Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Thanatos
There was a blurb on this on Dateline I think it was. They would set up an email account with an ISP. Then, they would compose emails, but never send them. The emails remained in the "out" box and could be read by anybody having the userid/password. But never actually get sent.
33 posted on 10/04/2001 8:03:12 PM PDT by djf
[ Post Reply | Private Reply | To 1 | View Replies ]


To: ALL
Reading thru the Replies to this posting.. It seems that most are from "Skeptics" who seem to want to blow off the fact that the very people who murdered over 5000 AMERICAN and International Citizens used this method to plan and coordinate their attack against our Homeland.

A couple of Years ago, here on Free Republic, there was alot of discussion about the Clinton Administration wanting encryption suppliers to give "Back-Door" Codes to allow Federal Law Enforcement and Intelligance Agencies to be able to access and "Crack" messages used to encrypt messages.. The General Consense here on Free Republic was "Whoa.. no way.. Clinton just wants to infringe on our Constitutional Rights".. There were even people Freaking when Microsoft was developing WindowsME and they thought Microsoft had put in "Back-Door" keys in it's encryption. Well, I hate to break it to everyone.. This whole Article I posted is the reason why our Goverment was and is pushing for these codes.

As 20/20 Hindsight is our most infallible way of finding out what happened.. Here are some White Papers, Articles, and links to Software that shows how this is done and the Information that was linked to Osma Bin Laden's group Al-Qaida was using this for YEARS before the 911 attack on US Soil, our Embassies overseas, and the USS Cole.

US Today, Dated June 19, 2001
Terror groups hide behind Web encryption
Excerpt:
"Uncrackable encryption is allowing terrorists — Hamas, Hezbollah, al-Qaida and others — to communicate about their criminal intentions without fear of outside intrusion," FBI Director Louis Freeh said last March during closed-door testimony on terrorism before a Senate panel. "They're thwarting the efforts of law enforcement to detect, prevent and investigate illegal activities."

US Today, Dated June 19, 2001
Terrorist instructions hidden online
Excerpt:

"Through weeks of interviews with U.S. law-enforcement officials and experts, USA TODAY has learned new details of how extremists hide maps and photographs of terrorist targets — and post instructions for terrorist activities — on sports chat rooms, pornographic bulletin boards and other popular Web sites. Citing security concerns, officials declined to name the sites. Experts say it's difficult for law enforcement to intercept the messages.

"It's something the intelligence, law-enforcement and military communities are really struggling to deal with," says Ben Venzke, special projects director for iDEFENSE, a cyberintelligence company."

U.S. officials and militant Muslim groups say terrorists began using encryption — which scrambles data and then hides the data in existing images — about five years ago.

But the groups recently increased its use after U.S. law enforcement authorities revealed they were tapping bin Laden's satellite telephone calls from his base in Afghanistan and tracking his activities."

NetSecurity, About. Sep, 17, 2001:
Methods Terrorists Use

August 2001, CITI Techreport
Detecting Steganographic Content on the Internet

US alert: coded message reveals bin Laden terror plot, July 20, 2001
US alert: coded message reveals bin Laden terror plot
Excerpt:
"The United States is expecting a terrorist attack orchestrated by the Saudi extremist Osama bin Laden soon, and has placed its forces in the Middle East on the highest level of alert.

State Department officials said intelligence services had intercepted a coded message to one of bin Laden's senior operatives outlining plans for the attack."

Newsmax, Feb. 9, 2001
U.S. Makes Cyberwar on Bin Laden
Excerpt:
"Since 1994, bin Laden has used modern technology such as laptop computers, regular computers, faxes, cell phones, e-mails and the Internet to help set up his networks in Western Europe and 50 other countries, U.S. government officials said.

But to counter his vulnerability to the NSA and America's superior electronic warfare resources, including Vortex satellites that vacuum up microwave transmissions, bin Laden has resorted to "the application of traditional tradecraft" to the Net world, Venzke said. In the past, spies "hid micro dots in letters," he said. Today, bin Laden operatives hide encrypted messages "in the middle of a porno picture." or use chat rooms or other seemingly harmless venues to deliver covert orders."

Wired News, Feb. 7, 2001:
Bin Laden: Steganography Master?
Excerpt:
"WASHINGTON -- If there's one thing the FBI hates more than Osama bin Laden, it's when Osama bin Laden starts using the Internet. So it should be no surprise that the feds are getting unusually jittery about what they claim is evidence that bin Laden and his terrorist allies are using message-scrambling techniques to evade law enforcement.

The Clinton administration substantially relaxed -- but did not remove -- regulations controlling the overseas shipments of encryption hardware and software, such as Web browsers or Eudora PGP plug-ins.

Three years ago, FBI Director Louis Freeh spent much of his time telling anyone who would listen that terrorists were using encryption -- and Congress should approve restrictions on domestic use.

"We are very concerned, as this committee is, about the encryption situation, particularly as it relates to fighting crime and fighting terrorism," Freeh said to the Senate Judiciary committee in September 1998. "Not just bin Laden, but many other people who work against us in the area of terrorism, are becoming sophisticated enough to equip themselves with encryption devices."

steganographic software

There is more, but you all get the Idea..

37 posted on 10/04/2001 9:06:17 PM PDT by Thanatos
[ Post Reply | Private Reply | To 33 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson