This thread has been locked, it will not receive new replies. |
Locked on 08/24/2004 9:07:56 PM PDT by Admin Moderator, reason:
Thread Eighteen: http://www.freerepublic.com/focus/f-news/1198769/posts |
Posted on 08/10/2004 12:58:27 AM PDT by JustPiper
Credit: The Cabal The title refers to a daily report given to the president of the United States detailing the most serious terrorist threats against the country. To tackle those threats, the government has formed a top-notch task force to infiltrate the terror cells and cut off the danger. "Every morning, the president receives a list of the top ten terrorist threats - this list is known as the threat matrix." We here at FR are trying to be in conjunction with the daily reports around the world that involve threats. We try to provide a storehouse of information that takes hours of research. YOU be the Judge and get informed. "I will never cower before any master nor bend to any threat." Link to Thread Sixteen |
With the nation on high alert for al-Qaida terrorists, the Department of Homeland Security is putting its border officers through "etiquette" classes to soften their image and make them less threatening to arriving foreign immigrants, WorldNetDaily has learned. |
"God could not be everywhere and therefore he made mothers." -- Jewish proverb |
We are the "Stotters" who make ourselves aware of the enemy who wishes to do us harm. "What good are the color codes at all if we are suddenly hit with a bio or chem attack? There would be no warning and the danger would be instant." "Code Red Implications Code Red - Stay Home and Await Word." by MamaDearest |
Meet It! Greet It! Defeat It! |
Hmmm, I wonder why the disparity in the head count?
Long article, but interesting with a good overview of facts we know and some new ones...
***
Via Yahoo:
Cyberspace Gives Al Qaeda Refuge
Sun Aug 15, 7:55 AM ET Add Top Stories - Los Angeles Times to My Yahoo!
By Douglas Frantz, Josh Meyer and Richard B. Schmitt Times Staff Writers
ISTANBUL, Turkey In December, Al Qaeda operatives posted a manifesto on the Internet calling for attacks inside countries allied with the United States in Iraq (news - web sites). Spain, with elections approaching, was singled out as a target.
On March 11, terrorists set off bombs on four commuter trains in Madrid and killed 191 people. Three days later, Spanish voters replaced the pro-war government with a party whose leader had promised to withdraw the country's 1,300 troops from Iraq.
The posting of the strategy and the timing of the Madrid bombings shocked even the most hardened Al Qaeda watchers recently when they reviewed the little-known manifesto.
"It's quite extraordinary in that you have a group of people
talking about influencing a political process and then having it happen," said a U.S. national security official who analyzed the 54-page posting and spoke on condition that his name not be used. "Reading through this thing, it is just mind-blowing."
Since Osama bin Laden (news - web sites) and his followers were driven from their bases in Afghanistan (news - web sites), the Al Qaeda terrorist network has demonstrated an increasing ability to exploit the Internet as it reconfigures itself as a semi-leaderless global extremist movement far more elusive than the original incarnation.
Websites run by Al Qaeda and its backers have become virtual classrooms for terrorists, offering instructions for activities such as kidnapping and using cellphones to set off bombs, like the ones used in Madrid. Independent Al Qaeda cells and the network's loose hierarchy use easily available encoding programs and simple techniques to exchange virtually undetectable messages between Internet cafes in Karachi and libraries in London.
The Internet's importance to Al Qaeda was highlighted this month by the disclosure that Pakistani authorities had apprehended Mohammed Naeem Noor Khan, a suspected Al Qaeda computer engineer, and collected a wealth of electronic material.
E-mail and other information from Khan's computers led to the arrests of 13 suspects in Britain and sent investigators scrambling to unravel electronic links among militants in Pakistan, Europe and the United States, British, U.S., and Pakistani authorities said. The discovery of files on financial institutions in New York and Washington among Khan's trove also played a role in prompting the Bush administration to issue a terrorist warning.
Although it has long been known that Al Qaeda used the Internet to conduct reconnaissance on potential U.S. targets, the disks and hard drives taken from Khan disclose much about the resiliency and adaptability of a far-flung network hiding in plain sight, said U.S. and foreign intelligence officials and outside experts interviewed for this report.
"The Internet allows the organization to become a virtual self-perpetuating and changing entity in cyberspace that provides technological guidance and moral inspiration to a new generation," said Magnus Ranstorp, a counter-terrorism expert at the University of St. Andrews in Scotland.
Rather than the computer whizzes often described by government officials and the press, the Al Qaeda operatives are more often people with everyday skills who have harnessed the Internet in a campaign against the United States and its allies. Even Khan, whom senior U.S. officials describe as extremely computer savvy, used skills available to many people with computer training.
Over time, they developed and shared techniques to avoid detection. An Al Qaeda survival manual warned adherents not to use the same Internet cafe too many times. Messages should be written on a word processor and pasted into an e-mail to avoid keeping the computer connected to the Internet for too long, it said.
The result is a changing definition not only of Al Qaeda but also of the threat from what is known as cyber-terrorism. After Sept. 11, the biggest fear of terrorists using the Internet was their potential to disable air traffic control systems or disrupt the electric power grid of the United States. Billions were spent shoring up infrastructure defense.
Although those concerns remain, authorities said no incident of cyber-terrorism has been recorded and worries have receded.
Instead, the discovery of the December manifesto, the arrest in Pakistan last month and the accumulation of other evidence are leading to recognition that for now, at least, cyberspace is not a weapon for Al Qaeda, but a tool one more difficult to counter than gunmen huddled in caves and tents.
James Lewis, director of technology policy at the Center for Strategic and International Studies in Washington, said one clear advantage for Al Qaeda is that the Internet gives it a communications system that rivals that of a superpower without the accompanying risk.
"There is no central headquarters," he said. "There is no central place you can knock out."
U.S. and foreign authorities interviewed in recent days generally agreed with a report last spring by the U.S. Treasury and Justice departments, which concluded that the Internet poses tough challenges "because it is largely anonymous, geographically unbounded, unregulated and decentralized."
Al Qaeda is not a newcomer to the Internet.
In 2000, the group hacked into the e-mail and bank accounts of a U.S. diplomat in Saudi Arabia as part of an effort to track his movements and plot an assassination attempt, which was later abandoned, Ranstorp and a security official in the region said.
In the final stages of planning the Sept. 11 attacks, hijacker Mohamed Atta sent a coded message over the Internet that said: "The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts and the faculty of engineering."
After the Sept. 11 attacks on the World Trade Center and Pentagon (news - web sites), the camps and safe houses in Afghanistan where Atta and his accomplices had once trained were destroyed in the U.S. air assaults.
Thousands of Al Qaeda adherents fled to hiding places in the tribal areas along the Afghan-Pakistani border, to Pakistan and to dozens of other countries. They left behind computers with files on how to build nuclear bombs, diagrams of U.S. buildings and software for stealing passwords off the Internet.
In the months that followed, key leaders were killed or captured. Bin Laden has remained so deeply hidden that most intelligence officials think he no longer exercises much control over the network.
The U.S. and its allies worked with some success to shut down the flow of money to Al Qaeda through Saudi charities, wealthy benefactors and other means.
Faced with this multi-pronged assault, Al Qaeda reinvented itself, with a new reliance on the Internet.
Manuals from the training camps were posted on websites. Praise for the "holy war" and appeals for money to continue the fight started popping up. Information was shared among members, and alliances with local and regional extremist groups were formed through cyberspace.
More recent Internet postings reflected the adaptations of the new Al Qaeda, with its independent cells and new, often untrained recruits scattered throughout the Middle East, Europe and Africa.
In late May, a website linked to Al Qaeda in Saudi Arabia published detailed instructions for carrying out a kidnapping. Three weeks later, U.S. aerospace engineer Paul M. Johnson Jr. was kidnapped in Riyadh, the Saudi capital, and later beheaded.
Saudi extremists have proved particularly adept at using the Internet to communicate with other Al Qaeda groups and to promote their aim to topple the royal family, security officials in the country said.
But the posting that called for attacks on U.S. allies in Iraq and its chilling effectiveness has proved the most startling.
"It shows that they are very strategic in what they are doing," the U.S. national security official said.
The document was posted on a website run out of the Middle East. Its language, religious references and other telltale signs convinced U.S. experts that an Al Qaeda member wrote it, though they have not identified the author.
Titled "Jihad in Iraq: Hopes and Dangers," the posting advocated attacking countries aligned with the U.S. that were most vulnerable to pressure to withdraw their troops from Iraq. Italy and Spain were singled out, with a special mention of Spain's approaching elections.
"Withdrawal of Spanish or Italian forces would put immense pressure on the British presence in a way that Tony Blair (news - web sites) might not be able to bear," it said in one of several paragraphs underlined for emphasis. "In this way the dominoes will begin to fall quickly."
At another point, the posting said, "We think that the Spanish government could not tolerate more than two, maximum three blows, after which it will have to withdraw as a result of popular pressure."
The posting was available on one of the hundreds of Arabic-language websites that cater to extremists and moderates alike. Many of them are watched by intelligence and law enforcement agencies, but experts say there are far too many to monitor thoroughly.
Evan Kohlmann, a Washington-based terrorism analyst who has been a consultant to the U.S. government, said he was monitoring an Internet chat room frequented by Islamic extremists last month when someone posted copies of the complete Windows desktop of a U.S. soldier serving in South Korea (news - web sites).
The soldier had apparently installed a program to access his work computer through another computer and the hacker found a back door and took control of the machine by using simple techniques, Kohlmann said.
Simplicity seems to work best. One common method of communicating over the Internet is essentially an e-mail version of the classic dead drop.
Members of a cell are all given the same prearranged username and password for an e-mail account on an Internet service provider, or ISP, such as Hotmail or Yahoo, according to the recent joint report by the Treasury and Justice departments.
One member writes a message, but instead of sending it, he puts it in the "draft" file and then logs off. Someone else can then sign onto the account using the same username and password, read the draft and then delete it.
"Because the draft was never sent, the ISP does not retain a copy of it and there is no record of it traversing the Internet it never went anywhere, its recipients came to it," the report said.
Secure messages also can be transmitted using widely available encryption tools.
Slightly more advanced methods allow messages to be embedded in image, sound or other files transferred over the Internet through a process called "steganography." The files cannot be distinguished without a decoding tool.
The difficulty of intercepting and deciphering messages has given rise to a game of cyber cat and mouse, according to government and independent experts.
In an effort to gather information on potential recruits and donors, U.S. law enforcement agencies operate websites that are set up to resemble extremist Islamic sites. Visitors leave an electronic trail when they enter the site.
On the other side, Al Qaeda can transmit false information to determine whether its members are being monitored by law enforcement.
The Internet offers stealth to its users, but authorities can get valuable information if they can get their hands on data stored in computers or on disks.
U.S. and foreign investigators still are sifting through the material taken from Khan. By cross-referencing the data with old files on people, places and methods of attacks, they hope to get a new picture of the organization's operations and identify its operatives, senior U.S. law enforcement officials say.
They also are getting a closer look at the role of the Internet in Al Qaeda's strategies and a rare chance to turn the tables on the organization's computer prowess.
"Al Qaeda relies on the Internet just like everyone else, and increasingly more so," a senior Justice Department (news - web sites) official said. "But that reliance could also come back to bite them."
Background:
Mohammed Naeem Noor Khan
Mohammed Naeem Noor Khan, right, a suspected Al Qaeda computer expert, was arrested July 15 in Pakistan.
Khan reportedly has told his FBI (news - web sites) interrogators that the terrorist network has monitored top U.S. political officials so closely that its operatives know where they live and the names of their neighbors.
Authorities believe Khan may have been a key link among Al Qaeda cells in Pakistan, Britain and the United States.
He was arrested while uploading information to several Al Qaeda-affiliated websites at an Internet cafe in Karachi.
He reportedly was in the process of sending an e-mail death threat to President Bush (news - web sites), claiming that it was from Al Qaeda.
http://news.yahoo.com/news?tmpl=story&cid=2026&u=/latimests/20040815/ts_latimes/cyberspacegivesalqaedarefuge&printer=1
Sound like we might see somthing next week.
Are you laying odds that al Hindi is clean shaven? LOL
Maybe some unauthorized passengers?
Caught in the act....I love it!
I thought there were severe penalties to airlines if the head count is not accurate. Curious, anyway.
From the files of Terror Inc
http://www.theaustralian.news.com.au/common/story_page/0,5744,10431851%255E31477,00.html
*******
Have you seen this one which includes some "code words" used by Zawahiri?
Imams to issue guidelines on UK terror alert
Peninsula On-Line - Qatar
Web posted at: 8/16/2004 3:22:26
Source - The Times
LONDON: Britains most senior Muslim clerics have secretly met to prepare their communities for the aftermath of a September 11-style terrorist attack in Britain.
In an acknowledgment of the imminent danger of an Al Qaeda atrocity, 13 leading imams held emergency consultations here and warned Britains 1.6m Muslims of a likely backlash in the event of an attack. They told communities to be vigilant for terrorists in their midst.
The clerics concluded that some sections of the Muslim community in Britain have become more sympathetic to terrorism because of the continuing Iraq war.
As a result of the meetings, a guide is to be sent next month to every Muslim household, calling on them to report suspicious activities on a police anti-terrorist hotline.
For Muslims, averting a terrorist attack that could harm many innocents is an Islamic imperative, it says. If you are aware of any suspected terror-related activity, then bring that information to the immediate attention of the police.
Abdul Jalil Sajid, the imam of Brighton mosque and one of the countrys most senior clerics, said the imams were responding to warnings from police and the recent arrests of terror suspects.
The imams warn in the guide that Muslims should be ready for revenge attacks from non-Muslims in the wake of a terrorist incident. It advises women who wear the hijab not to go outside unaccompanied if an attack occurs and says mosques and Islamic schools should install CCTV cameras.
As an interim measure, the imams have prepared a model sermon, which will be sent to all mosques and Islamic centres for delivery at Friday prayers. The sermon will make a clear distinction between jihad (holy war) and terrorism. It will point out that Muslims have a covenant of security not to attack the country in which they live.
The meetings were organised by the Grand Shura (ruling body) of the Muslim Council of Britain (MCB), the countrys biggest Muslim body with more than 350 Islamic organisations affiliated to it.
Inayat Bunglawala, an official of the MCB who was at a meeting of imams, said the concept of jihad had been debased by terrorists. Jihad is a noble endeavour to defend your country and society from attack, while terror is the indiscriminate killing of innocents.
The MCB is to publish half a million copies of the guide, called Know Your Rights and Responsibilities, so that at least one member of each Muslim household in Britain will have a copy. In the event of a terrorist attack, the guide advises Muslim households to remain calm and follow the global safety rule: go in, stay in and tune in.
Mosque officials and worshippers are told regularly to check their bins and look for any suspicious packages left outside and inside the buildings. Fearing racist groups will exploit a terror attack, the guide tells Muslims: Do not allow yourself to be provoked by the far right into responding in a violent manner.
The guide also advises Muslims on what their rights are if they are stopped and searched, arrested, or if anti-terrorist police knock on their door to search their property.
http://www.thepeninsulaqatar.com/Display_news.asp?section=World_News&month=August2004&file=World_News2004081632226.xml
"GERMANY, too? I didn't catch that. That is VERY ominous, or it may be very positive."
OPINION-SPECULATION: I think it is both.
To: ExSoldier
smiling -- no comment
To: MamaDearest
40 years and going strong you say?
That's a good thing.
INDYSTAR.com: "MISSING YEMENI STUDENT IS FOUND Yemeni Teen Turns Up in New York after Failing to Return to Program at Purdue" by Terry Horne (ARTICLE SNIPPET: A missing Yemeni student attending a Purdue University summer program was detained on a visa violation after he turned up Thursday in New York City, FBI and university officials said. Anwar Saleh Ahmed Al-Awdi, 18, surrendered at a federal office building late Thursday afternoon.") (August 13, 2004) (Read More...)
INDYSTAR.com: "YEMENI STUDENT AT PURDUE FOR PROGRAM IS MISSING" (ARTICLE NOTE: The missing "18-year-old Middle Eastern student" is identified as "Anwar Saleh Ahmed Al-Awdi.") (ARTICLE SNIPPET: "Purdue officials hope someone will recognize Al-Awdi and call police. Al-Awdi is 5 feet tall with a thin build. He left campus with Mausuar Yousef Yahya, a friend of the family from Detroit, and another man identified only as Yaha. They were to go to an address in Hamtramck, Mich., but police were not able to reach anyone at that location in the Detroit suburb.") (August 11, 2004) (Read More...)
GOOGLE Search Term: "AL-AWDI" (Read More...)
Excellent find, Velveeta. I never saw that one. Thank you.
P.S. If I was that reporter, I would have copied all the computer drives first and then called my editor!
Thanks for the summary Godzilla, nw.
Pretty quiet about preventing terror, isn't it?
GOOGLE Search Term: "JAFAR"
http://www.google.com/search?q=%22Jafar%22&hl=en&lr=&ie=UTF-8&filter=0
Yes it is. They forgot to include the part about leaving Mosques that preach hate and reporting wicked imans.
As Davey said, this has been talked about in the press before. I also heard about it a few times in the past few months (about Germany specifically; maybe it is just that is appears in the foreign press more often than here stateside). I was always smiling when I read about it because I think Germany deserves as much. But I know we would never make such a move based solely on payback.
***
Germany to bear brunt of US troop withdrawal
Financial Times ^ | August 15 2004 | Peter Spiegel
Posted on 08/15/2004 8:15:00 PM EDT by shotokan
Germany will be hit harder than any other country by US President George W. Bush's announcement on Monday that the Pentagon will withdraw 70,000 troops from overseas and return them to US bases, US officials said at the weekend.
About 45,000 of the reduction will come in Europe, a majority being culled from the 75,000 US servicemen based in facilities across Germany. The US has been in talks with German officials about its plans for more than a year. It will be the biggest restructuring of US forces overseas since the end of the cold war. The plans include a general briefing in December when most of the overview was presented, according to a senior state department official.
Senior Pentagon officials have emphasised that any reduction is not connected with Germany's opposition to the Iraq war. The US's level of interest, commitment and military capability resident in this theatre should no longer be measured exclusively by the number of troops permanently based in Europe, General James Jones, head of the US's European command, said in a recent Capitol Hill hearing.
The German reductions are expected to include the withdrawal of heavy army divisions the 1st armoured, based in Wiesbaden, and the 1st infantry, based in Wurzburg and the closure of 13 installations near the towns of Friedberg and Giessen. The air force will withdraw from Rhein-Main air base in Frankfurt and consolidate operations in Ramstein and Spangdahlem. One US official said there had been an intense, joint Pentagon/state department effort to ease the German government's concerns about the reduction and that some new capabilities including a new brigade of light-armoured Stryker vehicles are a result of German requests.
Other upgrades will include better training and command facilities, focused at Grafenwoehr, where a $630m (509m) project is under way to build new facilities. German officials expressed wariness at the prospect of big withdrawals, saying they were likely to be hard on small communities that relied on the US presence for economic activity. But US officials said they did not believe there would be a significant political reaction in Germany because of the diplomatic efforts made over the past six months.
In Asia and Europe for many months now we've had a series of official visits where both the why and the wherefore of this initiative have been discussed, have been briefed and have been, I think, quite well received, both in Europe and Asia, said the senior state department official.
http://www.freerepublic.com/focus/f-news/1192160/posts
One missing student found and arrested. I wonder where the other missing student is?
Donna,
I will see what I get, as I will leave him after the first hour and go to KSL for the Laura Mansfield hour with Jerry Brown.
This is my holiday night on the radio, Drudge, Dr Bill and Laura, then back to Dr. Bill.
Yep.
Good link.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.