they both involved beheadings. (The Baker and John the Baptist).
127
posted on
08/02/2004 8:36:31 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: WestCoastGal; All
BTW, I'm in NE Tennessee, Knox-Sevier-Blount counties area. Sorry I wasn't more specific.
128
posted on
08/02/2004 8:38:24 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: All
Codes anyone? Here is another great find by Casey over at It's Happening (machine translated message on Arabic forum). Casey posted it yesterday. I will post the followup message she found next.
***
Re: Messages, Coding, Hiding
The coding at the Islamic groups - do he is really an useful ? ( a message of the sharp camp )
First I beg the supervisor the non deletion of the subject because I see it a political subject from the side of the work of the political groups
I love that I notify the brothers the supervisors on the sharp camp concerning the coding subject that mentioned in the number 15
- the mentioned ways are for the coding primitives and unsafe at all with all respect to the subject writer Saif Aladl
- is using more complicated ways from that by many in the First World War between the countries, and they have succeeded in breaking codes many of them,
- he can any university student in the specialization of the mathematics and has taken a subject into the coding science basics that he clarifies a code the mentioned Baltriqtan complied with the number by means of statistical information about the used language ( the used letters with abundance in any language )
- from the safe ways now for the coding the use of AES way - 128, and she is a complicated mathematical way, and the use of any program is possible for coding any file at you by that wording
There are many of the free programs that carry out this work like Axcrypt program
The butter : I do not advise at all on use the mentioned ways by the magazine, but it used any program that uses the mentioned way,
Also the mentioned way in another Islamic site ( I believe that it is the site of the army of the Sunna supporters ) or he is properly speaking a done program by one of the brothers it carries out the exchange of the letters for other letters
I say that that way is unsafe at all
Coding favoured that suited it he that it does not use the coding at all
And he used an allowance about it the camouflage and the blackout and the concealment
The dear sir is terrorist¡
Layta you clarify your viewpoint a more is !Why does she think that the coding is not useful ? even if it was with a power that exceeds 500 bits¿
And what means with the camouflage ? does she mean what knows Steganography mind ¿ any hiding the information inside a picture or the file of my sound¿
Allah guided you and benefitted in your knowledge ..
The coding many kinds, their simpler are the exchange of the message letters by other letters with the use of a specific key,
An example :
The message :
He met me in a specific place
The key : a change the ( Þ ) by a letter the ( í ), a governor ( Ç ) by an edge ( ä ) and so to all of the letters
She becomes the coded message :
Ynskhzkh Thkh Kgnz Kaoukhz
This way names or
Simple Substitution Cipher
And to she disconnects the thesis, should know the key ( each letter by what was replaced )
And this the simplest ways of the coding and their use has started since more than 150 years
And the way of dismantling the coded message very simple ( without that it has the key ) but it takes for some time ( from 6 - 7 hours )
The idea is that it in each language letter is found they are used with more than abundance the other letters, for example, in the English the e letter on what mention I am the most using letters ( more than recurs all other letters ) then comes after it in the repetition other letters,
With the use of these statistical information, the clarification of the code is possible very simple about noticeable way with more letters a repetition, ( all the blade not was longer all their dismantling not was below, this for the mentioned way at the beginning of my subject )
Why he became possible breaking the blade ¿ ¿ simply because the coded message herself carries many of the information ( the repetition of the letters )
A return to the main subject : the mentioned ways in the sharp camp do not differ many about this way, where that each letter takes place its exchange for another letter, then the change of the letters places takes place ( this is the additional thing )
She way similar to this is used in the international war by the century beginning, and the clarification of all its codes have taken place
To the brother Vailed Knight
I did not mean at all what mentioned from that the coding not Majdi, all I not was meaning that I clarify it he is that the coding ways are very many, from them the simple, and from them the object and from them what is he the easy of the breaking and from them what is he the difficult of the breaking ( reaching a way did not take place for his breaking as he is the state with AES way )
And my subject was an expression about a warning that the mentioned coding way in the last issue from the sharp is not strong at all, and very a possible broke it ( as in the way Allti in the first example )
The study of the Internet is possible about the AES way working way and its basics
And the brotherhood in the sharp they do not need the knowledge of its technical details, but that enables them if they wanted
She is found many of the programs that uses the AES way for coding the files, and the use of these programs is possible with safety
And he grieved if my explanation was not understood
To more of the information study the Internet about
Cryptography
simple substitution cipher
polyalphabatic cipher
AES
To the brother a terrorist :
The camouflage is good, but there is the AES way as mentioned then she is safe
And I suggest that she writes the thesis in a file and a prayer for example or any other wording, then it codes the file by any program with the use of that wording
Then the sole way becomes for the return of the file to its original wording before the coding by means of the password, if it was lost, with it the message was lost
As finds programs enable you making the key ( or the password ) more than part
In other words, if there is a message, and no the divine decree the enemy could that the message holder at it that does not can dismantling the thesis and its reading except at the knowledge of the password afflicts you
And if she was more than part, then sends the leader two messengers, one of them he carries the thesis with part of the password, and the other carries the other part from the password, then no enables to the enemy the reading of the message except after the arrest of the two persons that know both of the parts from the password, the leader Al-Zarqawi if he used this way, what the Americans managed the reading of his message directed to the sheikh Ben Laden
To who did not understand the first example, this a clarification of the simplest ways of the coding and the blade breaking way
http://www.trincoll.edu/depts/cpsc/...ubstitution.htm I love that I hint that there are free programs by the Internet that carries out breaking the mentioned way of the coding, and I have passed on some of them sometime ago
The In the Name of Allah Most Gracious Most Merciful
I praise him and invoke peace upon its noble messenger and after :
The generous brother is Mofateh :
There is more than from a famous Khwarizmi for the coding from it for example :
DES
triple DES
RC4
RC5
AES
And other many, this is in the coding, as for sending the messages then there many ways from their more important are the way of the general and special keys
And its idea is that the sheikh Osama possesses two keys one of them are special he does not know of him one of and the others are a year that all of the peoples possesses
, if he wants that he spreads a message of the Muslims, he codes it ( or drops it electronically ) by its special key, if it opened the message it is not opened except by Moftah the general sheikh
Then when since the future makes sure that it is from the sheikh ( because the secret key that only the sheikh knows alone )
And if the future wants that it answers the sheikh, it codes the response by the key general to the sheikh and who clarifies its coding of only the key related to Abu Abd Allah
That is Ok I the time urgent Wmrtbsh takes this connection and two dimensions we agree
http://www.pgp.com/products/freeware.html Goodbye
To: Donna Lee Nardo
I do wish that every family and individual out there -- especially those with special needs -- would at least have some extra supplies on hand just in case.I agree Donna. I just filled my daughter's prescriptions so that we have a month or six weeks extra...just in case. There have been times when I forgot to refill it until we were out, then called and found out that there wouldn't be another shipment for a day or two. Even a slight disruption in surface transport could result in a lack of necessary medicines which could result in permanent problems for some, like my daughter. God bless you all.
130
posted on
08/02/2004 8:39:58 PM PDT
by
Mrs. Xtrmst
(All that is necessary for evil to succeed is that good men do nothing. --Edmund Burke)
To: Mossad1967
So should we stock up on more RadBlock?
To: All
Financial, part II: (?)
Information infrastructure. More than 50% of our economy is information.
__________________________
Water
Food Supply
Medical
Power
What else?
132
posted on
08/02/2004 8:42:00 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: All
Here is Casey's second translated message which she posted earlier today about codes (sorry, this also is a bit long):
***
continued from 2 messages below:
The brother is Hadi 's father :
Your speaking does not contradict what I said in the past from that the coding ways ( or the Khwarizmi ) the mentioned in the magazine is old ways, and a very possible disconnected them
The ways that mentioned them :
DES
triple DES
RC4
RC5
AES
She is strong ways, and a good, but I remember that I informed on a research to a student that discusses it with a way for the clarification of the DES code
Anyway, there systems ( they entrust the millions ) related to the clarification of this code and capable of the clarification of this code, but I am not sure of the time that takes him to the clarification of the code of the single DES
For the electronic signings, then this another subject, but have benefits that the brothers carry out the benefiting from them at spreading the general data of the sheikh
And she is useful from two sides :
- keeping the message contents at the use of the general key of coding the message where no enables to any person the reading of the message except if it knew the special key
- the assurance of the one identity that the publication of the message, and that at coding the message by the special key and by that the reading of the thesis is not possible except with the use of the general key that the ÕÇÍÈ ÇáÑÓÇáÉ put
The In the Name of Allah Most Gracious Most Merciful
In a study of me an old she found that the coding way or the signings whenever the special password exceeded about fifty letters it increased the difficulty of its establishment until by the big systems .
But at the merging between the strong coding and by a big special symbol very with the camouflage way or the coding with the information hiding way in picture file or a video and towards her the reliance on Allah, then it will not can one its dismantling .
As for the way of the sharp camp then he is a primitive study of the coding operation and my introduction to other stronger lessons, and also the lesson benefits to the fast tasks that until to the enemy discovered it then the time it has passed God willing .
My greetings
A brother the sword martyr :
Right that it whenever the password letters, difficult exceeded is dismantling its code by means of the experiment of all speeches in the language
But for the issue, the experts say that 8 letters suffice for the password, and remains the information that the code herself shows
The program of a fight edge for coding the militants messages through the network
The In the Name of Allah Most Gracious Most Merciful
The praise of Allah the Lord of the Worlds and the prayer and the greeting on our noble prophet upon him the best the prayer and the greeting
A response the militants demand on the network in the provision of the utmost security levels for the dispatch of the messages the poor to Allah carried out programming this program ( jihad edge ) for the possibility of the messages sending with extreme the safety between the two ends without the fear or the suspicion from the espionage on the electronic mail .
- - - - - - - - - information about the program - - - - - - - - - - - - - - -
The size : 28 Kilobit .
The requirements : Windows Operating System with VBRun and its size is a mega only and the connection one a present by the below
What he is the VBRun ¿
The habit of the done programs is Balfigoal BASIC a dynamics needs office links in the name of DLL ( D by ynamic * * * * Library ) it may be at many of these links ' in case but is NOT has Sinai with lowering the VBRun so that it can operating this program and any another done program BASIC Balfigoal in your system by a ratio of 100 % .
This is the main front of the program :
http://whyislamsa.com/Jihad_Crypt/1.jpg Then at your pressure on a coding will show for you this fund :
http://whyislamsa.com/Jihad_Crypt/4.jpg And he is the entrance of the coding key that the program will carry out coding the message by it and dismantling the coding by it, and is not that and according to but enables you also that it carries out writing a complete article and its memorization on a file then Istragaha about a standing way a file from the program, then Fatah will open any writing or an article and a memorization will memorize what I wrote in the text square as it is clear here :
http://whyislamsa.com/Jihad_Crypt/2.jpg And at your opening therefore the choice it will find files from a kind * txt. Only and she is Nsosia Text Files 's files .
http://whyislamsa.com/Jihad_Crypt/3.jpg An example :
Q I want that I carry out sending message to one of my friends mail by the text of this message :
I want you that the sheikh speech sends to me Alzhrani 's knight to the soldiers with the martyr advice God willing Abd Al-Aziz Almqrn
- - - - - - - - - - - the solution - - - - - - - - - - - -
We open the program and write this text in the program so that it is in this way :
http://whyislamsa.com/Jihad_Crypt/5.jpg Then press a coding and this key inserted as like : 1211221 EF are 91 it will show the coded text so :
http://whyislamsa.com/Jihad_Crypt/6.jpg Sinai with keeping this file or it cut it and stuck it and its sending to your fighting friend ....Then when the message arrives to it and he carries out its sticking in the program and the pressure on the clarification of the coding and carries out the entrance of the key self : 1211221 EF are 91 for it the original text will appear .
And in case of he inserted mistake key or she signed the article in the hands of the oppressors and tried the clarification of the coding by mistake key this what will appear :
http://whyislamsa.com/Jihad_Crypt/7.jpg A note : he tried that sending the key is by means of a message and especially in the forum then its wiping quickly but no escape from the key .
The experience of this program has taken place and he is very small and effective greatly God Willing
This and our last prayer to the praise of the Lord of the Worlds Allah and Allah invoked peace upon our prophet Mohammad : salla :
Your brother,
Isheiaa the Muslim
Loading the VBRUN was stationed
And the program here :
http://www.whyislamsa.com/qumran/Jihad_Crypt.zip
To: Donna Lee Nardo
I was using 4096 bit PGP encryption 10 years ago when I was working with OS/2. It was illegal in lots of countries, but available everywhere.
134
posted on
08/02/2004 8:44:36 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: Pegita
That was beautiful. Thank you, and amen!
To: HipShot
What other themes are there that we need to look at NOW? What targets within those themes?There has frequently been a "theme" of water, Some of the OBL images, AQ Navy talk, weapons coming through shipping containers, etc. Remember about 2 years ago the ME guy they caught on a large boat in a shipping container? Had the container outfitted almost like a small apartment for the trip, even had his laptop. (At least that's how I remember the story - I could be wrong.)
In other words, IMO, watch the ports and port cities.
136
posted on
08/02/2004 8:45:49 PM PDT
by
Oorang
( Those who trade liberty for security have neither)
To: Oorang
I'm going to pretend that they're already here. I think it's time to focus on potential targets.
137
posted on
08/02/2004 8:51:20 PM PDT
by
HipShot
(EOM couldn't cut the head off a beer with a chainsaw)
To: HipShot
I'm going to pretend that they're already here.Good point. We've probably passed the window of opportunity to catch them at the ports. I'll adjust my thinking cap.
138
posted on
08/02/2004 8:53:55 PM PDT
by
Oorang
( Those who trade liberty for security have neither)
139
posted on
08/02/2004 9:01:54 PM PDT
by
Judith Anne
(If Kerry doesn't quit licking his lips every 5 seconds, I'm going to throw up.)
To: Pegita
140
posted on
08/02/2004 9:02:54 PM PDT
by
Cindy
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120, 121-140, 141-160 ... 4,001-4,012 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson