Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

U.S.(Clinton) EQUIPPED TERROR SPONSORS
WorldnetDaily ^ | September 12, 2001 | By Paul Sperry

Posted on 09/13/2001 2:01:33 PM PDT by Uncle Bill

U.S. Equipped Terror Sponsors

Clinton exported NSA-ducking phone, high-tech encryption devices to Syria

NOTE: Rove: Terrorists Tracked Bush's Whereabouts

WorldnetDaily
By Paul Sperry
© 2001 WorldNetDaily.com
September 12, 2001

WASHINGTON -- The dozen or so Islamic terrorists who pulled off the plot to strike at America's nerve centers in New York and Washington spent months, if not years, researching, planning and coordinating the surprise attacks, U.S. security officials say. And they did it completely in secret, using the world's most sophisticated telecommunications equipment, some secured by advanced encryption technology that most armies don't have.

Where did they get such state-of-the-art, military-related gear?

First, you have to appreciate the high degree of communications activity their mission required at each stage.

In researching their targets, the terrorists picked ones relatively easy to hit at high air speeds, yet ones that would produce big casualties and provide symbolic blows to American morale. They had to pick airports close by, with weak security. They had to find jets with enough heft and wingspan and fuel to cause major damage, yet not so large that they required extra crew.

The Boeing 757s and 767s they hijacked were big, but all had just two pilots and no flight engineers, making it easier for terrorists to take the cockpits. And the heisted jets were from the same family of aircraft, obviating additional cockpit training.

They also apparently studied passenger traffic patterns of airlines in order to pick flights with relatively few people aboard. All four flights had light passenger loads. The Boeing jets have roughly 160-seat capacities, yet American Flight 11 carried 81 passengers; American Flight 77, only 58; United Flight 175, 56; and United Flight 93, a skeletal 38.

Fewer passengers, fewer heroes to worry about.

More key, the terrorists needed to select transcontinental flights with big fuel loads to turn the planes into giant petro-bombs. All four flights were bound for California. They also had to know flight patterns, and how to blind air-traffic controllers to the hijackings by turning off the planes' transponders, which send such warning signals, among other aviation information.

In planning the attack, they had to fashion weapons that they could sneak past airport security. Transportation Department officials think that they may have hedged their bets and even planted security people on the inside at Logan and Dulles airports, so that guards would look the other way when they came through metal detectors at the terminals.

The kamikaze pilots also had to log many hours on computer flight simulators with high-level graphics capability, to practice hitting their targets at full throttle. A Continental Airlines captain, who's flown both 757s and 767s, told WorldNetDaily he thinks they may have even added the World Trade Center and Pentagon to the simulator's visual database.

"At the airspeed of those strikes, which hit their targets dead on, the hand-eye coordination demands would be too high for casual flying skill -- with, or without, an autopilot engaged," he said.

They had to practice, moreover, navigating the jets to abruptly change their course, by as much as 180 degrees in some cases, after take-off. Flying them at low altitudes was also something they had to work on.

Synchronized terrorists

Finally, in executing their murderous missions, the 12 or so terrorists had to coordinate their activities, flawlessly, within a roughly two-hour stretch. And, for the most part, they did. They all got to the airport on time, they all got through security, they all boarded their flights, they all hijacked their flights and, with the exception of one group, they all hit their targets.

Pulling off such a complex plot would have generated an inordinate volume of communications -- whether by radio, cell phone, land line, fax or modem -- among the terrorists, among their Middle-Eastern sponsors and among commercial contacts here and abroad.

But somehow eavesdroppers at the super-secret National Security Agency -- with their billion-dollar satellite "birds" and other surveillance technology -- were deaf, dumb and blind to the wicked plot.

"The real issue in this tragedy is how the hell were these people able to plan and coordinate such a strike over a period of months without the NSA intercepting their signals?" demanded Peter M. Leitner, a senior strategic trade adviser at the Defense Department.

Leitner, who reviews commercial license applications for exports of some of the most sophisticated military-related technology, thinks he knows the answer.

"The technology that would allow these terrorists to mask their communications was given away, hand over fist, by the Clinton administration," he said in an interview with WorldNetDaily.

Leitner says the previous administration rubber-stamped the shipment of top-end military-related telecommunications equipment to Syria, which is on the FBI's list of sensitive countries that pose a threat to U.S. security.

"Syria is a terrorist-supporting nation," he said. "They provide infrastructure to bastards like [Osama] bin Laden. They provide backup and support and communications abilities to these terrorist cells."

So what kind of gear has Syria -- and likely bin Laden, by way of Syria -- gotten from America?

Spread-spectrum radios

"We're giving them spread-spectrum radios, which are almost impossible to break into. We're giving them fiber optics. We're giving them a high level of encryption. We're giving them computer networks that can't be tapped," Leitner said.

Spread-spectrum radios, originally designed for military use only, change their frequency constantly.

"Bin Laden's cells aren't having any trouble communicating anymore," Leitner said.

Bin Laden, the world's No. 1 terrorist and the Pentagon's chief suspect in Tuesday's attacks, is known to use portable satellite telephones, advanced encryption cell phones and other encrypted telephony equipment, as well as secure computer networks -- all compliments of U.S. technology, Leitner says.

"If people are worried about how these people were able to coordinate and communicate something like this -- which had to be pretty extensively coordinated -- without it being intercepted, it's because of the crap we've been selling these people," he said.

"How can you penetrate their networks when you can't even eavesdrop on their conversations?" he said.

"You can't stop them when they're coming right at your building," he said. "But, damn it, you should be able to stop them months in advance by breaking up their networks."

Leitner posits that the NSA wasn't able to detect the Islamic terrorists' plot because of the "high quality of the communications gear that they've been acquiring over the last couple of years, thanks to the Clinton administration's decontrols on advanced telecommunications equipment."

Terrorists' secured telecom gear "makes it infinitely more difficult to get even early warning signs" about their activities, he said.

Tuesday's attacks took the entire U.S. government, including the intelligence community, by surprise.

"We had no specific warning of the U.S. attacks," said Sen. Richard Shelby, R-Ala., ranking minority member of the Intelligence Committee.

Complete surprise

The Pentagon issued an alert of "Threat Con Alpha" the day before the attack, which meant that no threats were on the horizon. The same alert was issued the morning of the attack.

"We got no word of anything," Leitner said.

"We weren't warned of anything," another Pentagon official told WorldNetDaily.

Asked Tuesday if he had any inkling of the plot, Defense Secretary Donald Rumsfeld dodged the question: "We don't discuss intelligence matters."

Three weeks ago, some overseas papers quoted bin Laden saying that a major strike against the U.S. was coming soon. But there were no specifics. And bin Laden reportedly sent an e-mail to unknown government sources three days ago warning holy hell would break out. But again, he didn't say how, when or where.

Still, it's baffling that the U.S. intelligence community didn't pick up, early on, any specifics of the complex and long-planned plot through electronic intercepts and signals intelligence.

But it's actually not that baffling, Leitner asserts, against the backdrop of loose government controls on dual-use telecom exports.

"I've testified to Congress that it will take serious numbers of body bags before we wake up to the need to tighten dual-use export controls," he said. "Unfortunately, we've got them now."

"This is so tragic and yet so preventable," he said. "Now we're going to have to knock out their [terrorist] camps, just like we had to bomb the Iraqi's several times now to try to take out the fiber-optics network that the Chinese are installing in Iraq's air-defense systems."

"Yet, it was the Clinton administration that gave the Chinese the technology to give to Iraq," he noted.

The Bush administration apparently hasn't woken up, either.

Wake-up call

In June, Leitner was asked by the Commerce Department to OK a new round of exports of dual-use telecom equipment to Syria. He denied the request, and was asked to reconsider. He denied it again, arguing in a letter to Karen Vogel, the Commerce export licensing officer who requested the approval, that:

"Doing so vastly upgrades the C3 and C41 systems of the Syrian military and Intelligence Services. My concerns are also obviously compounded by the fact that Syria is one of the foremost state sponsors of terrorism."

Leitner continued: "Since an 'upgraded telecom infrastructure' will also greatly facilitate Syrian planning, coordination, secrecy and execution of terrorist acts, as well as direct military communications, I see absolutely no basis for any position other than a denial."

Vogel argued in an earlier letter that her request came on the heels of eight previous approvals of licenses for similar exports to Syria.

"There's still a lot of things inside the government involving national security that have just got to be changed," Leitner said.

Another senior Pentagon official who specializes in counterterrorism says his own faith in the U.S. intelligence community has been shattered.

"This full-court press by terrorists blows the hell out of the line that we've been hearing for years from the intelligence community that if they try anything big, we'll know about it and warn you. Anything bigger than a couple of people, don't worry, we'll know about it," he said. "Well, I guess they didn't."
[End of Transcript]

Is Pentagon muzzling its export watchdogs?

Why the Pentagon was so vulnerable

Big Brother Al
"In 1992, AT&T had developed secure telephones that the U.S. government could not tap. In response, AT&T was secretly paid by the Clinton administration to keep the secure phones out of the American market. According to Colgate's memo, the secure phones were simply too dangerous for American citizens."

Ok for Osama bin Laden to have though.

Secret memo on Loral deal - Traitor Loral Chairman Bernard Schwartz "Li Ka-Shing has been described by intelligence sources as a "Howard Hughes" for the Chinese Military Intelligence Department, or MID. U.S. Army Southern Command documents on the Panama transfer noted that Li Ka-Shing was an "indirect" threat to the United States.

Loral Globalstar satellite cellular phones use a unique communications technology originally built for the U.S. military called Code Division Multiple Access (CDMA). The July 1996 waiver signed by Clinton allowed Loral to export Globalstar CDMA technology to China."

Motorola, Clinton and the Red Gestapo
"In November 1994, Motorola employee and former Clinton White House National Security Council member Richard Barth began his successful effort to sell encrypted (secure) radios and cellular phones to the Chinese People's Armed Police.

..."Dear Ron," wrote Tooker to Brown. "I am writing to thank you and some key members of the Commerce Department for your assistance in obtaining the presidential waiver for encryption export sales to China."

Clinton's crypto technology leaks
"One 1995 document obtained from the Commerce Department on the GLX license shows that even they found "potential missile technology end-use" in a Chinese GLX export and "the high dollar volume approved items are primarily encrypted cellular telephones and radios."

Crypto and campaign money


TOPICS: Crime/Corruption; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last
To: Samaritan
Excellent! I wish folks would read that. It doesn't take that long. God bless.
41 posted on 09/14/2001 4:45:13 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 39 | View Replies]

To: Uncle Bill
Close Tags
42 posted on 09/14/2001 5:42:09 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 41 | View Replies]

To: Looking for Diogenes

43 posted on 09/14/2001 5:43:00 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 42 | View Replies]

To: Looking for Diogenes
Darn italics
44 posted on 09/14/2001 5:44:27 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 43 | View Replies]

To: Looking for Diogenes
Maybe this?
45 posted on 09/14/2001 5:47:11 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 44 | View Replies]

To: Looking for Diogenes
Magic </marquee up></marquee up></marquee up></marquee up> potion to close tags!!!!!!!!!!!
46 posted on 09/14/2001 6:05:52 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 45 | View Replies]

To: Inspector Harry Callahan
US AIRCRAFT WERE SCRAMBLED TO INTERCEPT AIRLINERS

What was needed to halt the attacks?

47 posted on 09/14/2001 6:53:08 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 41 | View Replies]

To: Inspector Harry Callahan
"The Sleepers"
48 posted on 09/14/2001 11:10:33 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 47 | View Replies]

Comment #49 Removed by Moderator

To: NotJustAnotherPrettyFace
Bttt
50 posted on 09/15/2001 10:08:33 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 49 | View Replies]

To: Skydrifter
Have you seen this thread? You might be particularly interested in #30.
51 posted on 09/16/2001 12:41:24 AM PDT by independentmind
[ Post Reply | Private Reply | To 50 | View Replies]

To: independentmind
Thanks for the ping. Part of it seems to be from -

Airline Safety ‘Net

- "Attack on America."

I've been told that tonight (Sunday) "60-Minutes" will air a special on the FAA blatant refusal to implement security procedures, despite any warnings. Former FAA security agent, Steve Elson, is supposed to deliver some sickening details as to how this was programmed by the FAA. There were warnings galore, complete with details of how this was guaranteed to happen. There was so little legitimate surprise, it's sickening.

In the months ahead we may see the major airlines citing phony bankrupcy liklihood. Beneath that veneer, note that they won't talk about the associated holding company which is sucking out all the real profit, while making it appear that the airline is anything but at programmed risk. If there's an associated holding company, look for a scam.

Mary Schiavo cited the legislation already proposed to exempt American & United from accounting for the deaths on the ground. It may have been introduced under the direct lobbying of the airlines, or the 'special' lobby which manipulates the FAA to spare the airlines such costs as the lax airport security which brought us to this thread.

Each airline ticket contains a sizable tax which is supposed to prevent such disasters. Instead, it's either allowed to accumulate (no doubt in favored banks) or is pillaged and-or spent on indirect benefits to the airlines. None of it gets spent for safety - strange; or is it? The regulations / laws were there, millions were made for the FAA permitting the airlines to ignore those; the airlines don't deserve a break.

Look for Norm Minetta to cover for the FAA.

Jane Garvey (FAA Administrator) knew; she deserves to answer to a criminal court.

Instead, the airlines responsible will probably get lucrative government contracts under the "Civilian Reserve Air Fleet" program (CRAF).

Make no mistake about it; Clinton's gang set this up with 'quiet' legislation changes and his infamous Presidential Executive Order 12866 - "...if it costs the airlines money; don't do it."

Check out the link, "Attack on America" on the site above.
52 posted on 09/16/2001 4:20:06 AM PDT by SKYDRIFTER
[ Post Reply | Private Reply | To 51 | View Replies]

To: Uncle Bill
Great posting. It's worth noting the names of the airlines picked - United (States) and American.

Not mentioned is that the 757 & 767 cockpits and flight characteristics are so close together that the pilots are issued their captain qualifications for both aircraft, regardless of which aircraft (757 or 767) that they check out on. The terrorists were quite methodical.

The terrorist, Ramsi Yousef, claim for the responsibility for the downing of TWA-800 should also be re-visited at this point. All the dots are connected. No American should think otherwise. We have the Clintons' to thank - naturally.
53 posted on 09/16/2001 4:30:51 AM PDT by SKYDRIFTER
[ Post Reply | Private Reply | To 1 | View Replies]

To: Uncle Bill
BTT
54 posted on 09/16/2001 4:48:24 AM PDT by sport
[ Post Reply | Private Reply | To 20 | View Replies]

To: sport
"Freeh placed his trusted associate Robert Hanssen into his last position with the FBI as counter-intelligence director in New York City."
Source

FBI Probes Espionage at Clinton White House - Insight Magazine
"If spies wanted to penetrate the White House, a facility widely considered the most secure in the world, how might it be done? For that matter, how might any agency or department of government be penetrated by spies?

“Actually, it’s pretty easy if you know what you’re doing,” says a retired U.S. intelligence expert who has helped (along with other government sources) to guide Insight through the many and often complicated pathways of government security and counterespionage.

Access to designs, databases, “blueprints,” memos, telephone numbers, lists of personnel and passwords all can be obtained. And from surprising sources. Several years ago this magazine was able to review from a remote site information on the supposedly secret and inaccessible White House Office Data Base, or WHODB (see “More Personal Secrets on File @ the White House,” July 15, 1996).

Despite the spending of additional millions to beef up security when the White House installed a modern $30 million computerized telephone system a few years ago, communications security remains a big problem. Whatever the level of sophistication employed, there are soft underbellies that raise significant national-security problems. And potential for espionage, such as electronic intercepting of phone calls, is very great.

Calls to or from the White House dealing with classified information are supposed to be handled on secure lines, but it doesn’t always happen. Sometimes, according to Insight’s sources, despite the existence of special phones at the White House and elsewhere to handle such calls, some don’t use them or only one side of the call does. An Insight editor recently was allowed for demonstration purposes to overhear a conversation placed over an unsecured line involving a “classified” topic.

Carelessness always has been a problem, but former and current FBI special agents say that under the Clinton administration the disregard for security has been epidemic. Many officials simply don’t like the bother of communicating on secure phones.

In another instance, Insight was provided access to virtually every telephone number within the White House, including those used by outside agencies with employees in the complex, and even the types of computers used and who uses them. Just by way of illustration, this information allowed direct access to communications instruments located in the Oval Office, the residence, bathrooms and grounds.

With such information, according to security and intelligence experts, a hacker or spy could target individual telephone lines and write software codes enabling the conversations to be forwarded in real-time for remote recording and transcribing. The White House complex contains approximately 5,800 voice, fax and modem lines.

“Having a phone number in and of itself will not necessarily gain you access for monitoring purposes,” Insight was told by a senior intelligence official with regular contact at the White House. “The systems are designed to electronically mask routes and generate secure connections.” That said, coupling a known phone number to routing sequences and trunk lines would pose a security risk, this official says.

Add to that detailed knowledge of computer codes used to move call traffic and your hacker or spy is in a very strong position. “That’s why we have so many redundancies and security devices on the systems — so we can tell if someone is trying to hack in,” says a current security official at the White House.

Shown a sampling of the hoard of data collected over just a few months of digging, the security official’s face went flush: “How the hell did you get that! This is what we are supposed to guard against. This is not supposed to be public.”

Indeed. Nor should the telephone numbers or locations of remote sites or trunk lines or other sundry telecommunications be accessible. What’s surprising is that most of this specialized information reviewed by Insight is unclassified in its separate pieces. When you put it together, the solved puzzle is considered a national-security secret. And for very good reason.

Consider the following: Insight not only was provided secure current phone numbers to the most sensitive lines in the world, but it discovered a remote telephone site in the Washington area which plugs into the White House telecommunications system.

Given national-security concerns, Insight has been asked not to divulge any telephone number, location of high-security equipment, or similar data not directly necessary for this news story.

Concerning the remote telecommunications site, Insight discovered not only its location and access telephone numbers but other information, including the existence of a secret “back door” to the computer system that had been left open for upward of two years without anyone knowing about the security lapse. This back door, common to large computer systems, is used for a variety of services, including those involving technicians, supervisors, contractors and security officers to run diagnostic checks, make repairs and review system operations.

“This is more than just a technical blunder,” says a well-placed source with detailed knowledge of White House security issues. “This is a very serious security failure with unimaginable consequences. Anyone could have accessed that [back door] and gotten into the entire White House phone system and obtained numbers and passwords that we never could track,” the source said, echoing yet another source familiar with the issue."

55 posted on 09/16/2001 9:53:35 AM PDT by Uncle Bill
[ Post Reply | Private Reply | To 54 | View Replies]

To: Uncle Bill
Bump.Thank for the info,Uncle Bill.
56 posted on 09/16/2001 10:07:12 AM PDT by porte des morts
[ Post Reply | Private Reply | To 55 | View Replies]

To: porte des morts
You're welcome. Thanks.

CHAPTER ONE: The Terror Trail - Osama bin Laden

57 posted on 09/16/2001 1:20:02 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 56 | View Replies]

To: Uncle Bill
Uncle Bill, I think that this is only the first installment of the cost of the treachery clinton regime and their enablers, defenders, and apologists' that will be paid with the blood of American citizens.
58 posted on 09/16/2001 7:12:05 PM PDT by sport
[ Post Reply | Private Reply | To 55 | View Replies]

To: Uncle Bill
Partnering With Terrorists
Readers may recall that it was Warren Christopher's (CFR) "diplomacy" under President Carter that brought about the overthrow of two of America's strongest allies, the Shah of Iran and President Somoza of Nicaragua, and the installation of the terrorist regimes under Ayatollah Khomeini and the Sandanistas, respectively, in those countries.

During the Reagan years, Secretary of State George Shultz (CFR) made moves to recognize Yasir Arafat and even sent ships to rescue Arafat and his Soviet-supplied Palestine Liberation Organization (PLO) henchmen when they were trapped in Lebanon and facing annihilation by Israel and rival groups.

During the Presidency of George Bush (CFR), Saddam Hussein, everyone's favorite terrorist scapegoat, was the secret recipient of incredible military aid from the United States. Investigations by the House Banking Committee and various journalists have amply documented an amazing trail of treachery and treasonous actions by Bush and his one-world retinue before, during, and after the Persian Gulf War.

Welcome to the CFR's "war" on terrorism.

59 posted on 09/17/2001 6:38:17 AM PDT by Inspector Harry Callahan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Inspector Harry Callahan
The Corruption of Warren Christopher FR

Terrorist and Hostile Intelligence Actions Against Computer Resources: A Detailed History of Terrorist and Hostile Intelligence Attacks Against Computer Resources

60 posted on 09/18/2001 6:27:59 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson