Sunday, December 23, 2001

CyberWar Update #4

Merry Christmas all -- I will be out of pocket for the coming holidays -- best to you and yours.



/mark hopkins

markhopkins@mindless.com

parallad studios

http://www.parallad.com

OSIS Project



Rizzn's Wartime Factbook:
http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com

CyberWar Update #4

Update as of December 23, 2001

Report Assembled by Mark Hopkins


<markhopkins@mindless.com>

of Parallad Studios OSIS Project

http://www.parallad.com

Things this report will concern itself with:

  a.. Operation Buccaneer

  b.. Magic Lantern Developments and Analysis

  c.. New Virus Developments: We have a new Christmas-time virus, the third email worm in three weeks. Read the details to protect yourself from attack.

  d.. Al Qa'ida/Microsoft Hack

    a.. The Story: Suspected member of the Al Qaeda terrorist network, Mohammad Afroze Abdul Razzak, claimed that Islamic militants infiltrated Microsoft and sabotaged the company's Windows XP operating system, according to a source close to Indian police.

    b.. Analysis: How likely is this allegation to be true?  Many say not very.  Read for some interesting possible connections.

  e.. New Federal Encryption Standard

    a.. The Story:The U.S. Federal Government has finally decided to upgrade its DES standard to the newly created AES encryption standard, a long needed change.

    b.. Analysis: How effective is the new standard?  Is it all it's cracked up to be?





Operation Buccaneer



The Story



The federal government concludes a yearlong investigation into software piracy, and in the past week, been involved in raids against WAREZ groups, including 90+ scene group senior members and leaders in US, Canada, Britain, Australia, Norway, 2 cracking groups in Poland.



The US Customs Service, along with the US Department of Justice, on Tuesday December 11th 2001, raided universities and high-tech businesses in 27 cities as part of an international crackdown on underground groups that actively trade in illicit copies of software and digital media. Dubbed "Operation Buccaneer," the enforcement action occurred simultaneously in four other countries, where an additional 22 search warrants were issued, resulting in the arrests of nine people. None of the suspects in the United States have been arrested at

this point.



On Dec. 11, the DCIS, the Environmental Protection Agency's Office of Inspector General and the FBI served 34 search warrants in the United States and Canada. The searches came at the culmination of a sting, known as "Operation Bandwidth," in which an FBI office operated a fake warez site. More than 144,000 programs were uploaded to and downloaded from the site, said Alan Peters, supervisory special agent for the FBI's Las Vegas office.



Confirmed insider information: four major EFnet servers are currently running in debug mode, which enables them to see ALL private traffic, like private chat, passwords sent to channel protection bots, messages, etc. and the information is being filtered and sent to the FBI, which requested this. Currently, a big EDU server, and .ORG server.



In the first overt action of a 15-month investigation of such organized groups of pirates, the Customs Service targeted the oldest and largest group, known as DrinkOrDie.



"We are targeting these groups that do it all the time," Bell said. "If you are at your house one night and you want to get a free copy of some software, that's not what we are talking about."



Customs agents seized 129 computers in the 38 searches nationwide, Bell said. Among the data captured were Web sites with so much pirated media that it took 4,000 pages to list the titles. Another seized system had more than 5,000 movies, including the blockbuster Harry Potter and the Sorcerer's Stone.



"The data was available to millions of people all over the world," said Bell, who added that another 15 countries may take part in the action.



Members of the DrinkOrDie group included corporate executives, computer network administrators, and students at major US universities who regularly uploaded copy-protected software and digital media to be broken by other members of the group. There are perhaps as many as 10 major warez communities such as DrinkOrDie. And they don't do it for profit, Bell

said.



"They believe in a free Internet," he said. "They don't want any rules or any laws that inhibit what they do."



At least one computer security expert criticized the government's crackdown, saying it focuses on the wrong people. "There are two kinds of people pirating software: the kids, and the people who are stamping out 5,000 copies in Taiwan and selling them for $5 a pop," said Bruce Schneier, a well-known encryption expert and president of Counterpane Internet

Security, a network protection company.



The warez groups are typically students and computer aficionados having fun and testing themselves by breaking programs--generally on a power trip, Schneier said. "Throwing the book at these guys is the wrong thing to do," he added.



The Business Software Alliance (BSA), which represents the software industry's interests in Washington, DC, agrees that warez sites are as big a threat as "true" pirates. "You could have a good debate over who is hurting the industry more," said Bob Kruger, vice president of enforcement for the BSA, which has estimated that the software companies lost $2.6 billion in 2000 to US-based piracy. Although downloading programs from the Internet doesn't necessarily have a one-to-one correlation to lost sales, Kruger maintains that there is definitely harm suffered by the industry.



Cracking in The warez community can be divided into smaller "scenes" based on the type of content their members are interested in. Typical divisions are the DivX scene for movies available in MPEG-4 format, the MP3 scene for music available in that popular format, and the PS2 scene for pirated PlayStation 2 games.



"Everyone that had a significant role in the community is worried that the (DrinkOrDie) takedown will change the way the scene works," said the warez programmer, who asked that his name and online handle not be used. "It won't be quite so public anymore."



Typically, a "leak"--someone who supplies a copy of a yet-to-be-released program--uploads the data to an online drop box. The supplier often is someone who works in the company and sells the code for money or to get back at the company for some perceived slight.



The cracker then takes the program, breaks through the security and "rips" a copy that works without the CD-ROM. This step is, by far, the most time-consuming. Typically, the cracker then uses a private site to pass the program to a courier, or curry, who distributes the program to publicly accessible download sites.



Although the raids mainly targeted those suspected of cracking content, the effects will trickle down to hit the software pirates on the street, the warez programmer said. Such pirates depend on the warez community for their supply of copy-protection-free content.



For example, VideoCDs--popular in the Asia-Pacific region--might become scarce, especially those made from newer movies.



"VCD groups have stopped releasing," the warez programmer said. "Asian markets can't get copies of American movies to subtitle, which means they can't sell them on the street."



The discord within the community has been heightened by the FBI's ability to infiltrate at least one online group, RogueWarriorz. In his posting, "ttol" describes RogueWarriorz as a group of about 70 members with access to more than 40 sites belonging to other groups.



The FBI's Peters confirmed that the target of its Operation Bandwidth investigation was the RogueWarriorz.



Peters also predicted that the investigation will drive the remaining software pirates underground. "I think the trend is more, for their own protection, to keep the sites from outside access," he said. "Many have password protections added to them now."



Despite the discord, at least one member of the warez scene believes the law-enforcement victory is fleeting.



"I'm just sure that whatever the FBI decides to do, there will still be people ripping and releasing (warez) internally through groups," wrote one member of the music scene, who used the handle "dsif0r."



"We have finally lost; but I assure you, the FBI cannot keep us down."



Analysis



Truly, I could write volumes on this subject, enough to fill a whole book.  For the constraints of this email, though, I will focus on a few key points.



The idea of targeting these warez distributors and crackers is distasteful on a couple of levels.  Firstly, it is a very much needed debate as to whether or not the warez community takes any money away from the computer entertainment industry.  As many recipients of pirated games have pointed out, more often than not, a player of a pirated game most likely would not have purchased the game if it were for sale in the first place, and is only playing it because it is free.  Then there is the moral highground that some pirates take stating that the high cost of certain software packages (such as much of Adobe's product line) prevents the mass public from ever affording the products they'd like to use.  Very few people can afford the $899 pricetag on the Adobe Photoshop product, much fewer than the number of people who are very talented at using it.



But moving past the debate as to whether certain types of pirates should be prosecuted, what is the actual impact of this event.  Certainly, it can't be over-emphasized that this is probably the most influential event in piracy history.  But the pirate trade is rooted in two things which will ensure its permanency: entertainment industry, and hacking.  As long as the first world remains the first world in the technology age, we will have software piracy.  The entertainment industry is the biggest industry for America, dwarfing its nearest second with the industry-wide profits, thus ensuring that there will always be software to pirate.  And hacking will always be around as long as there is technology to discover -- and this is where the roots of piracy spring.  Piracy stems two sources: from software cracking, or the techno-art of defeating the copy-protection routines put in place by software companies and the innate greed within every computer! user to get a something (computer program) for nothing..  For most crackers, it's simply a test of skill to see if they are up to the challenge.  The fruits of their labors are then placed out for the world to see, and those that are in search of a way to copy their software.  And for the traffickers, it's simply a public service to reroute 1's and 0's to those more deserving. 



One thing is for certain, it hasn't taken the warez community long to regroup.  They are an amorphous bunch, with a structure much like the infamous al-Qa'ida, and the ones not directly hit have already taken a look at their methods for certain.  In much the same way that the human body reacts after a virus attack, pirates will become more aware of ways they can be tracked, and it will become that much harder to track those responsible for piracy in the future.



Magic Lantern Developments and Analysis



Magic Lantern's Existence Admitted



When is a virus, not a virus? When it's written by the FBI.



After months of speculation Reuters reports that an FBI spokesman has finally confirmed that the US government is working on a project, codenamed Magic Lantern, that will log the key-strokes made on infected machines and enable the FBI to track communications made using it.



The FBI has already acknowledged that it uses software that records keystrokes typed into a computer to obtain passwords that can be used to read encrypted e-mail and other documents as part of criminal investigations.



FBI spokesperson Paul Bresson described Magic Lantern to news sources as a "workbench project."



Said Bresson: "We can't discuss it because it's under development, [but] like all technology projects or tools deployed by the FBI, it would be used pursuant to the appropriate legal process."



Remember the recent W32.Badtrans.B@mm MAPI worm which opened a Trojan back door on an infected machine and deployed a keystroke logger to monitor what was written on it? (We do, as we're still getting plenty of infected messages caught in our firewall.) Well, it looks like Magic Lantern will do essentially the same thing.



Fortunately, most major antivirus companies have said that they would not voluntarily cooperate with the FBI, updating their software to detect and clean viruses, no matter where they originated. However, the FBI could get its virus ignored by antivirus software with a legal order. And ISPs have in the past voluntarily cooperated with the FBI allowing it to install its technology on their servers.



SecurityFocus incident analyst Ryan Russell told NewsFactor Network that the battles between civil libertarians and law enforcement agencies like the FBI have been ongoing from the first time cyber-snooping technologies were used.



"Currently, computer monitoring does not require the same standards that telephone taps do, and law enforcement has been constantly pushing to keep those standards lax," Russell said.



French Caldwell of Gartner's Information Security Group, who runs the research firm's project on technology and public policy, told NewsFactor: "The bottom line here is that companies and individuals will be responsible for protecting themselves from both cyberterrorism and the government's response to it."



Given the hijacking attacks of Sept. 11, it is also conceivable that the U.S. government would enlist the aid of private companies to combat terrorism and help its war effort, said Michael Erbschloe, vice president of research at Computer Economics, which analyzes the impact of viruses.



"In previous wars, including the Second World War, the government had the power to call on companies to help, to commandeer the technology," said Mr. Erbschloe, author of Information Warfare: How to Survive Cyber Attacks.



"If we were at war the government would be able to require technology companies to co-operate, I believe, in a number of ways, including getting back door access to information and computer systems."



The FBI's controversial Magic Lantern Trojan horse has been mimicked by the virus writing underground, but in a deadlier form.



Amid rumours of the FBI's cloak and dagger spy tool, it was discovered that a 17 year-old Argentinean virus writer, known only as 'Agentlinux', has created a malicious virus that masquerades as Magic Lantern.



Rather than acting as a Trojan keylogger, as the real Magic Lantern is supposed to do, 'Malantern', as it has been called to avoid confusion, simply deletes all files in the Windows system drivers directory and the 'Temp' directory.



Although it is not thought that the virus is spreading, one expert believes that this could be the start of a Magic Lantern copycat trend.



"It isn't important that the program isn't spreading. What is necessary to realise is that, with the appearance of the official 'Lantern' virus, writers won't wait long to release numerous clones," said Eugene Kaspersky, head of research at Kaspersky Labs.



Something else that has bothered the experts is the fact that the 'real' Magic Lantern could easily end up in the wrong hands and be used by the people it's supposed to catch.



"In addition, the possibility that the original Trojan version could end up in the hands of hackers cannot be excluded. In this case, hackers could use Magic Lantern as a means to their own ends," said Kaspersky.



This threat is heightened by the fact that some antivirus vendors have already said that they would exclude the FBI Trojan from any virus scans in a bid to support the authorities.



FBI asks for Access to Badtrans Database



The FBI is asking for access to a massive database that contains the private communications and passwords of the victims of the Badtrans Internet worm.  Badtrans spreads through security flaws in Microsoft mail software and transmits everything the victim types. Since November 24, Badtrans has violated the privacy of millions of Internet users, and now the FBI wants to take part in the spying.



Victims of Badtrans are infected when they receive an email containing the worm in an attachment and either run the program by clicking on it, or use an email reader like Microsoft Outlook which may automatically run it without user intervention. Once executed, the worm replicates by sending copies of itself to all other email addresses found on the host's machine, and installs a keystroke-logger capable of stealing passwords including those used for telnet, email, ftp, and the web. Also captured is anything else the user may be typing, including personal documents or private emails.



Coincidentally, just four days before the breakout of Badtrans it was revealed that the FBI was developing their own keystroke-logging virus, called Magic Lantern. Made to complement the Carnivore spy system, Magic Lantern would allow them to obtain target's passwords as they type them. This is a significant improvement over Carnivore, which can only see data after it has been transmitted over the Internet, at which point the passwords may have been encrypted.



After Badtrans pilfers keystrokes the data is sent back to one of twenty-two email addresses (this is according to the FBI-- leading anti-virus vendors have only reported seventeen email addresses). Among these are free email addresses at Excite, Yahoo, and IJustGotFired.com. IJustGotFired is a free service of MonkeyBrains, a San Francisco based independent Internet Service Provider.



In particular, suck_my_prick@ijustgotfired.com began receiving emails at 3:23 PM on November 24. Triggering software automatically disabled the account after it exceeded quotas, and began saving messages as they arrived.The following day, MonkeyBrains' mail server was sluggish. Upon examination of the mail server's logs, it quickly became apparent that 100 emails per minute to the "suck_my_prick" alias were the source of the problem. The mails delivered the logged keystrokes from over 100,000 compromised computers in the first day alone.



Last week the FBI contacted the owner of MonkeyBrains, Rudy Rucker, Jr., and requested a cloned copy of the password database and keylogged data. The database includes only information stolen from the victims of the virus, not information about the perpetrator. The FBI wants indiscriminant access to the illegally extracted passwords and keystrokes of over two million people without so much as a warrant. Even with a warrant they would have to specify exactly what information they are after, on whom, and what they expect to find. Instead, they want it all and for no justifiable reason.



One of the most basic tenets of an authoritarian state is one that claims rights for itself that it denies its citizens. Surveillance is perhaps one of the most glaring examples of this in our society. Accordingly, rather than hand over the entire database to the FBI, MonkeyBrains has decided to open the database to the public. Now everyone (including the FBI) will be able query which accounts have been compromised and search for their hostnames. Password and keylogged data will not be made available, for obvious legal reasons.



The implications of complying with the FBI's request, absent any legal authority, are staggering. This is information that no one, not even the FBI, could legally gather themselves. The fact that they seek to take advantage of this worm and benefit from its illicit spoils, demonstrates the FBI's complete and utter contempt for constitutionally mandated due process and protection from unreasonable search and seizure. It defies reason that the FBI expects the American people to trust them to only look at certain permissible nuggets of data and ignore the rest of what they collect. One need only imagine what J. Edgar Hoover would do with today's expansive

surveillance system, coupled with the new powers granted by the Patriot Act, to appreciate the Orwellian nightmare that the United States is becoming. The last thing the FBI should have is a spying Internet worm, and it looks like they've found one. Welcome to the Magic Lantern.





New Virus Developments



Happy New Year/W32 Maldal Virus



A mass-mailing Internet worm that purports to offer New Year greetings was spreading rapidly Wednesday, and is rumored to be the big Christmas virus that antivirus companies have been gearing up for.



The first copy of the virus was detected at 7:23am GMT December 19 2001 by security firm MessageLabs and is said to have originated from South Africa. By using a number of aliases, the e-mail worm has spread virulently throughout the day. MessageLabs has detected 925 incidents of the worm at an Internet level to date, from a number of countries across the globe.



"This won't be as big as Goner, but it is likely to be the biggest Christmas virus," said Alex Shipp, antivirus technology expert at MessageLabs.



The worm, operating under the guises of Zacker, Reeezak, Maldal and Keyluc, arrives with the subject header "Happy New Year" and contains a file attachment entitled "christmas.exe." It uses familiar social engineering tactics to entice recipients to double click on the attachment, before mailing itself and the victim's contact list to everyone in the contact's address book.



How to Recognize the Virus:



W32/Maldal.c@MM was discovered on 7:23am GMT 19 December 2001, it's the third variant of the W32/Maldal@MM family.



The mass-mailing worm arrives in an e-mail file attachment called "christmas.exe", the filesize is 37376 bytes. The worm is using the MS-Outlook address book to mass-mail itself. .



The worm might also be using entries from MS-Messenger.



The worm sends rtf based e-mail messages with:



-File Attachment: christmas.exe

-Subject : Happy New Year

-Body: Hi , I can't describe my feelings But all I can say is Happy new year



Suspect Claims Al Qaeda Hacked Microsoft



The Story



Suspected member of the Al Qaeda terrorist network, Mohammad Afroze Abdul Razzak, claimed that Islamic militants infiltrated Microsoft and sabotaged the company's Windows XP operating system, according to a source close to Indian police.



Afroze, arrested by Mumbai (Bombay) police Oct. 2, has admitted to helping plot terrorist attacks in India, Britain and Australia, India's Hindustan Times newspaper reported Saturday.



During interrogation, Afroze, 25, also claimed that a member or members of Osama bin Laden's Al Qaeda network, posing as computer programmers, were able to gain employment at Microsoft and attempted to plant "trojans, trapdoors, and bugs in Windows XP," according to Ravi Visvesvaraya Prasad, a New Delhi information systems and telecommunication consultant.



Prasad, moderator of an Internet mailing list on south Asia security and information warfare, told us that Afroze made the claims in a police confession.  Officials in the Mumbai police commissioner's office were not immediately available for comment.



Afroze has told Indian authorities that he was part of a team of Al Qaeda terrorists that planned to hijack an aircraft in London on Sept. 11 and crash it into the British House of Commons or into London's Tower Bridge, according to the Hindustan Times, which obtained parts of Afroze's confession.



British intelligence officials have dismissed the claims, according to a report last week in the Guardian, a British newspaper.



Microsoft spokesman Jim Desler said Afroze's claims about the company were "bizarre and unsubstantiated and should be treated skeptically."



According to Desler, Microsoft has rigorous processes in place during the development of Windows to ensure the security and integrity of source code.



Microsoft launched Windows XP in late October. While the company has already issued security patches for the software, no evidence of malicious code in the operating system has been reported.



Under interrogation, Afroze also warned Mumbai police that Al Qaeda was planning an attack on India's parliament complex in New Delhi, the Hindustan Times reported.



The Times of India reported last week that "official sources" believe Afroze is "very close" to Al Qaeda but that authorities find some of his claims inconsistent and "too theatrical to believe."



The Mumbai Police Cyber Crime Investigation Cell is at
http://www.ccicmumbai.com .



Analysis



This report comes amid rumors that Microsoft with the aid of the Cult of the Dead Cow, an infamous hacker group responsible for the trojan horse virus Back Orifice, is installing a keylogging and web-traffic monitoring system in future versions of Windows XP for the marketing department and the USDOJ to share as well as reports of a major security flaw noted in the Windows XP operating system.



It is important to note, however, that whenever confronted publicly about the possibility of monitoring or any back-door access to the users machines, Microsoft has always flatly denied that any such system exists.  Microsoft even presented the German Parlaiment the opportunity to review the source code of Windows XP in a good faith effort to prove that they had no back-door systems involved.



As for the what-if's and loopholes in Microsoft's statements -- Microsoft could be banking on the fact that they know the German Parlaiment wouldn't know heads from tails looking at the sourcecode to the bloated beast of Windows XP, coupled with the fact that Microsoft is currently in a bind with the USDOJ, what with the monopoly hearings and all, they might be using this as a bargaining chip -- "Look, we can offer you a window to every PC user in the world's hard drive/web traffic logs."  In the terrorist/cyber-terrorist/warez trafficker hunt mode the FBI is in right now, that would appear to be a very attractive offer.



Whether or not that capability is installed into WinXP by Al-Qa'ida, cDc, or Microsoft themselves is very doubtful however.  Rumors have flown about every time a release of a new operating system by Microsoft about how they are spying on your hardrive.  In the past it has just been a scarey bed-time story that linux users and other open source os users tell to scare their children at night.  Likely that is what it is this time around.



Important to note is, however, due to the major security flaw that allows hackers to seize control of your machine using a buffer overflow flaw, it is important to patch your copy of XP if you are running it using the patch that Microsoft provides at
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=34991.  If you are running Windows 98, Windows 98se, Windows ME, or Windows XP, you are vulnerable, and should install the patch.





Feds Pick Next-Generation Encryption Standard



Story



The U.S. government on December 4, 2001 formally adopted its next-generation data encryption standard, aimed at better protecting government data transmission and storage. Known as the Advanced Encryption Standard (AES), this new algorithm will replace one first adopted by the federal government in 1977. The new standard is a 128-bit encryption algorithm based on a mathematical formula called Rijndael (pronounced "rhine doll") that was developed by cryptographers Joan Daemen at Proton World International and Vincent Rijmen at Katholieke Universiteit Leuven, both in Belgium.



The U.S. government first selected the pair's Rijndael algorithm to replace the two-decades-old Data Encryption Standard (DES) last year. A period of public comment and proposed revisions to the algorithm followed.



"Now it's an official standard," said Philip Bulman, an official at the National Institute of Standards and Technology (NIST), a unit of the U.S. Commerce Department. While there is no deadline for the government to switch over to AES, Bulman expects "federal agencies will start migrating" to the new algorithm shortly. In addition, it's likely that many companies in the private sector, particularly in financial services, will consider adopting AES as well, he said.



U.S. government officials said last year that they chose Rijndael for their next-generation encryption standard because of its "combination of security, performance, efficiency, ease of implementation and flexibility." Rijndael performed well on a variety of hardware and software platforms, they concluded. It uses relatively small amounts of memory, and it provides strong defense against several different kinds of attacks.



The new standard can support encryption key strength of 128, 192 and 256 bits, according to a government statement. More information about the standard is posted on the NIST Web site.



The federal government's recent decision to adopt the Advanced Encryption Standard (AES) for securing sensitive information will trigger a move from the aging Data Encryption Standard (DES) in the private sector, users and analysts said.



But don't expect it to happen overnight, they added. Technology standards bodies representing industries such as financial services and banking need to approve AES as well, and that will take time. And products such as wireless devices and virtual private networks that incorporate AES have yet to be developed. Corporations using Triple DES technologies, which offer much stronger forms of encryption than DES, will have to wait until low-cost AES implementations become available before a migration to the new standard makes sense from a price perspective.



"AES will likely not replace more than 30% of DES operations before 2004," said John Pescatore, an analyst at Stamford, Conn.-based Gartner Inc.



Experts claim that the algorithm is small, fast and very hard to crack - it would take 149 trillion years to crack a single 128-bit AES key using today's computers.



In software, AES runs about six times as fast as Triple DES and is less CPU-intensive.



The advantages of AES make it inevitable that private corporations will start using it for encryption, said Paul Lamb, chief technology officer at Oil-Law Records Corp., a provider of regulatory and legal information to oil and natural gas companies in Oklahoma City.

Corporations will adopt AES "because of the perceived problems with DES and the greater sense of security with AES," he said.



"I would expect the adoption curve to be pretty steep," said Steve Lindstrom, an analyst at Framingham, Mass.-based Hurwitz Group Inc. Any concerns corporations had about AES not being widely adopted have been put to rest with the government's decision to adopt it for all encryption going forward, he added.





Analysis



The jury is still out on AES.  I am currently polling my friends who roam the encryption circles what they think.  Distributed.net (www.distributed.net) has yet to come out with a statement as of press time on the Rijndael algorithm, or a contest for it, but from a precursory viewing of the algorithm's statistics, it is quite impressive. DES (the former standard) keys are 56 bits long, which means there are approximately 7.2 x 1016 possible DES keys. Thus, there are on the order of 1021 times more AES 128-bit keys than DES 56-bit keys.



The information page on csrc.nist.gov accurately states that:



"In the late 1990s, specialized "DES Cracker" machines were built that could recover a DES key after a few hours. In other words, by trying possible key values, the hardware could determine which key was used to encrypt a message."



It goes on to say:



"Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old.



127.24 gigakeys per second is the rate at which distributed.net currently cracks away at the RC5-64.  This contest has been running for 4 years, and I believe at this time they estimate somewhere around another year to finally crack it.  Undoubtably when encryption reaches the realm of 64-bit or more, you are talking about serious time to brute force hack.



Time will tell how strong the encryption algorithm is, especially once the contest to break it is announced.  The problem with keeping data secure these days generally isn't the problem of the strength of encryption.  Sure, the government is years behind in the effort to keep encryption secure, but the private sector and open source software groups have been using RC5-64 and RC5-128 for years with complete assuredness of their security.



No, the problem with keeping data secure these days is keeping your passwords safe.  With the trojan/keylogger battle going back and forth between the FBI and private hackers, the strength of the encryption is entirely a moot point of the key is intercepted prior to encryption.



---



Information wants to be free! Get your friends to subscribe to the Rizzn's Wartime Factbook update. An awareness in intelligence will result in our collective greater safety. Send them to
http://factbook.notifylist.com



To view the facts surrounding the civilised world's war versus terrorism, go to
http://factbook.diaryland.com. Updated daily!



Information in this briefing completely accurate to the knowledge of the O.S.I.S. as of: 2:25 PM 12/23/2001. Stay tuned for updates.



This briefing is a service of Rizzn Do'Urden, Rizzn's Wartime Factbook, and Parallad Studio's Open Source Intelligence Service.

Now playing: Cheech and Chong - Mexican Americans (AKAradio.com: Judo's Radio Revolution!)



Saturday, December 15, 2001

CyberWar Report #3: John Walker Lindh Supplemental

This is the notes for my interview John Batchelor and John Alexander this evening (WABC 770am NYC @ 10:00pm EST) I've compiled into a CWR.  It is based almost entirely off the newsgroup postings of John Walker Lindh before his departure for Yemen and later Afghanistan.



/mark



Rizzn's Wartime Factbook:
http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com

CyberWar Report #3: John Walker Lindh Supplemental

The update as of December 15th, 2001

Report assembled by Mark Hopkins


<markhopkins@mindless.com>

of Parallad Studios OSIS Project

http://www.parallad.com

John Walker Lindh

Internet Profile and Analysis

Analysis



19 years old now, John Walker Lindh began showing his presence online around mid-1995 (Jun 30th, 1995) using the whimsical e-mail address "doodoo@hooked.net" and other similar variants at age 14.  From his posting style, his language command is somewhat sophisticated, however the subject of his emails were mostly inflammatory trollings to begin with, the kind that most experienced newsgroupers will skip, and newbies/marks tend to respond in kind to. 



He presented himself as a young, black hip-hop dj.  The majority of his usage of his usage of newsgroups was to buy and sell audio equiptment, and occasionally other items such as console gaming systems, comics, and music collections, as well as occasionally make commentary on other's posted lyrics or to post lyrics of his own.



It can be said that John Walker Lindh, or John Doe, as he was known in his hip hop dj'ing circles, that he was somewhat of an expert the area of hip hop music, and he had one of the first hip-hop webpages on the internet, named "John Doe's Dukey Palace" (
http://www.hooked.net/users/doodoo/index.html).  Unfortunately, there exist no current archives of this page, and hooked.net is no longer independantly owned (purchased by BOSS Technologies - hooked.net seemed to be an ISP that was somehow affiliated with the old famous ISP from SF, the Well (well.sf.ca.us - well.com). 



The attempt to get rid of his music collection in 1995 was most likely an attempt to convert to vinyl, since that is a better format for the dj wanting to mix music.  In any case, it looks as if it was unsuccessful, because in 1997 he was still trying to sell the cds along with the vinyl for religious reasons.



In 1996, it is observed he first started asking questions about the Islamic faith, wanting to know what music was forbidden by the Quoran.  Also, in 1996, he began to start liquidating much of his personal belongings (comics, music, console gaming stations, equipment) presumably to buy audio equiptment as well as a vinyl recording of Malcom X speeches.



In 1997, he bought and sold a volumunously large amount of audio equipment, as well as becoming more sure in his Islamic beliefs, no longer just asking questions, but answering them as well.  Towards the end of the year, he had what appears to be all of his audio equipment and music collection for sale on the marketplace newsgroups.



The last post he made regarding religion reflected what can be considered probably the most extreme version of Fundamentalist Islam in which he takes what some consider to be the anti-Semite position of differentiating between Zionism and Judaism.



I consulted my father John C. Hopkins (a psychologist), before concluding my analysis, on John Walker Lindh.  I noticed the rapid procession into Fundamentalist Islam, and from interviews with his parents (his Dad an Irish Catholic and his mom a Buddhist), the family and environment he was brought up into appeared to be quite hippy-happy, no boundaries or rules imposed. 



My armchair diagnosis was that there was failure in the family somewhere, and that the parents could be blamed in some way for the descent into fanaticism.  He agreed with me to a certain extent, but said there are three things that most people try to find out as they progress to adulthood: Who they are, where they came from, and where they are going.  He told me that spiritual instruction from parental figures does not always ensure that children will not rebel, but if this isn't recieved in the home, and the child is encouraged, as John Walker Lindh was, to find his own true path from an early age, there are no shortage of leaders in the world who are willing to fill that void, and in Lindh's case, not all of them good.



John Walker Lindh's Internet Profile

You can view these posts in their original format by going to www.dejanews.com and doing a search with the "author:" option using the following email addresses:



a) doodoo@hooked.net : from aug 12 1995 - aug 19 1997 (46 posts)

b) doodoo@tuna.hooked.net : from jun 30 1995 (1 post)

c) doodoo@also.hooked.net : from jul 07 1995 - jul 19 1995 (2 posts)

d) doodoo@bebe.hooked.net : from jul 01 1995 (1 post)



And the following website (offline - cache unrecovered as of yet):



e)
http://www.hooked.net/users/doodoo/index.html



1995

news:rec.music.hip-hop

news:rec.games.video.marketplace

Flame about a generalization that "all black men should read this rhyme."



Flame criticizing some (ed: bad) lyrics.



Getting rid of part of his CD collection. (includes Ice Cube, Public Enemy, and Redman).  The reason he lists is that he doesn't have a CD player (this fact, however, is refuted in his next post to rec.games.video.marketplace by his stating he has a Turbo Grafx CD System for sale, which will play audio CDs)



1996

news:rec.music.makers.marketplace

news:rec.games.video.marketplace

news:rec.music.hip-hop

news:alt.rap

news:rec.music.funky

news:alt.music.makers.dj

news:alt.religion.islam



WTB: a Roland MS-1 Sampler, Alesis D4 Drum Machine, SR-16 Drum Machine, Rack Mountable Ensonique Mirage, Malcom X Speeches on Vinyl, E-MU Drumulator,

FS: Sega Genesis System (with games), the same cds he was trying to sell last year, the CD set that tends to come with Packard Bell computers in 1995-1996 MPC units, his well tended to Marvel Comics Cards collection, his Daredevil 258-318 collection + misc other Marvel Comics (mint condition), Tape of a freestyle performance collection,



First post to alt.religion.islam:



I've heard recently that certain musical instruments are forbidden by Islam. There is nothing in the Qur'an that I can find relating to this matter, and the Hadith that I've read were fairly vague.

My question is this: are in fact certain musical instruments haram, and if so, which instruments or types of instruments are they?

Thanks in advance to anyone who can help.



There were two responses: The first advised that drums were the only allowed instrument, but only before going to Jihad or at weddings.  The second response said it was up to one's own logical faculties to decide what was "haram" (forbidden) or "not haram" -- as long as the music didn't lead to sexual behavior it shouldn't matter.



Flame on rec.music.hip-hop regarding drug usage and hip-hop in which he clearly states he looks down on drug usage as lowering ones conscience level.



1997

news:alt.music.midi

news:rec.music.makers.marketplace

news:rec.music.makers.synth

news:alt.religion.islam

news:soc.relition.islam

news:alt.rap



WTB: BOSS DR-660 DM, ARP AXXE or Moog Prodigy,

FS: Akai S01 Sampler, E-MU Drumulator, BOSS DR-660 DM, what appears to be his entire music collection,



Started signing his emails Mr. Mujahid (Arabic derivation of the word for holy warrior)



On alt.religion.islam, asked question: "are drawings of

living things (besides plants) forbidden altogether?" There were no responses.



On soc.religion.islam, posted a call to fellow Muslims to show solidarity and not to quibble over petty differences.



On soc.religion.islam, posted a chime-in post mentioning his agreement that those who are Zionists are not Jews and vice versa.



---



Information wants to be free! Get your friends to subscribe to the Rizzn's Wartime Factbook update. An awareness in intelligence will result in our collective greater safety. Send them to
http://factbook.notifylist.com



To view the facts surrounding the civilised world's war versus terrorism, go to
http://factbook.diaryland.com. Updated daily!



Information in this briefing completely accurate to the knowledge of the O.S.I.S. as of: 2:24 PM 12/15/2001. Stay tuned for updates.



This briefing is a service of Rizzn Do'Urden, Rizzn's Wartime Factbook, and Parallad Studio's Open Source Intelligence Service.



Friday, November 30, 2001

CyberWar Update #2

The Virus Invasion portion is new material that I've been working on for a couple days, it first became relevant news about Tuesday of this week.  The FBI vs. CIA is material I went over with John and Paul on their radio show on WABC last night (hear them on 770am 10-1 EST) -- included is a list of other tools that the FBI and CIA are currently employing in their effort to come in line with the online world. Included is a description how you can completely, legally and safely circumvent all the known ways of online federal monitoring.  There are other ways to make it more safe, but these include tactics which are not allowed within the confines of the law, and I cannot suggest their usage for everyday purposes.



Rizzn's Wartime Factbook:
http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com

CyberWar Update #2

The update as of November 30th, 2001

Report assembled by Mark Hopkins


<markhopkins@mindless.com>

of Parallad Studios OSIS Project

There are two major fronts opening up in the Cyber War front, largely being ignored by the major media. Computer security groups are noting the vast influx of email-propelled virii. The other front largely ignored is the clash in the surveillance policies and programs between the FBI and the CIA, reported only by Charles R. Smith of Newsmax.com news service.



Virus Invasion



Badtrans is the name of the virus that is making the rounds currently and grinding email servers to a halt worldwide. There is much speculation by respectable theorists that this may be the much-talked about keylogging virus the FBI is threatening to release on the public known by the name Magic Lantern. Operationally, it fits the profile, logging keystrokes to a temp-file and when the temp-file reaches a certain size, mailing the log file to a pre-specified recipient. The Badtrans virus has had a couple modifications made to it over the last couple weeks, making it's transmission and operations more smooth, and therefore more infections and effective, however it is reported that most commercially available anti-virus software still picks it up prior to infection.



The new version of the Badtrans virus activates embedded HTML in the email and automatically informs Microsoft email programs to activate the attached virus program. The virus also appears to activate the MP3 player.



There are three scenarios within possibility which would explain the origin of the Badtrans virus. The first, most obvious, and most widely accepted is that it is a simple keylogging virus put out by a random hacker to get user's usernames and passwords. The second theory is more of an addendum to the first, in that it's a virus put out by a random hacker at this time to try to create a buzz and make it look as if the FBI is targetting certain groups or demographics (this theory has been posited by many members of the OSINT group RMNews). The third theory is that this is in fact the second iteration of the Magic Lantern keylogger.



The first theory is supported by the simple fact that this sort of thing comes out on a fairly regular basis, and to assume that this virus is any different than the last 15 that have come out is pure conjecture -- at least at first glance. The third theory is supported by the plethora of news releases that has accompanied the virus's release that tell of the FBI's Magic Lantern keylogger's inner workings. The operations are very similar in description, and a mass release through worm form is an effective means of distribution, despite the preferred method of delivery is reportedly the newly allowed ''sneak and peek'' method -- however, distribution through an email virus does seem to be a bit unconventional, a bit of a kludge-type attack. Granted, the FBI's technology teams have proven somewhat clueless as to implementation of internet technologies in the past, but this tends to lack the type of precision the FBI needs, and seems like it could lead to the type of legal trou! ble the FBI could ill-afford.



All of this lends the most credence to the second theory, that it is most likely being used as an Infowar tool, to make individuals feel as if they are being singled out by the FBI or other government agencies since most virus detection systems alert the user of it and mention it's purpose. It may have originally started out as the tool mentioned in theory one, but it has quickly become the tool mentioned in theory two.



FBI vs. CIA in Cyberspace



Most people who are in the intelligence community and those who follow it recognize that there was a vast intelligence failure that led up to the Sept 11 attacks.



The FBI and CIA are two agencies charged with law enforcement and intelligence operations, have taken the most heat for the failure. Both agencies had few areas of cooperation prior to Sept. 11. As it turns out the FBI and CIA have suddenly found themselves in diametrecially opposed roles inside cyberspace.



Below is a list of tools that would aid US Federal law



FBI tools:

Carnivore
(
http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm)

The way carnivore works, according to the diagrams and explanations on the FBI website, is to trap all data going through a certain point, make a copy and send it back to a centralized point. The FBI is then able to sift through it using keyword searches.



Some time last year the FBI was forced by privacy advocates such as the ACLU and the EFF to reveal that it had a new software program called Carnivore designed to monitor Internet e-mail. The way the Carnivore system operates is not on home personal computers, or the client side, but on Internet Service Provider computers, or the server side. This allows the agency to siphon off data from suspected customers.



It is used only for looking through email, according to its description, *however* from it's description, it is also capable of sifting through web traffick. (remember that)



Magic Lantern

There is no official documentation on Magic Lantern on FBI's website, but open source intelligence resources describe it's operation and implementation as such:



It is to be spread either through an agent manually infecting the machine by inserting an infected disk or downloading the infection, or through targeted email virus infections. (i.e., opening an email, and a hidden virus is installed on the victim's machine without his knowlege by way of many security holes in email software).



It is a key-logging program, designed to intercept passwords and outgoing emails from the user's machine. It cannot log mouse clicks, however, which is it's only weakness. (i.e., if a user has an encryption software installed, and has the password stored locally, it can be activated by mouse clicks instead of a password being typed in, thus defeating the keylogging method).



dTective

Developed jointly by Ocean Systems Co. of Burtonsville Md. (did the software side) and Avid Technology Inc. (hardware side). Its purpose is to trace the financial transactions linked to Sept's terrorist attacks against New York and Washington by enhancing ATM video surveillance images that were previously unusable due to bad lighting and such.



Encase

Deleted file recovery tool. Used in cases where the suspect has clean sweep deleted the hard drive of data.



CIA tools:

Triangle Boy/SafeWeb

It's original intent was to allow Asian Surfers (primarily Chinese) to surf the web without government interference. It allowed them to bypass governmentally blockage of websites and to do so anonymously (at least to governments other than the United States).



Technically, this tool sponsored by the CIA could be used as an aid to hackers, as well as those hiding from governments and companies who filter what their users are able to see.



It could also be used as a device to in some way circumvent the FBI from positively tracking down the author of a message. Imagine if a terrorist sets up an account on Hotmail, but uses Triangle Boy to access it. The FBI would be able to determine what the content was, but would be unable to find the user by way of IP tracking. Nor would the FBI know what computer to put Magic Lantern on in case the user was employing a method of encryption, which would prevent the FBI from even seeing the content of the messages as well.



Fluent

Custom-written software scours foreign Web sites and displays information in English back to analysts. The program already understands at least nine languages, including Russian, French and Japanese. Not a remarkable piece of software, same results that this software produce can be accomplished by combining the power of Digital's babelfish project with Google's search engine software.



Echelon

Essentially a European Carnivore, not officially acknowleged by the US government.



Oasis

Technology that listens to worldwide television and radio broadcasts and transcribes detailed reports for analysts. Oasis currently misinterprets about one in every five words and has difficulty recognizing colloquial Arabic, but the system is improving, said Larry Fairchild, head of the CIA's year-old Office of Advanced Information Technology.



Conflicting tools:



The tool conflict comes up between the CIA and the FBI are the CIA's Triangle Boy utility and the FBI's Magic Lantern and Carnivore snooping utilities. Essentially, by using the Triangle Boy web proxy utility or any other commercially available approximation thereof while simultaneously running any number of publicly available different 128-bit encryption routines, you can effectively and completely block yourself off from any FBI monitoring.



What Triangle Boy allows you to do is anonymously surf the web. There are a couple public projects on the internet that approximate what Triangle Boy does, such as it's predecessor Anonymizer.com, probably the web's first public anonymous proxy server. By using this or a similar service to log on to a public, free email server, you have prevented the email server from logging your IP address, or in other words, a number that can be linked to your person.



To completely make your message unintelligable and unbreakable to the US Federal government, use 128-bit or better encryption methods, preferrably the RC5 standard. Distributed.net has been working with a brute force hack of the RC5 encryption routine (64-bit encryption) since 1998 using thousands of computers simultaneously on the project and estimates they have a year left until they break the code. From this one can safely assume that by the time the government is able to break your message at 128-bits, the usefulness of the contents of the message will long past be viable, not to mention most statute of limitation laws will have expired in the process.



Vulnerabilities in the Magic Lantern Keylogger



The Magic Lantern keylogger not only is ineffective in accomplishing it's purpose by virtue of the CIA's and the private sector's privacy tools, it also could backfire on the federal government. Any technically savvy hacker, could quite easily reverse engineer the product to either hack into the repository for the keylogged files or re-distribute the virus as an agent to gather his own data, especially if the government strikes deals with anti-virus makers to make the utility unnoticed by their detection software.







Now playing: ScRaTcH mIx - track16 (AKAradio.com: Dr SoNy AnD bLaCk IcE's TaCo StAnD)



Thursday, November 29, 2001

A different front in the Cyberwar.

A different front in the Cyberwar.



Rizzn's Wartime Factbook: http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com



FBI v. CIA Battle in Cyberspace

Charles R. Smith

Wednesday, Nov. 28, 2001

U.S. Agencies Battle Each Other on the Internet





The U.S. government is struggling to rebuild its image after it failed to discover the plot to attack America on Sept. 11.



The FBI and CIA, two agencies charged with law enforcement and intelligence operations, have taken the most heat for the failure. Both agencies had few areas of cooperation prior to Sept. 11.



Now the FBI and CIA have suddenly discovered conflicting roles inside cyberspace.



The FBI recently was forced to reveal another part of its Cyber-Knight project, an effort by the agency to monitor all Internet communications.



Last year the FBI was forced by privacy advocates to reveal that it had a new software program called Carnivore designed to monitor Internet e-mail. The Carnivore system is reportedly installed not on home personal computers but on Internet Service Provider computers, allowing the agency to siphon off data from suspected customers.



The FBI is reportedly using a new and improved version of Carnivore, a software program designed to monitor secure e-mail over the Internet. The new FBI program, called Magic Lantern, is described as key logger software designed to steal the pass phrase used to start the popular encryption program PGP, or Pretty Good Privacy.



A key logger program is designed to capture keystrokes - what a user keys in - and then store the data in a separate location for later retrieval by a hacker. The FBI plans to use Magic Lantern to capture PGP information to crack encrypted e-mail and intercept Internet data.



Magic Lantern Flaws

Magic Lantern reportedly can be sent in a fashion similar to several virus programs, either as an attachment via e-mail or downloaded from an infected Web site. However, the Magic Lantern program may also be mistaken for a virus program.



The sudden discovery of Magic Lantern caused a flurry of activity from computer software producers. Anti-virus software maker McAfee Associates denied a recent report that it was working with the FBI to ensure its software would not stop the Magic Lantern program. McAfee spokesman Tony Thompson denied it had any contact with the FBI on

Magic Lantern.



According to an official statement by the anti-virus maker, "Network Associates/McAfee.com anti-virus programs will continue to protect our customers' computers from any program that intrudes into their system against their desires or without the knowledge of our customer."



Magic Lantern is also not perfect. Magic Lantern suffers from another flaw in that it is not designed to stop other popular computer encryption programs such as Softwar Pcypher and Mystx public key encryption systems.



These encryption software utilities do not use pass-phrase technology and are immune to Magic Lantern-type attacks. E-mail and data scrambling is done with the mouse using data keys that can be stored on offline diskettes, zip drives or CD disks.



CIA Triangle Boy



Yet, as the FBI struggles to introduce its new system to monitor the Internet, the CIA is working to develop a software program that thwarts government monitoring.



The CIA is a major sponsor of SafeWeb, a company that distributes a free program called Triangle Boy. Triangle Boy allows users to surf the Web anonymously. Citizens inside dictatorships are using the program to avoid monitoring by the oppressive regimes.



Triangle Boy operates much like a mail forwarding service. Each user request to view a Web page is scrambled and randomly sent to another machine, which actually performs the request, returning the data to he original user. Triangle Boy is very popular inside China, and the

Chinese government is working hard on ways to counter secure access to the Internet.



SafeWeb reportedly receives hundreds of e-mails a day from grateful Triangle Boy users worldwide. However, SafeWeb's growing audience in China, Saudi Arabia, the United Arab Emirates and Syria is in direct conflict with FBI efforts to monitor potential terrorist communications.



Despite the concerns, Triangle Boy's developer, SafeWeb's CEO Stephen Hsu, claims terrorists would not use the program.



"A terrorist would be crazy to use SafeWeb," stated Hsu, who noted that the CIA backs his company.



Yet Triangle Boy can be abused, and software vendors have rushed to develop new programs designed to counter the CIA's secure Internet browser.



Porn or Politics?



"I knew that if I knew about Triangle Boy, anybody who was really interested in porn would know about it too," stated Ed Miller, a security operations manager at Computer Sciences Corp.



Filtering vendor 8e6 Technologies, whose customers include major companies such as Computer Sciences Corp., recently developed a way to block Triangle Boy. 8e6 Technologies declined to comment on how its X-Stop filtering system disables Triangle Boy.



"Several IT (information technology) people at the universities and schools that I consult for did extensive research into this," noted Eric Gerlach, a Network Integration Consultant for Southwestern Bell Telephone.



"I have a few insights and an easy fix for it," noted Gerlach.



Ironically, many inside the computer security field declined to

describe ways to stop Triangle Boy - not for technical reasons but for political reasons.



Software experts are usually anxious to publish flaws inside

Microsoft operating systems or other major software packages. Yet this is not the case for Triangle Boy.



"Normally, I'm all for publishing flaws in software, but on this one I have to vote against," stated one computer security expert located in the Netherlands.



"The Chinese finally have access to the Internet. The flaws could be used by the Chinese government to block the Internet once again."



http://www.newsmax.com/archives/articles/2001/11/28/142513.shtml

Tuesday, October 9, 2001

Author Asks Pakistanis to Trust Themselves, Not United States

Let's face it. When a phrase like 'Pakistan comes first' is bandied about so much, there's got to be something very wrong. It goes without saying that one's country comes first. It's understood. If one says repeatedly 'I love my mother' there's something peculiar. Why then do we keep stating the obvious? Could it be that we have never quite decided whether we are Muslims first or Pakistanis, which has led us to support many Muslim causes at great cost to our country with precious little in return. But the real reason is that Pakistan has hardly ever come first for its rulers who have looked after their own interests first. If Pakistan managed to scavenge some scraps that dropped to the floor off the rulers' banquet table, it was touted as a great service to the country, and woe betide anyone who said otherwise.



Thus it was easy for America to use, abuse and abandon us. If you don't respect yourself, why would others? There are disquieting signs that Pakistan's objectives in taking America's side again and risking all might be lost. If America does not take immediate corrective action to rectify this perception, not just another Pakistan-America alliance is in danger of biting the dust, it would destabilize the country and the region dangerously even before America's own objectives are met. What they call an 'extremist' government just might materialize in Pakistan. Not so long ago Clinton was prepared to get Daily Delhi Diarrhea for five days but not spend a second in Pakistan. September 11 changed all that, perhaps everything. Came the season for U-turns. Pakistan is being wooed again. Despite being badly let down a number of times, Pakistan went along with America by doing a U-turn of its own on Afghanistan at great internal and regional peril. It did so for four overt and one not so covert reason.



We abhor terrorism; the new Afghan government must be pro-Pakistan; India and Israel must be kept out of the coalition; organizations striving for Kashmir's freedom will not be harmed; and, America will help Pakistan out of its economic quagmire. All five are in jeopardy. America has made the anti-Pakistan, pro-India Northern Alliance front its advance. That could vitiate installing a pro-Pakistan government. They are backed by India, just as the Taliban were once backed by our ISI and CIA before they ditched us. If I am reading too much into this - as patronising Pakistani officialdom and condescending Westerners tell me - why would our foreign minister go public and say that no government can be foisted on Afghanistan? Allies don't behave like this. They go public only when private persuasion has failed. Meantime a hysterical India is doing its damnedest to derail the Pakistan-US alliance with a botched up bogus hijacking and murdering their people in Srinagar to 'prove' that Pakistan is a terrorist state. Remember they killed five Sikhs in Jammu just before Clinton's visit so that he would not come to Pakistan. Later it was discovered to be India's bloody handiwork. Indian journalists butt into White House press briefing with out-of-context leading questions about Pakistan's 'terrorism' whilst no voice from our side is heard. Pakistanis are justified in feeling furious that no one is there to speak for them.



Musharraf may have great instincts but at least half his team is pathetic. In such a dire situation it makes us mad. This is the harvest of posting nincompoops for reasons other than merit. America banned an organisation involved exclusively in Kashmir's freedom struggle. What is the guarantee America will not run out others and do India's dirty work for it? When Bush said that he would go for terrorist organisations with global reach one was reassured that the Kashmiri freedom fighters, not terrorists by any stretch of the imagination except India's, would be safe. One fears they may not be. As to economic bailout, let's reserve judgement till the finance minister returns from Washington. So far only sanctions have gone and a $50 million US humanitarian grant has come. There is Japan's $40 million Afghan refugee grant and $550 million debt rescheduling and the $375 million US debt rescheduling, promise of humanitarian aid from the European Union and a pat on the back by NATO. Big deal! As to eliminating quotas, America has slapped countervailing duties on our textiles because someone in our government did not know when to keep his big mouth shut and alerted US lobbies. What we want is debt riddance, not just handouts for refugees. We who have been hosting the largest refugee population in the world for two decades (2 million) are in real danger of breaking all records by hosting another million to seven million, depending on whether America opts for selective precision or indiscrimination. Indiscriminate bombing of Afghanistan will make the larger refugee figure and swamp us, giving birth to a much more virulent hatred of America and terrorism so terrible as to make Osama look angelic.



As for our being against terrorism, America's affiliation with the Northern Alliance is like getting into bed with one terrorist to get rid of another. Iran would say one terrorist getting into bed with another terrorist to get rid of a third terrorist in an orgy of sleeping with the enemy. Iran's stand, that it is against both terrorism and America (because it aids and abets Israeli state terrorism) made me proud to be a Muslim (albeit of the Sunni variety). The strange idea that one can only be with America or with terrorism, with no third option, is false, typical American arrogance that can be understood, if not forgiven, this once because it is so stunned. Our government's deft handling (thus far) of a crisis with the greatest spectrum of uncertainty there has ever been in our history makes me proud to be a Pakistani. Our compulsions are different from Iran's. Musharraf may want a friendly Afghan government but can he name one Afghan, including Zahir Shah (whose ouster by his cousin Sardar 'Majnoon' Dawood started the whole shebang), that likes Pakistan? The Northern Alliance represents a minority jing bang lot of nationalities, and I dare say Martians too. Their government will be a mongrel of indeterminate parentage and will not last, pushing Afghanistan and the world into greater crisis. The Taliban may lose government but they won't lose without fighting every inch of the way and make for our mountains and theirs, impossible to dislodge and constantly sniping at stability.



Prosperity is the only way of bringing Afghanistan into the mainstream and helping Pakistan stabilize. Prosperity will come only if, in tandem with a new Afghan national government, there is immediate and demonstrable action towards development. Only by winning hearts and minds can Afghanistan be conquered. That is when the Taliban and terrorism will be conquered too. If the US had only invested $5 billion in Afghanistan after the Soviet withdrawal they would not have seen this day when they have lost more than $100 billion - and rising. Development in Afghanistan's infrastructure and humanity will fix a turbo on Pakistan's economy. Hopefully, America will discover the icing of wisdom for their cake of cleverness. The British, who understand the world and the rhythm of history, can best help them find it. Between cowboy and commando we might just make it. But let's hold our horses till America makes its move. Will there be a reprisal, an Act 2? If there is I fear for the global economy. We Pakistanis must realize that handouts and luck are all very well, but we have no option left except to put our faith in Pakistan and genuinely place it first on our list of priorities. Pakistan being first needn't happen at the cost of self-interest for the two are the same. A prosperous Pakistan means a prosperous people. We have to make it so that our people don't opt to live like second class citizens in other countries. Certainly there is every point in asking whether we can trust a particular country. But first we must learn to trust and respect ourselves. Only then will we earn the trust and respect of others, and learn to trust them sensibly. Only when we have faith and trust in ourselves can we make Pakistan a country that no citizen wants to leave.

A 'Netwar' Clash

By David Ignatius, Washington Post



(snip)



What does seem likely is that we are witnessing the first "netwar." That phrase is drawn from a fascinating paper that was posted on the Internet last week by David Ronfeldt and John Arquilla of Rand. (It can be found at www.firstmonday.org.)



The authors coined the term back in 1993 to describe what they saw as the future of warfare. The West's opponents wouldn't be traditional armies or hierarchical political movements, or even organized guerrilla forces, but groups that operated like the discrete but interconnected nodes of an electronic network.



"These protagonists are likely to consist of dispersed organizations, small groups and individuals who communicate, coordinate and conduct their campaigns in an internetted manner, often without a central command," write Ronfeldt and Arquilla in their new paper. Their cells would be everywhere and nowhere -- like those of bin Laden's al Qaeda network.



The netwar authors make several points that are highly relevant to the new war against terrorism. "Hierarchies have a difficult time fighting networks," they note. That's a telling point for war planners at the Pentagon -- surely one of the most hierarchical organizations ever devised.



"A particular challenge for the cumbersome American bureaucracy will be to encourage deep, all-channel networking among the military, law enforcement and intelligence elements whose collaboration is essential for achieving success," Ronfeldt and Arquilla warn.



"It takes networks to fight networks," they insist. In other words, if the United States and its allies march off in formation into Afghanistan against a dispersed and devious enemy -- one that will fly airplanes into buildings and spray biological weapons from crop-dusters -- they will lose....

Monday, October 8, 2001

US identifies Pentagon suicide attacker as having role in planning the bombing of USS Cole

Edward Helmore and Ed Vulliamy New York

Sunday October 7, 2001

The Observer



US investigators have identified a Saudi as the man Tony Blair referred to

as a key link connecting Osama bin Laden to the Pentagon attack and the

bombings of the USS Cole last year and the two US embassies in East Africa

in 1998.

American and British intelligence officials now believe Khalid al-Mihdhar,

who died in the Pentagon attack, may have played a role in planning the

events of 11 September equal to or exceeding that of Mohamed Atta, the

33-year old Egyptian named as the principal organiser.



Al-Mihdhar has taken on a 'more prominent' role in the investigation, senior

US administration officials said yesterday, confirming theories developed by

British intelligence.



He now appears to have the strongest connection to bin Laden's al-Qaeda

network, because he is the only one known to have ties to the group's

previous attacks against US targets.



Since late last year, the CIA had been aware of a man called Tawifiq bin

Atash, known throughout bin Laden's network by his alias 'Khallad'. Khallad

was born in Yemen and had fought in Afghanistan against the Soviet Union,

going on to become bin Laden's bodyguard and a crucial lieutenant in the

al-Qaeda structure: deemed too precious to die.



According to US intelligence and federal investigators on bin Laden's trail,

'Khallad' was the pivotal figure behind the attack on the Cole. Late in

January 2000, he was captured on a video shot in an hotel in Malaysia, along

with a group of men known to be part of the al-Qaeda network. One was Fahad

al-Quso, who was assigned to shoot a film of the suicide attack on the Cole.



Two others were Nawaf al-Hazami, travelling under surveillance by US

intelligence, and Khalid al-Mihdhar. Both these names would resonate on 11

September, as being among the 19 hijackers. When one investigator saw their

names he uttered an expletive.



As soon as it was determined that he had been at the Malaysian meeting, the

appearance of al-Mihdhar there suddenly elevated his importance. But he

proved an extraordinarily difficult figure to track. Not only did he use

three or four different aliases, but US intelligence agencies spelt each in

different ways and are not even certain that his name is really Khalid

al-Mihdhar.



Still, it is believed that al-Mihdhar took Seat 12B on the American Airlines

flight that crashed into the Pentagon, and eyewitness reports and

surveillance tapes have placed him at Dulles airport where the flight

originated.



Once he had entered the US in January on a Saudi passport, the FBI picked up

his trail in San Diego where he took flying lessons at Sorbi's Flying Club

in May 2000. Rick Garza, al-Mihdhar and al-Hazami's flight instructor at the

school, has said that al-Mihdhar spoke little English but was able say that

he wanted to obtain a private pilot licence.



They were impatient students, Garza said, saying they wanted to learn to fly

jets, specifically Boeings. 'They had zero training before they got here, so

I told them they had to learn a lot of other things first,' he told the New

York Times. 'It was like Dumb and Dumber. I mean, they were clueless. It was

clear to me they weren't going to make it as pilots.'



Al-Mihdhar appears to have left the United States in June 2000 and the trail

goes dead for a year. Then, in July 2001, he flew from Saudi Arabia to New

York on a different Saudi passport, officials say. This time, he listed his

address as a hotel in New York but instead travelled to Virginia where he

obtained a driving licence at the same time as Hani Hanjour, another of the

suspected hijackers on the Pentagon plane.



By then, the CIA had already placed him at the Malaysia meeting and moved to

put him on their watch list of potential terrorists. Realising he was

already in the country, they alerted the FBI he was wanted in connection

with the attack on the Cole.



The FBI has determined that some of the terrorists bought life-size training

posters of the inside of Boeing cockpits from a flying shop in Ohio. The

posters - priced at $39.95 - show the exact locations of controls and detail

the view the pilots would have from the Boeing 767s. Pilots use the posters

for training.



-=-=-=-

07 Oct 2001 20:10



U.S. on alert for al Qaeda plot after strikes





By Tabassum Zakaria



WASHINGTON, Oct 7 (Reuters) - U.S. strikes on Afghanistan may prompt the al Qaeda network to activate some long-planned plot against American targets and U.S. intelligence agencies were on high alert, officials said on Sunday.



"There will be more strikes by terrorists against U.S. interests, whether it's here or abroad or both remains to be seen," one official told Reuters on condition of anonymity.



"There are lots of potential threats out there and there is little doubt that they are going to do something," the official added. "They have been killing Americans for a number of years and were going to continue doing it whether we did this or not."



U.S. and British forces launched air strikes on targets across Afghanistan that included military positions of the country's ruling Taliban and training camps of militant Osama bin Laden's al Qaeda network.



The United States has said bin Laden and his group backed the Sept. 11 attacks on New York and Washington that left nearly 5,600 people dead or missing.



Al Qaeda's method has been to have a plot planned long in advance with the network more likely to activate such a plan rather than formulate a new one to respond to Sunday's strikes on Afghanistan, U.S. officials said.



"Most of the kinds of attacks that we've seen tend to have been planned months and months and months, in some cases years in advance," Defense Secretary Donald Rumsfeld said.



Other U.S. officials said Al Qaeda was likely to decide to go to such a plan.



"Their MO (modus operandi) is to have plans in place long in advance, so they're not going to come up with a new plan as a result of this," the U.S. official who spoke on condition of anonymity said.



"They might time their next response in light of this, it's hard to say. Now that this has happened they can say 'OK, the next thing in our playbook let's go to it now,' but they were going to go to it anyway," the official said.





U.S. WARNS CITIZENS



The U.S. government warned its citizens overseas to be on heightened alert because the strikes may lead to strong anti-American sentiment, and the Federal Aviation Administration said it was working closely with air carriers to ensure maximum safety at the nation's airports.



U.S. President George W. Bush said, "Our government is taking strong precautions. All law enforcement and intelligence agencies are working aggressively around America, around the world and around the clock."



He said at his request many governors had activated the National Guard to strengthen airport security.



"We have called up reserves to reinforce our military capability and strengthen the protection of our homeland," the president said.



The State Department advised Americans to leave Afghanistan and Americans elsewhere to maintain contact with the embassy.



"This action may result in strong anti-American sentiment and retaliatory actions against U.S. citizens and interests throughout the world by terrorists and those who are sympathetic to or otherwise support terrorism," a State Department announcement said.



Rumsfeld said the strikes on Afghanistan had not targeted bin Laden, but were aimed at terrorist networks.



"This is not about a single individual, it's about an entire terrorist network and multiple terrorist networks across the globe," he said.



"The only way to deal with these terrorist threats is to go at them where they exist. You cannot defend at every place, at every time, against every conceivable, imaginable, even unimaginable terrorist attack," Rumsfeld said.



The U.S. official said the "entire national security establishment from intelligence to law enforcement to the Pentagon is all engaged in a way that I've never seen before."



There were "lots of threats, rumors, reports, we take them all seriously," the official said, adding that the intelligence cooperation from different countries has been "unprecedented in its nature."



"We have received more assistance than we've ever received before, but we need much more," the official said. ((Washington newsroom 202 898-8300, fax 202 898 8383, email Washington.bureau.newsroom@reuters.com))

notes on Dallas Suspects

Name:

Motaz Al-Hallak



ID#:

015



Aliases:

Moataz Alhallak, Moataz M Alhallak, Mu'Taz Al-Hallaq, Mohammad Al-Hallak, Mo'Ataz Al-Hallak



DOB:

5.1.1961



SSN:

547-93-2126



Status:

Not in Custody, probably under surveillance



Address:

138 King Row

Arlington, TX 76010



9568 Muirkirk Road, Apt 301

Laurel, MD 20708



Phone:

817-275-2169

240-456-0375

c - 240-988-5611

---

Name:

Ahmed Khalefa



ID#:

137



Aliases:

Almad Khafefa, Alham Khaled



DOB:

1.1.1970



SSN:

097-88-2750



Address:

2095 9th Pl.

Vero Beach, FL 32960



4045 N. Belt Line Road, Apt 314

Irving, TX 75038



745 Polk Drive, #3C

Arlington, TX



Phone:

561-569-5908

c - 561-913-3753



Email:

ahmad3000@aol.com

Sunday, October 7, 2001

Canadian Military

Source: CP

Oct 7, 2001 16:50



Facts on the Canadian military:



PERSONNEL

Total: About 58,000

Army: About 22,000

Navy: About 9,000

Air Force: About 14,000



Other: Staff, administration, support, etc., about 13,000.



KEY WEAPONS SYSTEMS



Army:



_ Leopard I tanks: recently refurbished with new turrets and sights.

Main armament is one 105-mm rifled cannon.



_ LAV (Light armoured vehicles): armoured personnel carrier-armoured

fighting vehicles. Main armament is one 25-mm chain gun.



_ Coyote armoured reconnaissance vehicle: equipped with long range TV,

infra-red and radar sensors.



_ M109 self-propelled howitzers, 155-mm gun.



_ C7 rifles, machine guns.



Air Force:



_ 80 CF-18 fighter-bombers. Some equipped to drop laser-guided bombs and

fire TV-guided Maverick missiles.



_ 32 C-130 Hercules tactical transports.



Navy:



_ 12 patrol frigates armed with a 100-mm gun, various anti-ship and

anti-air missiles.



_ Four Tribal-class destroyers equipped for air defence with standard

missile launch cells.



_ One Victoria-class attack submarine; three more on order from Britain.





COMMAND STRUCTURE

Chief of the defence staff: Gen. Raymond Henault.

Vice-chief (head of administration): Vice-Admiral Gary Garnett.

Deputy chief (head of operations): Vice-Admiral Gary Maddison.

Chief of the maritime staff (head of the navy) Vice-Admiral Ron Buck.

Chief of the air staff (head of the air force) Lt.-Gen. Lloyd Campbell.

Chief of the land staff (head of the army): Lt.-Gen. Mike Jeffery.



MOST RECENT MILITARY ACTION (not including peacekeeping)



1999: Canada sends CF-18 fighter-bombers to the three-month NATO air

campaign over Kosovo. They fly hundreds of bombing missions _ 10 per

cent of the allied total _ with no casualties.



1990-1991: Canada sends three warships, a squadron of CF-18s, an aerial

tanker and a field hospital to the Gulf War. There were no Canadian

casualties.



1950-53: Canada sends ships and infantry to fight with United Nations

forces against a North Korean invasion of South Korea. Over 30,000

Canadians served. More than 500 were killed.



MAIN ALLIANCES



NATO: Founding member. Fought in Kosovo under NATO auspices, operates

1,800-member peacekeeping mission in Bosnia-Herzegovina under NATO.



Norad: Founding member of North American Aerospace Defence Command.

Deputy commander of Norad, stationed at Colorado Springs, Colo., is

always a Canadian.



PEACEKEEPING



1. Bosnia-Herzegovina. NATO Stabilization Force. (1653 people).



2. Croatia. UN Mission of Observers in Prevlaka. (1 person).



3. Kosovo. UN Mission in Kosovo. (5 people).



4. Macedonia. (203 people).



5. Golan Heights. Middle East UN Disengagement Observer Force. (190

people).



6. Cyprus. UN Forces in Cyprus. (3 people).



7. Jerusalem. UN Truce Supervision Organization. (8 people).



8. Sinai. Multinational Force and Observers. (29 people).



9. Sierra Leone. UN Observer Mission. (5 people). International Military

Assistance Training Team. (11 people).



10. Congo. UN Organization Mission. (6 people).



11. Ethiopia and Eritrea. United Nations Mission. (7 people).



INDEX: DEFENCE POLITICS INTERNATIONAL



---



Monday October 8, 2001 12:30 AM



A look at armed forces in Afghanistan:



Forces of the Taliban:



-Troops: 50,000.



-Small arms: AK assault rifles, machine guns, rocket-propelled grenades,

recoilless rifles.



-Armored forces (650 vehicles total): T-62, T-54, T-55 main battle tanks,

BMP infantry fighting vehicles, BTR troop carriers, BRDM-2 scout cars.



-Artillery: 76mm mountain gun, 122mm and 152mm towed guns, 107mm and 122mm

multiple-rocket launch systems, 82mm and 120mm mortars.



-Air Defenses: 23mm ZU-23-2 automatic cannons, 100mm anti-aircraft guns,

possibly U.S.-made Stinger surface-to-air missiles.



-Air Force: 10 Su-22 fighter-bombers, 5 MiG-21 fighters, 10 transport

helicopters, 40 cargo airplanes.



Forces of the Northern Alliance:



-Troops: 12,000-15,000.



-Small arms: AK assault rifles, machine guns, rocket-propelled grenades,

recoilless rifles.



-Armored forces (60-70 vehicles total): T-62, T-54, T-55 main battle tanks,

BMP infantry fighting vehicles, BTR troop carriers, BRDM-2 scout cars.



-Artillery: 107mm, 122mm, 140mm, 220mm multiple-launch rocket systems, 82mm

and 120mm mortars, 100mm, 122mm and 152mm towed guns, 76mm mountain guns.



-Air Defenses: One ZSU-23-4 self-propelled anti-aircraft gun, ZU-23-2

truck-mounted automatic cannons, Stinger surface-to-air missiles.



-Missiles: FROG-7 surface-to-surface missiles, Scud-B short-range ballistic

missiles (25-30 missiles at most).



-Air Force: Eight transport helicopters, 3-4 cargo airplanes.

Thursday, October 4, 2001

UK Foreign and Commonwealth Office

UK Foreign and Commonwealth Office



4 October 2001



Responsibility for the terrorist atrocities

This document does not purport to provide a prosecutable case against Usama

Bin Laden in a court of law. Intelligence often cannot be used evidentially,

due both to the strict rules of admissibility and to the need to protect the

safety of sources. But on the basis of all the information available HMG is

confident of its conclusions as expressed in this document.



RESPONSIBILITY FOR THE TERRORIST ATROCITIES IN THE UNITED STATES, 11

SEPTEMBER 2001



INTRODUCTION



1. The clear conclusions reached by the government are:





Usama Bin Laden and Al Qaida, the terrorist network which he heads, planned

and carried out the atrocities on 11 September 2001;



Usama Bin Laden and Al Qaida retain the will and resources to carry out

further atrocities;



the United Kingdom, and United Kingdom nationals are potential targets; and



Usama Bin Laden and Al Qaida were able to commit these atrocities because of

their close alliance with the Taleban régime, which allowed them to operate

with impunity in pursuing their terrorist activity.

2. The material in respect of 1998 and the USS Cole comes from indictments

and intelligence sources. The material in respect of 11 September comes from

intelligence and the criminal investigation to date. The details of some

aspects cannot be given, but the facts are clear from the intelligence.



3. The document does not contain the totality of the material known to HMG,

given the continuing and absolute need to protect intelligence sources.



SUMMARY



4. The relevant facts show:



Background





Al Qaida is a terrorist organisation with ties to a global network, which

has been in existence for over 10 years. It was founded, and has been led at

all times, by Usama Bin Laden.



Usama Bin Laden and Al Qaida have been engaged in a jihad against the United

States, and its allies. One of their stated aims is the murder of US

citizens, and attacks on America’s allies.



Usama Bin Laden and Al Qaida have been based in Afghanistan since 1996, but

have a network of operations throughout the world. The network includes

training camps, warehouses, communication facilities and commercial

operations able to raise significant sums of money to support its activity.

That activity includes substantial exploitation of the illegal drugs trade

from Afghanistan.



Usama Bin Laden’s Al Qaida and the Taleban régime have a close and mutually

dependent alliance. Usama Bin Laden and Al Qaida provide the Taleban régime

with material, financial and military support. They jointly exploit the

drugs trade. The Taleban régime allows Bin Laden to operate his terrorist

training camps and activities from Afghanistan, protects him from attacks

from outside, and protects the drugs stockpiles. Usama Bin Laden could not

operate his terrorist activities without the alliance and support of the

Taleban régime. The Taleban’s strength would be seriously weakened without

Usama Bin Laden’s military and financial support.



Usama Bin Laden and Al Qaida have the capability to execute major terrorist

attacks.



Usama Bin Laden has claimed credit for the attack on US soldiers in Somalia

in October 1993, which killed 18; for the attack on the US Embassies in

Kenya and Tanzania in August 1998 which killed 224 and injured nearly 5000;

and were linked to the attack on the USS Cole on 12 October 2000, in which

17 crew members were killed and 40 others injured.



They have sought to acquire nuclear and chemical materials for use as

terrorist weapons.

In relation to the terrorist attacks on 11 September



5. After 11 September we learned that, not long before, Bin Laden had

indicated he was about to launch a major attack on America. The detailed

planning for the terrorist attacks of 11 September was carried out by one of

UBL’s close associates. Of the 19 hijackers involved in 11 September 2001,

it has already been established that at least three had links with Al Qaida.

The attacks on 11 September 2001 were similar in both their ambition and

intended impact to previous attacks undertaken by Usama Bin laden and Al

Qaida, and also had features in common. In particular:





Suicide attackers



Co-ordinated attacks on the same day



The aim to cause maximum American casualties



Total disregard for other casualties, including Muslim



Meticulous long-term planning



Absence of warning.

6. Al Qaida retains the capability and the will to make further attacks on

the US and its allies, including the United Kingdom.



7. Al Qaida gives no warning of terrorist attack.



THE FACTS



Usama Bin Laden and Al Qaida



8. In 1989 Usama Bin Laden, and others, founded an international terrorist

group known as “Al Qaida” (the Base). At all times he has been the leader of

Al Qaida.



9. From 1989 until 1991 Usama Bin Laden was based in Afghanistan and

Peshawar, Pakistan. In 1991 he moved to Sudan, where he stayed until 1996.

In that year he returned to Afghanistan, where he remains.



The Taleban Regime



10. The Taleban emerged from the Afghan refugee camps in Pakistan in the

early 1990s. By 1996 they had captured Kabul. They are still engaged in a

bloody civil war to control the whole of Afghanistan. They are led by Mullah

Omar.



11. In 1996 Usama Bin Laden moved back to Afghanistan. He established a

close relationship with Mullah Omar, and threw his support behind the

Taleban. Usama Bin Laden and the Taleban régime have a close alliance on

which both depend for their continued existence. They also share the same

religious values and vision.



12. Usama Bin Laden has provided the Taleban régime with troops, arms, and

money to fight the Northern Alliance. He is closely involved with Taleban

military training, planning and operations. He has representatives in the

Taleban military command structure. He has also given infrastruture

assistance and humanitarian aid. Forces under the control of Usama Bin Laden

have fought alongside the Taleban in the civil war in Afghanistan.



13. Omar has provided Bin Laden with a safe haven in which to operate, and

has allowed him to establish terrorist training camps in Afghanistan. They

jointly exploit the Afghan drugs trade. In return for active Al Qaida

support, the Taleban allow Al Qaida to operate freely, including planning,

training and preparing for terrorist activity. In addition the Taleban

provide security for the stockpiles of drugs.



14. Since 1996, when the Taleban captured Kabul, the United States

government has consistently raised with them a whole range of issues,

including humanitarian aid and terrorism. Well before 11 September 2001 they

had provided evidence to the Taleban of the responsibility of Al Qaida for

the terrorist attacks in East Africa. This evidence had been provided to

senior leaders of the Taleban at their request.



15. The United States government had made it clear to the Taleban regime

that Al Qaida had murdered US citizens, and planned to murder more. The US

offered to work with the Taleban to expel the terrorists from Afghanistan.

These talks, which have been continuing since 1996, have failed to produce

any results.



16. In June 2001, in the face of mounting evidence of the Al Qaida threat,

the United States warned the Taleban that it had the right to defend itself

and that it would hold the régime responsible for attacks against US

citizens by terrorists sheltered in Afghanistan.



17. In this, the United States had the support of the United Nations. The

Security Council, in Resolution 1267, condemned Usama Bin Laden for

sponsoring international terrorism and operating a network of terrorist

camps, and demanded that the Taleban surrender Usama Bin Laden without

further delay so that he could be brought to justice.



18. Despite the evidence provided by the US of the responsibility of Usama

Bin Laden and Al Qaida for the 1998 East Africa bombings, despite the

accurately perceived threats of further atrocities, and despite the demands

of the United Nations, the Taleban régime responded by saying no evidence

existed against Usama Bin Laden, and that neither he nor his network would

be expelled.



19. A former Government official in Afghanistan has described the Taleban

and Usama Bin Laden as “two sides of the same coin: Usama cannot exist in

Afghanistan without the Taleban and the Taleban cannot exist without Usama.”



Al Qaida



20. Al Qaida is dedicated to opposing ‘un-Islamic’ governments in Muslim

countries with force and violence.



21. Al Qaida virulently opposes the United States. Usama Bin Laden has urged

and incited his followers to kill American citizens, in the most unequivocal

terms.



22. On 12 October 1996 he issued a declaration of jihad as follows:



“The people of Islam have suffered from aggression, iniquity and injustice

imposed by the Zionist-Crusader alliance and their collaborators . . .

It is the duty now on every tribe in the Arabian peninsula to fight jihad

and cleanse the land from these Crusader occupiers. Their wealth is booty to

those who kill them.



My Muslim brothers: your brothers in Palestine and in the land of the two

Holy Places (i.e. Saudi Arabia) are calling upon your help and asking you to

take part in fighting against the enemy – the Americans and the Israelis.

They are asking you to do whatever you can to expel the enemies out of the

sanctities of Islam.”



Later in the same year he said that



“terrorising the American occupiers (of Islamic Holy Places) is a religious

and logical obligation.”

In February 1998 he issued and signed a ‘fatwa’ which included a decree to

all Muslims:



“. . . the killing of Americans and their civilian and military allies is a

religious duty for each and every Muslim to be carried out in whichever

country they are until Al Aqsa mosque has been liberated from their grasp

and until their armies have left Muslim lands.”

In the same ‘fatwa’ he called on Muslim scholars and their leaders and their

youths to



“launch an attack on the American soldiers of Satan.”

and concluded:



“We – with God’s help – call on every Muslim who believes in God and wishes

to be rewarded to comply with God’s order to kill Americans and plunder

their money whenever and wherever they find it. We also call on Muslims . .

. to launch the raid on Satan’s US troops and the devil’s supporters allying

with them, and to displace those who are behind them.”

When asked, in 1998, about obtaining chemical or nuclear weapons he said



“acquiring such weapons for the defence of Muslims (was) a religious duty.”

In an interview aired on Al Jazira (Doha, Qatar) television he stated:



“Our enemy is every American male, whether he is directly fighting us or

paying taxes.”

In two interviews broadcast on US television in 1997 and 1998 he referred to

the terrorists who carried out the earlier attack on the World Trade Center

in 1993 as “role models”. He went on to exhort his followers “to take the

fighting to America.”



23. From the early 1990s Usama Bin Laden has sought to obtain nuclear and

chemical materials for use as weapons of terror.



24. Although US targets are Al Qaida’s priority, it also explicitly

threatens the United States’ allies. References to “Zionist-Crusader

alliance and their collaborators,” and to “Satan’s US troops and the devil’s

supporters allying with them” are references which unquestionably include

the United Kingdom.



25. There is a continuing threat. Based on our experience of the way the

network has operated in the past, other cells, like those that carried out

the terrorist attacks on 11 September, must be assumed to exist.



26. Al Qaida functions both on its own and through a network of other

terrorist organisations. These include Egyptian Islamic Jihad and other

north African Islamic extremist terrorist groups, and a number of other

jihadi groups in other countries including the Sudan, Yemen, Somalia,

Pakistan and India. Al Qaida also maintains cells and personnel in a number

of other countries to facilitate its activities.



27. Usama Bin Laden heads the Al Qaida network. Below him is a body known as

the Shura, which includes representatives of other terrorist groups, such as

Egyptian Islamic Jihad leader Ayman Zawahiri and prominent lieutenants of

Bin Laden such as Abu Hafs Al-Masri. Egyptian Islamic Jihad has, in effect,

merged with Al Qaida.



28. In addition to the Shura, Al Qaida has several groups dealing with

military, media, financial and Islamic issues.



29. Mohamed Atef is a member of the group that deals with military and

terrorist operations. His duties include principal responsibility for

training Al Qaida members.



30. Members of Al Qaida must make a pledge of allegiance to follow the

orders of Usama Bin Laden.



31. A great deal of evidence about Usama Bin Laden and Al Qaida has been

made available in the US indictment for earlier crimes.



32. Since 1989, Usama Bin Laden has conducted substantial financial and

business transactions on behalf of Al Qaida and in pursuit of its goals.

These include purchasing land for training camps, purchasing warehouses for

the storage of items, including explosives, purchasing communications and

electronics equipment, and transporting currency and weapons to members of

Al Qaida and associated terrorist groups in countries throughout the world.



33. Since 1989 Usama Bin Laden has provided training camps and guest houses

in Afghanistan, Pakistan, the Sudan, Somalia and Kenya for the use of Al

Qaida and associated terrorist groups. We know from intelligence that there

are currently at least a dozen camps across Afghanistan, of which at least

four are used for training terrorists.



34. Since 1989, Usama Bin Laden has established a series of businesses to

provide income for Al Qaida, and to provide cover for the procurement of

explosives, weapons and chemicals, and for the travel of Al Qaida

operatives. The businesses have included a holding company known as ‘Wadi Al

Aqiq’, a construction business known as ‘Al Hijra’, an agricultural business

known as ‘Al Themar Al Mubaraka’, and investment companies known as ‘Ladin

International’ and ‘Taba Investments’.



Usama Bin Laden and previous attacks



35. In 1992 and 1993 Mohamed Atef travelled to Somalia on several occasions

for the purpose of organising violence against United States and United

Nations troops then stationed in Somalia. On each occasion he reported back

to Usama Bin Laden, at his base in the Riyadh district of Khartoum.



36. In the spring of 1993 Atef, Saif al Adel, another senior member of Al

Qaida, and other members began to provide military training to Somali tribes

for the purpose of fighting the United Nations forces.



37. On 3 and 4 October 1993 operatives of Al Qaida participated in the

attack on US military personnel serving in Somalia as part of the operation

‘Restore Hope.’ Eighteen US military personnel were killed in the attack.



38. From 1993 members of Al Qaida began to live in Nairobi and set up

businesses there, including Asma Ltd, and Tanzanite King. They were

regularly visited there by senior members of Al Qaida, in particular by Atef

and Abu Ubadiah al Banshiri.



39. Beginning in the latter part of 1993, members of Al Qaida in Kenya began

to discuss the possibility of attacking the US Embassy in Nairobi in

retaliation for US participation in Operation Restore Hope in Somalia. Ali

Mohamed, a US citizen and admitted member of Al Qaida, surveyed the US

Embassy as a possible target for a terrorist attack. He took photographs and

made sketches, which he presented to Usama Bin Laden while Bin Laden was in

Sudan. He also admitted that he had trained terrorists for Al Qaida in

Afghanistan in the early 1990s, and that those whom he trained included many

involved in the East African bombings in August 1998.



40. In June or July 1998, two Al Qaida operatives, Fahid Mohammed Ali Msalam

and Sheik Ahmed Salim Swedan, purchased a Toyota truck and made various

alterations to the back of the truck.



41. In early August 1998, operatives of Al Qaida gathered in 43, New Runda

Estates, Nairobi to execute the bombing of the US Embassy in Nairobi.



42. On 7 August 1998, Assam, a Saudi national and Al Qaida operative, drove

the Toyota truck to the US embassy. There was a large bomb in the back of

the truck.



43. Also in the truck was Mohamed Rashed Daoud Al ‘Owali, another Saudi. He,

by his own confession, was an Al Qaida operative, who from about 1996 had

been trained in Al Qaida camps in Afghanistan in explosives, hijacking,

kidnapping, assassination and intelligence techniques. With Usama Bin Laden’

s express permission, he fought alongside the Taleban in Afghanistan. He had

met Usama Bin Laden personally in 1996 and asked for another ‘mission.’

Usama Bin Laden sent him to East Africa after extensive specialised training

at camps in Afghanistan.



44. As the truck approached the Embassy, Al ’Owali got out and threw a stun

grenade at a security guard. Assam drove the truck up to the rear of the

embassy. He got out and then detonated the bomb, which demolished a

multi-storey secretarial college and severely damaged the US embassy, and

the Co-operative bank building. The bomb killed 213 people and injured 4500.

Assam was killed in the explosion.



45. Al ‘Owali expected the mission to end in his death. He had been willing

to die for Al Qaida. But at the last minute he ran away from the bomb truck

and survived. He had no money, passport or plan to escape after the mission,

because he had expected to die.



46. After a few days, he called a telephone number in Yemen to have money

transferred to him in Kenya. The number he rang in Yemen was contacted by

Usama Bin Laden’s phone on the same day as Al ‘Owali was arranging to get

the money.



47. Another person arrested in connection with the Nairobi bombing was

Mohamed Sadeek Odeh. He admitted to his involvement. He identified the

principal participants in the bombing. He named three other persons, all of

whom were Al Qaida or Egyptian Islamic Jihad members.



48. In Dar es Salaam the same day, at about the same time, operatives of Al

Qaida detonated a bomb at the US embassy, killing 11 people. The Al Qaida

operatives involved included Mustafa Mohamed Fadhil and Khaflan Khamis

Mohamed. The bomb was carried in a Nissan Atlas truck, which Ahmed Khfaklan

Ghailani and Sheikh Ahmed Salim Swedan, two Al Qaida operatives, had

purchased in July 1998, in Dar es Salaam.



49. Khaflan Khamis Mohamed was arrested for the bombing. He admitted

membership of Al Qaida, and implicated other members of Al Qaida in the

bombing.



50. On 7 and 8 August 1998, two other members of Al Qaida disseminated

claims of responsibility for the two bombings by sending faxes to media

organisations in Paris, Doha in Qatar, and Dubai in the United Arab

Emirates.



51. Additional evidence of the involvement of Al Qaida in the East African

bombings came from a search conducted in London of several residences and

businesses belonging to Al Qaida and Egyptian Islamic Jihad members. In

those searches a number of documents were found including claims of

responsibility for the East African bombings in the name of a fictitious

group, ‘the Islamic Army for the liberation of the Holy Places.’



52. Al ‘Owali, the would-be suicide bomber, admitted he was told to make a

videotape of himself using the name of the same fictitious group.



53. The faxed claims of responsibility were traced to a telephone number,

which had been in contact with Usama Bin Laden’s cell phone. The claims

disseminated to the press were clearly written by someone familiar with the

conspiracy. They stated that the bombings had been carried out by two Saudis

in Kenya, and one Egyptian in Dar es Salaam. They were probably sent before

the bombings had even taken place. They referred to two Saudis dying in the

Nairobi attack. In fact, because Al ‘Owali fled at the last minute, only one

Saudi died.



54. On 22 December 1998 Usama Bin Laden was asked by Time magazine whether

he was responsible for the August 1998 attacks. He replied:



“The International Islamic Jihad Front for the jihad against the US and

Israel has, by the grace of God, issued a crystal clear fatwa calling on the

Islamic nation to carry on Jihad aimed at liberating the holy sites. The

nation of Mohammed has responded to this appeal. If instigation for jihad

against the Jews and the Americans . . . is considered to be a crime, then

let history be a witness that I am a criminal. Our job is to instigate and,

by the grace of God, we did that, and certain people responded to this

instigation.”

He was asked if he knew the attackers:



“. . . those who risked their lives to earn the pleasure of God are real

men. They managed to rid the Islamic nation of disgrace. We hold them in the

highest esteem.”

And what the US could expect of him:



“. . . any thief or criminal who enters another country to steal should

expect to be exposed to murder at any time . . . The US knows that I have

attacked it, by the grace of God, for more than ten years now . . . God

knows that we have been pleased by the killing of American soldiers (in

Somalia in 1993). This was achieved by the grace of God and the efforts of

the mujahideen . . . Hostility towards America is a religious duty and we

hope to be rewarded for it by God. I am confident that Muslims will be able

to end the legend of the so-called superpower that is America.”

55. In December 1999 a terrorist cell linked to Al Qaida was discovered

trying to carry out attacks inside the United States. An Algerian, Ahmed

Ressam, was stopped at the US-Canadian border and over 100 lbs of bomb

making material was found in his car. Ressam admitted he was planning to set

off a large bomb at Los Angeles International airport on New Year’s Day. He

said that he had received terrorist training at Al Qaida camps in

Afghanistan and then been instructed to go abroad and kill US civilians and

military personnel.



56. On 3 January 2000, a group of Al Qaida members, and other terrorists who

had trained in Al Qaida camps in Afghanistan, attempted to attack a US

destroyer with a small boat loaded with explosives. Their boat sank,

aborting the attack.



57. On 12 October 2000, however, the USS Cole was struck by an

explosive-laden boat while refuelling in Aden harbour. Seventeen crew were

killed, and 40 injured.



58. Several of the perpetrators of the Cole attack (mostly Yemenis and

Saudis) were trained at Usama Bin Laden’s camps in Afghanistan. Al ‘Owali

has identified the two commanders of the attack on the USS Cole as having

participated in the planning and preparation for the East African embassy

bombings.



59. In the months before the September 11 attacks, propaganda videos were

distributed throughout the Middle East and Muslim world by Al Qaida, in

which Usama Bin Laden and others were shown encouraging Muslims to attack

American and Jewish targets.



60. Similar videos, extolling violence against the United States and other

targets, were distributed before the East African embassy attacks in August

1998.



Usama Bin Laden and the 11 September attacks



61. Nineteen men have been identified as the hijackers from the passenger

lists of the four planes hijacked on 11 September 2001. At least three of

them have already been positively identified as associates of Al Qaida. One

has been identified as playing key roles in both the East African embassy

attacks and the USS Cole attack. Investigations continue into the

backgrounds of all the hijackers.



62. From intelligence sources, the following facts have been established

subsequent to 11 September; for intelligence reasons, the names of

associates, though known, are not given.





In the run-up to 11 September, bin Laden was mounting a concerted propaganda

campaign amongst like-minded groups of people – including videos and

documentation – justifying attacks on Jewish and American targets; and

claiming that those who died in the course of them were carrying out God’s

work.



We have learned, subsequent to 11 September, that Bin Laden himself asserted

shortly before 11 September that he was preparing a major attack on America.



In August and early September close associates of Bin Laden were warned to

return to Afghanistan from other parts of the world by 10 September.



Immediately prior to 11 September some known associates of Bin Laden were

naming the date for action as on or around 11 September.



Since 11 September we have learned that one of Bin Laden’s closest and most

senior associates was responsible for the detailed planning of the attacks.



There is evidence of a very specific nature relating to the guilt of Bin

Laden and his associates that is too sensitive to release.

63. Usama Bin Laden remains in charge, and the mastermind, of Al Qaida. In

Al Qaida, an operation on the scale of the 11 September attacks would have

been approved by Usama Bin Laden himself.



64. The modus operandi of 11 September was entirely consistent with previous

attacks. Al Qaida’s record of atrocities is characterised by meticulous long

term planning, a desire to inflict mass casualties, suicide bombers, and

multiple simultaneous attacks.



65. The attacks of 11 September 2001 are entirely consistent with the scale

and sophistication of the planning which went into the attacks on the East

African Embassies and the USS Cole. No warnings were given for these three

attacks, just as there was none on 11 September.



66. Al Qaida operatives, in evidence given in the East African Embassy bomb

trials, have described how the group spends years preparing for an attack.

They conduct repeated surveillance, patiently gather materials, and identify

and vet operatives, who have the skills to participate in the attack and the

willingness to die for their cause.



67. The operatives involved in the 11 September atrocities attended flight

schools, used flight simulators to study the controls of larger aircraft and

placed potential airports and routes under surveillance.



68. Al Qaida’s attacks are characterised by total disregard for innocent

lives, including Muslims. In an interview after the East African bombings,

Usama Bin Laden insisted that the need to attack the United States excused

the killing of other innocent civilians, Muslim and non-Muslim alike.



69. No other organisation has both the motivation and the capability to

carry out attacks like those of the 11 September – only the Al Qaida network

under Usama Bin Laden.



Conclusion



70. The attacks of the 11 September 2001 were planned and carried out by Al

Qaida, an organisation whose head is Usama Bin Laden. That organisation has

the will, and the resources, to execute further attacks of similar scale.

Both the United States and its close allies are targets for such attacks.

The attack could not have occurred without the alliance between the Taleban

and Usama Bin Laden, which allowed Bin Laden to operate freely in

Afghanistan, promoting, planning and executing terrorist activity.