Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

U.S.(Clinton) EQUIPPED TERROR SPONSORS
WorldnetDaily ^ | September 12, 2001 | By Paul Sperry

Posted on 09/13/2001 2:01:33 PM PDT by Uncle Bill

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last
To: Samaritan
Excellent! I wish folks would read that. It doesn't take that long. God bless.
41 posted on 09/14/2001 4:45:13 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 39 | View Replies]

To: Uncle Bill
Close Tags
42 posted on 09/14/2001 5:42:09 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 41 | View Replies]

To: Looking for Diogenes

43 posted on 09/14/2001 5:43:00 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 42 | View Replies]

To: Looking for Diogenes
Darn italics
44 posted on 09/14/2001 5:44:27 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 43 | View Replies]

To: Looking for Diogenes
Maybe this?
45 posted on 09/14/2001 5:47:11 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 44 | View Replies]

To: Looking for Diogenes
Magic </marquee up></marquee up></marquee up></marquee up> potion to close tags!!!!!!!!!!!
46 posted on 09/14/2001 6:05:52 PM PDT by Looking for Diogenes
[ Post Reply | Private Reply | To 45 | View Replies]

To: Inspector Harry Callahan
US AIRCRAFT WERE SCRAMBLED TO INTERCEPT AIRLINERS

What was needed to halt the attacks?

47 posted on 09/14/2001 6:53:08 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 41 | View Replies]

To: Inspector Harry Callahan
"The Sleepers"
48 posted on 09/14/2001 11:10:33 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 47 | View Replies]

Comment #49 Removed by Moderator

To: NotJustAnotherPrettyFace
Bttt
50 posted on 09/15/2001 10:08:33 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 49 | View Replies]

To: Skydrifter
Have you seen this thread? You might be particularly interested in #30.
51 posted on 09/16/2001 12:41:24 AM PDT by independentmind
[ Post Reply | Private Reply | To 50 | View Replies]

To: independentmind
Thanks for the ping. Part of it seems to be from -

Airline Safety ‘Net

- "Attack on America."

I've been told that tonight (Sunday) "60-Minutes" will air a special on the FAA blatant refusal to implement security procedures, despite any warnings. Former FAA security agent, Steve Elson, is supposed to deliver some sickening details as to how this was programmed by the FAA. There were warnings galore, complete with details of how this was guaranteed to happen. There was so little legitimate surprise, it's sickening.

In the months ahead we may see the major airlines citing phony bankrupcy liklihood. Beneath that veneer, note that they won't talk about the associated holding company which is sucking out all the real profit, while making it appear that the airline is anything but at programmed risk. If there's an associated holding company, look for a scam.

Mary Schiavo cited the legislation already proposed to exempt American & United from accounting for the deaths on the ground. It may have been introduced under the direct lobbying of the airlines, or the 'special' lobby which manipulates the FAA to spare the airlines such costs as the lax airport security which brought us to this thread.

Each airline ticket contains a sizable tax which is supposed to prevent such disasters. Instead, it's either allowed to accumulate (no doubt in favored banks) or is pillaged and-or spent on indirect benefits to the airlines. None of it gets spent for safety - strange; or is it? The regulations / laws were there, millions were made for the FAA permitting the airlines to ignore those; the airlines don't deserve a break.

Look for Norm Minetta to cover for the FAA.

Jane Garvey (FAA Administrator) knew; she deserves to answer to a criminal court.

Instead, the airlines responsible will probably get lucrative government contracts under the "Civilian Reserve Air Fleet" program (CRAF).

Make no mistake about it; Clinton's gang set this up with 'quiet' legislation changes and his infamous Presidential Executive Order 12866 - "...if it costs the airlines money; don't do it."

Check out the link, "Attack on America" on the site above.
52 posted on 09/16/2001 4:20:06 AM PDT by SKYDRIFTER
[ Post Reply | Private Reply | To 51 | View Replies]

To: Uncle Bill
Great posting. It's worth noting the names of the airlines picked - United (States) and American.

Not mentioned is that the 757 & 767 cockpits and flight characteristics are so close together that the pilots are issued their captain qualifications for both aircraft, regardless of which aircraft (757 or 767) that they check out on. The terrorists were quite methodical.

The terrorist, Ramsi Yousef, claim for the responsibility for the downing of TWA-800 should also be re-visited at this point. All the dots are connected. No American should think otherwise. We have the Clintons' to thank - naturally.
53 posted on 09/16/2001 4:30:51 AM PDT by SKYDRIFTER
[ Post Reply | Private Reply | To 1 | View Replies]

To: Uncle Bill
BTT
54 posted on 09/16/2001 4:48:24 AM PDT by sport
[ Post Reply | Private Reply | To 20 | View Replies]

To: sport
"Freeh placed his trusted associate Robert Hanssen into his last position with the FBI as counter-intelligence director in New York City."
Source

FBI Probes Espionage at Clinton White House - Insight Magazine
"If spies wanted to penetrate the White House, a facility widely considered the most secure in the world, how might it be done? For that matter, how might any agency or department of government be penetrated by spies?

“Actually, it’s pretty easy if you know what you’re doing,” says a retired U.S. intelligence expert who has helped (along with other government sources) to guide Insight through the many and often complicated pathways of government security and counterespionage.

Access to designs, databases, “blueprints,” memos, telephone numbers, lists of personnel and passwords all can be obtained. And from surprising sources. Several years ago this magazine was able to review from a remote site information on the supposedly secret and inaccessible White House Office Data Base, or WHODB (see “More Personal Secrets on File @ the White House,” July 15, 1996).

Despite the spending of additional millions to beef up security when the White House installed a modern $30 million computerized telephone system a few years ago, communications security remains a big problem. Whatever the level of sophistication employed, there are soft underbellies that raise significant national-security problems. And potential for espionage, such as electronic intercepting of phone calls, is very great.

Calls to or from the White House dealing with classified information are supposed to be handled on secure lines, but it doesn’t always happen. Sometimes, according to Insight’s sources, despite the existence of special phones at the White House and elsewhere to handle such calls, some don’t use them or only one side of the call does. An Insight editor recently was allowed for demonstration purposes to overhear a conversation placed over an unsecured line involving a “classified” topic.

Carelessness always has been a problem, but former and current FBI special agents say that under the Clinton administration the disregard for security has been epidemic. Many officials simply don’t like the bother of communicating on secure phones.

In another instance, Insight was provided access to virtually every telephone number within the White House, including those used by outside agencies with employees in the complex, and even the types of computers used and who uses them. Just by way of illustration, this information allowed direct access to communications instruments located in the Oval Office, the residence, bathrooms and grounds.

With such information, according to security and intelligence experts, a hacker or spy could target individual telephone lines and write software codes enabling the conversations to be forwarded in real-time for remote recording and transcribing. The White House complex contains approximately 5,800 voice, fax and modem lines.

“Having a phone number in and of itself will not necessarily gain you access for monitoring purposes,” Insight was told by a senior intelligence official with regular contact at the White House. “The systems are designed to electronically mask routes and generate secure connections.” That said, coupling a known phone number to routing sequences and trunk lines would pose a security risk, this official says.

Add to that detailed knowledge of computer codes used to move call traffic and your hacker or spy is in a very strong position. “That’s why we have so many redundancies and security devices on the systems — so we can tell if someone is trying to hack in,” says a current security official at the White House.

Shown a sampling of the hoard of data collected over just a few months of digging, the security official’s face went flush: “How the hell did you get that! This is what we are supposed to guard against. This is not supposed to be public.”

Indeed. Nor should the telephone numbers or locations of remote sites or trunk lines or other sundry telecommunications be accessible. What’s surprising is that most of this specialized information reviewed by Insight is unclassified in its separate pieces. When you put it together, the solved puzzle is considered a national-security secret. And for very good reason.

Consider the following: Insight not only was provided secure current phone numbers to the most sensitive lines in the world, but it discovered a remote telephone site in the Washington area which plugs into the White House telecommunications system.

Given national-security concerns, Insight has been asked not to divulge any telephone number, location of high-security equipment, or similar data not directly necessary for this news story.

Concerning the remote telecommunications site, Insight discovered not only its location and access telephone numbers but other information, including the existence of a secret “back door” to the computer system that had been left open for upward of two years without anyone knowing about the security lapse. This back door, common to large computer systems, is used for a variety of services, including those involving technicians, supervisors, contractors and security officers to run diagnostic checks, make repairs and review system operations.

“This is more than just a technical blunder,” says a well-placed source with detailed knowledge of White House security issues. “This is a very serious security failure with unimaginable consequences. Anyone could have accessed that [back door] and gotten into the entire White House phone system and obtained numbers and passwords that we never could track,” the source said, echoing yet another source familiar with the issue."

55 posted on 09/16/2001 9:53:35 AM PDT by Uncle Bill
[ Post Reply | Private Reply | To 54 | View Replies]

To: Uncle Bill
Bump.Thank for the info,Uncle Bill.
56 posted on 09/16/2001 10:07:12 AM PDT by porte des morts
[ Post Reply | Private Reply | To 55 | View Replies]

To: porte des morts
You're welcome. Thanks.

CHAPTER ONE: The Terror Trail - Osama bin Laden

57 posted on 09/16/2001 1:20:02 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 56 | View Replies]

To: Uncle Bill
Uncle Bill, I think that this is only the first installment of the cost of the treachery clinton regime and their enablers, defenders, and apologists' that will be paid with the blood of American citizens.
58 posted on 09/16/2001 7:12:05 PM PDT by sport
[ Post Reply | Private Reply | To 55 | View Replies]

To: Uncle Bill
Partnering With Terrorists
Readers may recall that it was Warren Christopher's (CFR) "diplomacy" under President Carter that brought about the overthrow of two of America's strongest allies, the Shah of Iran and President Somoza of Nicaragua, and the installation of the terrorist regimes under Ayatollah Khomeini and the Sandanistas, respectively, in those countries.

During the Reagan years, Secretary of State George Shultz (CFR) made moves to recognize Yasir Arafat and even sent ships to rescue Arafat and his Soviet-supplied Palestine Liberation Organization (PLO) henchmen when they were trapped in Lebanon and facing annihilation by Israel and rival groups.

During the Presidency of George Bush (CFR), Saddam Hussein, everyone's favorite terrorist scapegoat, was the secret recipient of incredible military aid from the United States. Investigations by the House Banking Committee and various journalists have amply documented an amazing trail of treachery and treasonous actions by Bush and his one-world retinue before, during, and after the Persian Gulf War.

Welcome to the CFR's "war" on terrorism.

59 posted on 09/17/2001 6:38:17 AM PDT by Inspector Harry Callahan
[ Post Reply | Private Reply | To 1 | View Replies]

To: Inspector Harry Callahan
The Corruption of Warren Christopher FR

Terrorist and Hostile Intelligence Actions Against Computer Resources: A Detailed History of Terrorist and Hostile Intelligence Attacks Against Computer Resources

60 posted on 09/18/2001 6:27:59 PM PDT by Uncle Bill
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson