This thread has been locked, it will not receive new replies. |
Locked on 08/02/2004 5:38:02 PM PDT by Admin Moderator, reason:
Thread Sixteen: http://www.freerepublic.com/focus/news/1183755/posts |
Posted on 07/24/2004 9:37:20 PM PDT by JustPiper
Edited on 07/25/2004 2:39:52 PM PDT by Admin Moderator. [history]
Credit: The Cabal The title refers to a daily report given to the president of the United States detailing the most serious terrorist threats against the country. To tackle those threats, the government has formed a top-notch task force to infiltrate the terror cells and cut off the danger. "Every morning, the president receives a list of the top ten terrorist threats - this list is known as the threat matrix." We here at FR are trying to be in conjunction with the daily reports around the world that involve threats. We try to provide a storehouse of information that takes hours of research. YOU be the Judge and get informed. "I will never cower before any master nor bend to any threat." |
Group linked to al Qaeda warns of 'columns of car bombs' Australia and Italy have received warnings through a statement purportedly from militants linked to al Qaeda that demanded those countries withdraw troops from Iraq. |
We are the "Stotters" who make ourselves aware of the enemy who wishes to do us harm. Meet It! Greet It! Defeat It! |
(Excerpt) Read more at cnn.com ...
YES, THANKS KINETIC.
AND, PLEASE, help insure mom's sanity these days.
And if necessary, lasso her and lead her out of the house and around the block from time to time!
LUBB,
WTF! Too much flaming or < tinfoil > did something get posted that shouldn't have been posted publicly?< /tinfoil >
Thanks JP!!! :)
AMEN! AMEN! AMEN!
Did she add that "Let's Roll" badge and the book list? I just noticed them this time, and I really like them.
That it is,May I ask, How did you find Free Republic/TM?
Bucket load of Jihadi links - A lot of these have been around on the web for a while, others were new to me.
ßáãÉ ÃÈØÇá ÇáÝáæÌÉ
http://209.97.207.93/mov1/1.wmv
ÈÑßÇä ÇáÝáæÌÉ
http://209.97.207.93/mov1/2.wmv
ÚãáíÉ ÅÍÑÇÞ åãÑ ááÚáæÌ
http://209.97.207.93/mov1/3.wmv
ÇäÔÇÏ ãÌÇåÏíä ÇáÝáæÌÉ
http://209.97.207.93/mov1/4.wmv
http://209.97.207.93/mov1/5.wmv
ÇáÝáæÌÉ ÈÚÏ ÇáÇäÊÕÇÑ
http://209.97.207.93/mov1/5-1.wmv
ÞÊá æÓÍá ÚãáÇÁ ááãæÓÇÏ ÇáÇÓÑÇÆíáí æÇáãÎÇÈÑÇÊ ÇáÇãÑíßíÉ
http://209.97.207.93/mov1/6.wmv
http://209.97.207.93/mov1/7.wmv
æÇÍÉ ÔåÏÇÁ ÇáÝáæÌÉ
http://209.97.207.93/mov1/8.wmv
http://www.abualbukhary.net/files/
ßÊÇÆÈ ÇáÍÑãíä ÊÈË Ýíáã ÚãáíÉ ÇáæÔã ææÕÇíÇ ÚÈÏ ÇáÚÒíÒ ÇáãÏíåÔ æÝåÏ ÇáÝÑÇÌ
http://www.abualbukhary.net/files/k1m.rm
http://www.abualbukhary.net/files/k2m.rm
http://www.abualbukhary.net/files/k3m.rm
ÚÇÌá ÑÓÇáÉ ÌÏíÏÉ ãä ÇáÔíÎ ÚÈÏÇááå ÇáÑÔæÏ ( æÍÑÖ ÇáãÄãäíä )
http://www.abualbukhary.net/files/R_voice_1.zip
http://www.abualbukhary.net/files/R_voice_2.zip
http://www.abualbukhary.net/files/R_voice_3.zip
http://www.abualbukhary.net/files/R_voice_4.zip
ÑÓÇáÉ ÝíÏíæ ãä ÇÈæ ÏÌÇäÉ ãä ÇáÔíÔÇä
http://video.kavkazcenter.com/clips..._jihad_arab.wmv
ÕæÊ ÇáÌåÇÏ ÊÞÏã áßã ÎØÈÉ (( æ ÅÓÜáÇãÇå )) áÝÖíáÉ ÇáÔíÎ ÚÈÏ ÇáãÌíÏ Èä ãÍãÏ
ÇáãäíÚ
http://www.abualbukhary.net/files/waislamah1.zip
http://www.abualbukhary.net/files/waislamah2.zip
ãÊÝÑÞÇÊ ãä ãÌÇåÏíä ÇáÚÑÇÞ
http://www.islamscastle.com/jihad/1.wmv
http://www.islamscastle.com/jihad/2.wmv
http://www.islamscastle.com/jihad/3.wmv
http://www.islamscastle.com/jihad/4.wmv
http://www.islamscastle.com/jihad/5.wmv
http://www.islamscastle.com/jihad/6.wmv
http://www.islamscastle.com/jihad/5-1.wmv
http://www.islamscastle.com/jihad/7.wmv
http://www.islamscastle.com/jihad/8.wmv
http://www.islamscastle.com/jihad/iraq_tank2004.wmv
http://www.islamscastle.com/jihad/lbc_meeting1.wmv
http://www.islamscastle.com/jihad/iraq.ram
ÔÑíØ ÐÈÍ ÑæÈÑÊ ÌÇßæÈ
http://www.islamscastle.com/jihad/J.ram
ÔÑíØ ÐÈÍ Èæá ÌæäÓæä
http://www.islamscastle.com/jihad/P.ram
ÔÑíØ ÐÈÍ Ïäííá ÈíÑá
http://www.islamscastle.com/jihad/d.wmv
ÔÑíØ ÐÈÍ ÇáßæÑí
http://www.islamscastle.com/jihad/koria1.wmv
Yes many of us are still recovering, everyone probably worked themselves into such a frenzy they crashed, burned and fell asleep -g-
Welcome!
Amen, Pegita, and thank you.
You have mail.
No tinfoil. Sorry to disappoint. :)
I had seen references with it on the ih board as a result I started looking at it. Found that what you guys were doing was pretty neat.
I understand that the verification came for Aljernaan and her website
Jemaah Islamiyah failing to regroup, attack Southeast Asia, says report
eTaiwan News / AP ^ | 7/25/04
http://www.freerepublic.com/focus/f-news/1178016/posts
Jemaah Islamiyah has tried in the last year to carry out terror attacks in Southeast Asia, but failed because of a lack of funds and support from other militant groups, and an absence of planners among its ranks, officials said.
The al-Qaida-linked organization's ability to mount attacks was severely dented by the arrest of scores of militants after September 11, 2001, including Hambali, the group's alleged operations chief, a Malaysian government official told The Associated Press on Friday.
Remnants of Jemaah Islamiyah have made several unsuccessful attempts to regroup in Indonesia so they could launch more strikes, the official said on condition of anonymity. One of their biggest problems was they "could not agree on a leader to take over from Hambali," he said.
Hambali, an alleged high-ranking al-Qaida leader and the brains behind Jemaah Islamiyah, was Southeast Asia's most-wanted fugitive before his August 2003 arrest by Thai police, who turned him over to U.S. custody.
(snip)
From TM'r WestCoastGal AKA CoCo
SOURCE:NBC
IMPORTANT:
Things to Look Out For: Be Observant:
Multiple sightings of the same suspicious person, vehicle or activity at the same location;
Individuals or activities that don't "fit" into the surrounding environment;
Individuals sitting in a parked vehicle for an extended period of time;
Individuals or several people sketching or taking notes, photographing or videotaping areas or buildings not normally associated with tourist activity;
Clothing out of place for the weather, such as someone wearing a heavy coat in hot weather;
Individuals or people carrying unusually heavy bags or backpacks;
Vehicles -- especially vans, U-Hauls or delivery trucks -- improperly parked or parked in locations not normally associated with deliveries;
Follow your instinct. If something doesn't look right, it might not be.
Addendum:
POSSIBLE SIGNS OF TERRORISM
Unusual videotaping or photography of buildings or other critical infrastructure.
Videotaping is one of the ways that terrorists gather information about a possible target. A major terrorist plot in Singapore was averted when videotapes of the buildings to be attacked, including embassies, were discovered.
Suspicious vehicles near significant buildings or in public places.
Terrorists use vehicles for many purposes, from surveillance to planting bombs (such as in Oklahoma City or Bali). Vehicles may be parked for an unusual length of time, sometimes in no-parking areas. Explosives can be heavy, so cars and vans may sit abnormally low on their suspensions. They may have expired registrations or have false or missing plates. There was one recorded incident where an attack was foiled because a vehicle had front and rear plates that did not match.
Suspicious accommodation needs.
The way terrorists use, rent and buy accommodation is often suspicious. A British example was a rented garage that was used as a bomb factory. A resident became suspicious and reported men coming and going wearing rubber gloves. This led to a number of arrests of terrorists who had already attacked Heathrow Airport.
Unusual purchases or possession of fertilizer or chemicals.
Fertilizer is a widely available product that has been used in many terrorist bombs. The Oklahoma City bombing killed 168 people. One of the clues in that case was a receipt for two tons of fertilizer.
A lifestyle that does not add up.
While planning an attack, terrorists may lead lives that appear unusual or suspicious. The 9/11 terrorists are classic examples learning to fly but not wanting to learn how to land. The leader of that group also paid cash for many large purchases such as flight training, accommodation, vehicles and air tickets.
False or multiple identities.
Terrorists often use false or stolen documents, including passports and drivers licenses. They can also have several identities and may give conflicting details to those they come in contact with. One example was an alert bank employee who noticed a series of unusual transactions and identified an account that had been opened in a false name. They reported it to authorities, who uncovered links to a terrorist group.
What happened?
I love you both!!!Thank you for everything you do here.
Something I realized an hour or so ago when I came back
from diner and everything in a mess, just how grateful
I am for technology and windows programs. I would hate
to have to go back to the old days when I would have to
run around to all the computers.LOL!
If you want the picture of Liberty, Mother & her child
I think I have the link for it.
Here are some links to articles I posted near the end of the last thread that some may have missed:
1) Osama being treated by Pak Army CHIDANAND RAJGHATTA
TIMES NEWS NETWORK[ SATURDAY, JULY 24, 2004 12:56:40 PM
http://timesofindia.indiatimes.com/articleshow/msid-789042,curpg-2.cms
2) Hezbollah kept tabs on three 9/11 hijackers
http://www.iranian.ws/iran_news/publish/mid-east.shtml
3) Three excellent background articles that were recently in Rediff that explain a lot of inner workings of Iran and al Qaeda:
http://www.rediff.com/news/2004/jul/16spec1.htm
http://www.rediff.com/news/2004/jul/19spec2.htm
http://in.rediff.com/news/2004/jul/20spec1.htm
Note: Someone asked about the integrity of the Rediff publication, and from what I could tell from looking at the investor information, they are listed on NASDAQ and are legitimate by all appearances.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.