Friday, November 30, 2001

CyberWar Update #2

The Virus Invasion portion is new material that I've been working on for a couple days, it first became relevant news about Tuesday of this week.  The FBI vs. CIA is material I went over with John and Paul on their radio show on WABC last night (hear them on 770am 10-1 EST) -- included is a list of other tools that the FBI and CIA are currently employing in their effort to come in line with the online world. Included is a description how you can completely, legally and safely circumvent all the known ways of online federal monitoring.  There are other ways to make it more safe, but these include tactics which are not allowed within the confines of the law, and I cannot suggest their usage for everyday purposes.



Rizzn's Wartime Factbook:
http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com

CyberWar Update #2

The update as of November 30th, 2001

Report assembled by Mark Hopkins


<markhopkins@mindless.com>

of Parallad Studios OSIS Project

There are two major fronts opening up in the Cyber War front, largely being ignored by the major media. Computer security groups are noting the vast influx of email-propelled virii. The other front largely ignored is the clash in the surveillance policies and programs between the FBI and the CIA, reported only by Charles R. Smith of Newsmax.com news service.



Virus Invasion



Badtrans is the name of the virus that is making the rounds currently and grinding email servers to a halt worldwide. There is much speculation by respectable theorists that this may be the much-talked about keylogging virus the FBI is threatening to release on the public known by the name Magic Lantern. Operationally, it fits the profile, logging keystrokes to a temp-file and when the temp-file reaches a certain size, mailing the log file to a pre-specified recipient. The Badtrans virus has had a couple modifications made to it over the last couple weeks, making it's transmission and operations more smooth, and therefore more infections and effective, however it is reported that most commercially available anti-virus software still picks it up prior to infection.



The new version of the Badtrans virus activates embedded HTML in the email and automatically informs Microsoft email programs to activate the attached virus program. The virus also appears to activate the MP3 player.



There are three scenarios within possibility which would explain the origin of the Badtrans virus. The first, most obvious, and most widely accepted is that it is a simple keylogging virus put out by a random hacker to get user's usernames and passwords. The second theory is more of an addendum to the first, in that it's a virus put out by a random hacker at this time to try to create a buzz and make it look as if the FBI is targetting certain groups or demographics (this theory has been posited by many members of the OSINT group RMNews). The third theory is that this is in fact the second iteration of the Magic Lantern keylogger.



The first theory is supported by the simple fact that this sort of thing comes out on a fairly regular basis, and to assume that this virus is any different than the last 15 that have come out is pure conjecture -- at least at first glance. The third theory is supported by the plethora of news releases that has accompanied the virus's release that tell of the FBI's Magic Lantern keylogger's inner workings. The operations are very similar in description, and a mass release through worm form is an effective means of distribution, despite the preferred method of delivery is reportedly the newly allowed ''sneak and peek'' method -- however, distribution through an email virus does seem to be a bit unconventional, a bit of a kludge-type attack. Granted, the FBI's technology teams have proven somewhat clueless as to implementation of internet technologies in the past, but this tends to lack the type of precision the FBI needs, and seems like it could lead to the type of legal trou! ble the FBI could ill-afford.



All of this lends the most credence to the second theory, that it is most likely being used as an Infowar tool, to make individuals feel as if they are being singled out by the FBI or other government agencies since most virus detection systems alert the user of it and mention it's purpose. It may have originally started out as the tool mentioned in theory one, but it has quickly become the tool mentioned in theory two.



FBI vs. CIA in Cyberspace



Most people who are in the intelligence community and those who follow it recognize that there was a vast intelligence failure that led up to the Sept 11 attacks.



The FBI and CIA are two agencies charged with law enforcement and intelligence operations, have taken the most heat for the failure. Both agencies had few areas of cooperation prior to Sept. 11. As it turns out the FBI and CIA have suddenly found themselves in diametrecially opposed roles inside cyberspace.



Below is a list of tools that would aid US Federal law



FBI tools:

Carnivore
(
http://www.fbi.gov/hq/lab/carnivore/carnlrgmap.htm)

The way carnivore works, according to the diagrams and explanations on the FBI website, is to trap all data going through a certain point, make a copy and send it back to a centralized point. The FBI is then able to sift through it using keyword searches.



Some time last year the FBI was forced by privacy advocates such as the ACLU and the EFF to reveal that it had a new software program called Carnivore designed to monitor Internet e-mail. The way the Carnivore system operates is not on home personal computers, or the client side, but on Internet Service Provider computers, or the server side. This allows the agency to siphon off data from suspected customers.



It is used only for looking through email, according to its description, *however* from it's description, it is also capable of sifting through web traffick. (remember that)



Magic Lantern

There is no official documentation on Magic Lantern on FBI's website, but open source intelligence resources describe it's operation and implementation as such:



It is to be spread either through an agent manually infecting the machine by inserting an infected disk or downloading the infection, or through targeted email virus infections. (i.e., opening an email, and a hidden virus is installed on the victim's machine without his knowlege by way of many security holes in email software).



It is a key-logging program, designed to intercept passwords and outgoing emails from the user's machine. It cannot log mouse clicks, however, which is it's only weakness. (i.e., if a user has an encryption software installed, and has the password stored locally, it can be activated by mouse clicks instead of a password being typed in, thus defeating the keylogging method).



dTective

Developed jointly by Ocean Systems Co. of Burtonsville Md. (did the software side) and Avid Technology Inc. (hardware side). Its purpose is to trace the financial transactions linked to Sept's terrorist attacks against New York and Washington by enhancing ATM video surveillance images that were previously unusable due to bad lighting and such.



Encase

Deleted file recovery tool. Used in cases where the suspect has clean sweep deleted the hard drive of data.



CIA tools:

Triangle Boy/SafeWeb

It's original intent was to allow Asian Surfers (primarily Chinese) to surf the web without government interference. It allowed them to bypass governmentally blockage of websites and to do so anonymously (at least to governments other than the United States).



Technically, this tool sponsored by the CIA could be used as an aid to hackers, as well as those hiding from governments and companies who filter what their users are able to see.



It could also be used as a device to in some way circumvent the FBI from positively tracking down the author of a message. Imagine if a terrorist sets up an account on Hotmail, but uses Triangle Boy to access it. The FBI would be able to determine what the content was, but would be unable to find the user by way of IP tracking. Nor would the FBI know what computer to put Magic Lantern on in case the user was employing a method of encryption, which would prevent the FBI from even seeing the content of the messages as well.



Fluent

Custom-written software scours foreign Web sites and displays information in English back to analysts. The program already understands at least nine languages, including Russian, French and Japanese. Not a remarkable piece of software, same results that this software produce can be accomplished by combining the power of Digital's babelfish project with Google's search engine software.



Echelon

Essentially a European Carnivore, not officially acknowleged by the US government.



Oasis

Technology that listens to worldwide television and radio broadcasts and transcribes detailed reports for analysts. Oasis currently misinterprets about one in every five words and has difficulty recognizing colloquial Arabic, but the system is improving, said Larry Fairchild, head of the CIA's year-old Office of Advanced Information Technology.



Conflicting tools:



The tool conflict comes up between the CIA and the FBI are the CIA's Triangle Boy utility and the FBI's Magic Lantern and Carnivore snooping utilities. Essentially, by using the Triangle Boy web proxy utility or any other commercially available approximation thereof while simultaneously running any number of publicly available different 128-bit encryption routines, you can effectively and completely block yourself off from any FBI monitoring.



What Triangle Boy allows you to do is anonymously surf the web. There are a couple public projects on the internet that approximate what Triangle Boy does, such as it's predecessor Anonymizer.com, probably the web's first public anonymous proxy server. By using this or a similar service to log on to a public, free email server, you have prevented the email server from logging your IP address, or in other words, a number that can be linked to your person.



To completely make your message unintelligable and unbreakable to the US Federal government, use 128-bit or better encryption methods, preferrably the RC5 standard. Distributed.net has been working with a brute force hack of the RC5 encryption routine (64-bit encryption) since 1998 using thousands of computers simultaneously on the project and estimates they have a year left until they break the code. From this one can safely assume that by the time the government is able to break your message at 128-bits, the usefulness of the contents of the message will long past be viable, not to mention most statute of limitation laws will have expired in the process.



Vulnerabilities in the Magic Lantern Keylogger



The Magic Lantern keylogger not only is ineffective in accomplishing it's purpose by virtue of the CIA's and the private sector's privacy tools, it also could backfire on the federal government. Any technically savvy hacker, could quite easily reverse engineer the product to either hack into the repository for the keylogged files or re-distribute the virus as an agent to gather his own data, especially if the government strikes deals with anti-virus makers to make the utility unnoticed by their detection software.







Now playing: ScRaTcH mIx - track16 (AKAradio.com: Dr SoNy AnD bLaCk IcE's TaCo StAnD)



Thursday, November 29, 2001

A different front in the Cyberwar.

A different front in the Cyberwar.



Rizzn's Wartime Factbook: http://factbook.diaryland.com/

The Best UAV: http://www.unmannedaircraft.com



FBI v. CIA Battle in Cyberspace

Charles R. Smith

Wednesday, Nov. 28, 2001

U.S. Agencies Battle Each Other on the Internet





The U.S. government is struggling to rebuild its image after it failed to discover the plot to attack America on Sept. 11.



The FBI and CIA, two agencies charged with law enforcement and intelligence operations, have taken the most heat for the failure. Both agencies had few areas of cooperation prior to Sept. 11.



Now the FBI and CIA have suddenly discovered conflicting roles inside cyberspace.



The FBI recently was forced to reveal another part of its Cyber-Knight project, an effort by the agency to monitor all Internet communications.



Last year the FBI was forced by privacy advocates to reveal that it had a new software program called Carnivore designed to monitor Internet e-mail. The Carnivore system is reportedly installed not on home personal computers but on Internet Service Provider computers, allowing the agency to siphon off data from suspected customers.



The FBI is reportedly using a new and improved version of Carnivore, a software program designed to monitor secure e-mail over the Internet. The new FBI program, called Magic Lantern, is described as key logger software designed to steal the pass phrase used to start the popular encryption program PGP, or Pretty Good Privacy.



A key logger program is designed to capture keystrokes - what a user keys in - and then store the data in a separate location for later retrieval by a hacker. The FBI plans to use Magic Lantern to capture PGP information to crack encrypted e-mail and intercept Internet data.



Magic Lantern Flaws

Magic Lantern reportedly can be sent in a fashion similar to several virus programs, either as an attachment via e-mail or downloaded from an infected Web site. However, the Magic Lantern program may also be mistaken for a virus program.



The sudden discovery of Magic Lantern caused a flurry of activity from computer software producers. Anti-virus software maker McAfee Associates denied a recent report that it was working with the FBI to ensure its software would not stop the Magic Lantern program. McAfee spokesman Tony Thompson denied it had any contact with the FBI on

Magic Lantern.



According to an official statement by the anti-virus maker, "Network Associates/McAfee.com anti-virus programs will continue to protect our customers' computers from any program that intrudes into their system against their desires or without the knowledge of our customer."



Magic Lantern is also not perfect. Magic Lantern suffers from another flaw in that it is not designed to stop other popular computer encryption programs such as Softwar Pcypher and Mystx public key encryption systems.



These encryption software utilities do not use pass-phrase technology and are immune to Magic Lantern-type attacks. E-mail and data scrambling is done with the mouse using data keys that can be stored on offline diskettes, zip drives or CD disks.



CIA Triangle Boy



Yet, as the FBI struggles to introduce its new system to monitor the Internet, the CIA is working to develop a software program that thwarts government monitoring.



The CIA is a major sponsor of SafeWeb, a company that distributes a free program called Triangle Boy. Triangle Boy allows users to surf the Web anonymously. Citizens inside dictatorships are using the program to avoid monitoring by the oppressive regimes.



Triangle Boy operates much like a mail forwarding service. Each user request to view a Web page is scrambled and randomly sent to another machine, which actually performs the request, returning the data to he original user. Triangle Boy is very popular inside China, and the

Chinese government is working hard on ways to counter secure access to the Internet.



SafeWeb reportedly receives hundreds of e-mails a day from grateful Triangle Boy users worldwide. However, SafeWeb's growing audience in China, Saudi Arabia, the United Arab Emirates and Syria is in direct conflict with FBI efforts to monitor potential terrorist communications.



Despite the concerns, Triangle Boy's developer, SafeWeb's CEO Stephen Hsu, claims terrorists would not use the program.



"A terrorist would be crazy to use SafeWeb," stated Hsu, who noted that the CIA backs his company.



Yet Triangle Boy can be abused, and software vendors have rushed to develop new programs designed to counter the CIA's secure Internet browser.



Porn or Politics?



"I knew that if I knew about Triangle Boy, anybody who was really interested in porn would know about it too," stated Ed Miller, a security operations manager at Computer Sciences Corp.



Filtering vendor 8e6 Technologies, whose customers include major companies such as Computer Sciences Corp., recently developed a way to block Triangle Boy. 8e6 Technologies declined to comment on how its X-Stop filtering system disables Triangle Boy.



"Several IT (information technology) people at the universities and schools that I consult for did extensive research into this," noted Eric Gerlach, a Network Integration Consultant for Southwestern Bell Telephone.



"I have a few insights and an easy fix for it," noted Gerlach.



Ironically, many inside the computer security field declined to

describe ways to stop Triangle Boy - not for technical reasons but for political reasons.



Software experts are usually anxious to publish flaws inside

Microsoft operating systems or other major software packages. Yet this is not the case for Triangle Boy.



"Normally, I'm all for publishing flaws in software, but on this one I have to vote against," stated one computer security expert located in the Netherlands.



"The Chinese finally have access to the Internet. The flaws could be used by the Chinese government to block the Internet once again."



http://www.newsmax.com/archives/articles/2001/11/28/142513.shtml

Tuesday, October 9, 2001

Author Asks Pakistanis to Trust Themselves, Not United States

Let's face it. When a phrase like 'Pakistan comes first' is bandied about so much, there's got to be something very wrong. It goes without saying that one's country comes first. It's understood. If one says repeatedly 'I love my mother' there's something peculiar. Why then do we keep stating the obvious? Could it be that we have never quite decided whether we are Muslims first or Pakistanis, which has led us to support many Muslim causes at great cost to our country with precious little in return. But the real reason is that Pakistan has hardly ever come first for its rulers who have looked after their own interests first. If Pakistan managed to scavenge some scraps that dropped to the floor off the rulers' banquet table, it was touted as a great service to the country, and woe betide anyone who said otherwise.



Thus it was easy for America to use, abuse and abandon us. If you don't respect yourself, why would others? There are disquieting signs that Pakistan's objectives in taking America's side again and risking all might be lost. If America does not take immediate corrective action to rectify this perception, not just another Pakistan-America alliance is in danger of biting the dust, it would destabilize the country and the region dangerously even before America's own objectives are met. What they call an 'extremist' government just might materialize in Pakistan. Not so long ago Clinton was prepared to get Daily Delhi Diarrhea for five days but not spend a second in Pakistan. September 11 changed all that, perhaps everything. Came the season for U-turns. Pakistan is being wooed again. Despite being badly let down a number of times, Pakistan went along with America by doing a U-turn of its own on Afghanistan at great internal and regional peril. It did so for four overt and one not so covert reason.



We abhor terrorism; the new Afghan government must be pro-Pakistan; India and Israel must be kept out of the coalition; organizations striving for Kashmir's freedom will not be harmed; and, America will help Pakistan out of its economic quagmire. All five are in jeopardy. America has made the anti-Pakistan, pro-India Northern Alliance front its advance. That could vitiate installing a pro-Pakistan government. They are backed by India, just as the Taliban were once backed by our ISI and CIA before they ditched us. If I am reading too much into this - as patronising Pakistani officialdom and condescending Westerners tell me - why would our foreign minister go public and say that no government can be foisted on Afghanistan? Allies don't behave like this. They go public only when private persuasion has failed. Meantime a hysterical India is doing its damnedest to derail the Pakistan-US alliance with a botched up bogus hijacking and murdering their people in Srinagar to 'prove' that Pakistan is a terrorist state. Remember they killed five Sikhs in Jammu just before Clinton's visit so that he would not come to Pakistan. Later it was discovered to be India's bloody handiwork. Indian journalists butt into White House press briefing with out-of-context leading questions about Pakistan's 'terrorism' whilst no voice from our side is heard. Pakistanis are justified in feeling furious that no one is there to speak for them.



Musharraf may have great instincts but at least half his team is pathetic. In such a dire situation it makes us mad. This is the harvest of posting nincompoops for reasons other than merit. America banned an organisation involved exclusively in Kashmir's freedom struggle. What is the guarantee America will not run out others and do India's dirty work for it? When Bush said that he would go for terrorist organisations with global reach one was reassured that the Kashmiri freedom fighters, not terrorists by any stretch of the imagination except India's, would be safe. One fears they may not be. As to economic bailout, let's reserve judgement till the finance minister returns from Washington. So far only sanctions have gone and a $50 million US humanitarian grant has come. There is Japan's $40 million Afghan refugee grant and $550 million debt rescheduling and the $375 million US debt rescheduling, promise of humanitarian aid from the European Union and a pat on the back by NATO. Big deal! As to eliminating quotas, America has slapped countervailing duties on our textiles because someone in our government did not know when to keep his big mouth shut and alerted US lobbies. What we want is debt riddance, not just handouts for refugees. We who have been hosting the largest refugee population in the world for two decades (2 million) are in real danger of breaking all records by hosting another million to seven million, depending on whether America opts for selective precision or indiscrimination. Indiscriminate bombing of Afghanistan will make the larger refugee figure and swamp us, giving birth to a much more virulent hatred of America and terrorism so terrible as to make Osama look angelic.



As for our being against terrorism, America's affiliation with the Northern Alliance is like getting into bed with one terrorist to get rid of another. Iran would say one terrorist getting into bed with another terrorist to get rid of a third terrorist in an orgy of sleeping with the enemy. Iran's stand, that it is against both terrorism and America (because it aids and abets Israeli state terrorism) made me proud to be a Muslim (albeit of the Sunni variety). The strange idea that one can only be with America or with terrorism, with no third option, is false, typical American arrogance that can be understood, if not forgiven, this once because it is so stunned. Our government's deft handling (thus far) of a crisis with the greatest spectrum of uncertainty there has ever been in our history makes me proud to be a Pakistani. Our compulsions are different from Iran's. Musharraf may want a friendly Afghan government but can he name one Afghan, including Zahir Shah (whose ouster by his cousin Sardar 'Majnoon' Dawood started the whole shebang), that likes Pakistan? The Northern Alliance represents a minority jing bang lot of nationalities, and I dare say Martians too. Their government will be a mongrel of indeterminate parentage and will not last, pushing Afghanistan and the world into greater crisis. The Taliban may lose government but they won't lose without fighting every inch of the way and make for our mountains and theirs, impossible to dislodge and constantly sniping at stability.



Prosperity is the only way of bringing Afghanistan into the mainstream and helping Pakistan stabilize. Prosperity will come only if, in tandem with a new Afghan national government, there is immediate and demonstrable action towards development. Only by winning hearts and minds can Afghanistan be conquered. That is when the Taliban and terrorism will be conquered too. If the US had only invested $5 billion in Afghanistan after the Soviet withdrawal they would not have seen this day when they have lost more than $100 billion - and rising. Development in Afghanistan's infrastructure and humanity will fix a turbo on Pakistan's economy. Hopefully, America will discover the icing of wisdom for their cake of cleverness. The British, who understand the world and the rhythm of history, can best help them find it. Between cowboy and commando we might just make it. But let's hold our horses till America makes its move. Will there be a reprisal, an Act 2? If there is I fear for the global economy. We Pakistanis must realize that handouts and luck are all very well, but we have no option left except to put our faith in Pakistan and genuinely place it first on our list of priorities. Pakistan being first needn't happen at the cost of self-interest for the two are the same. A prosperous Pakistan means a prosperous people. We have to make it so that our people don't opt to live like second class citizens in other countries. Certainly there is every point in asking whether we can trust a particular country. But first we must learn to trust and respect ourselves. Only then will we earn the trust and respect of others, and learn to trust them sensibly. Only when we have faith and trust in ourselves can we make Pakistan a country that no citizen wants to leave.

A 'Netwar' Clash

By David Ignatius, Washington Post



(snip)



What does seem likely is that we are witnessing the first "netwar." That phrase is drawn from a fascinating paper that was posted on the Internet last week by David Ronfeldt and John Arquilla of Rand. (It can be found at www.firstmonday.org.)



The authors coined the term back in 1993 to describe what they saw as the future of warfare. The West's opponents wouldn't be traditional armies or hierarchical political movements, or even organized guerrilla forces, but groups that operated like the discrete but interconnected nodes of an electronic network.



"These protagonists are likely to consist of dispersed organizations, small groups and individuals who communicate, coordinate and conduct their campaigns in an internetted manner, often without a central command," write Ronfeldt and Arquilla in their new paper. Their cells would be everywhere and nowhere -- like those of bin Laden's al Qaeda network.



The netwar authors make several points that are highly relevant to the new war against terrorism. "Hierarchies have a difficult time fighting networks," they note. That's a telling point for war planners at the Pentagon -- surely one of the most hierarchical organizations ever devised.



"A particular challenge for the cumbersome American bureaucracy will be to encourage deep, all-channel networking among the military, law enforcement and intelligence elements whose collaboration is essential for achieving success," Ronfeldt and Arquilla warn.



"It takes networks to fight networks," they insist. In other words, if the United States and its allies march off in formation into Afghanistan against a dispersed and devious enemy -- one that will fly airplanes into buildings and spray biological weapons from crop-dusters -- they will lose....

Monday, October 8, 2001

US identifies Pentagon suicide attacker as having role in planning the bombing of USS Cole

Edward Helmore and Ed Vulliamy New York

Sunday October 7, 2001

The Observer



US investigators have identified a Saudi as the man Tony Blair referred to

as a key link connecting Osama bin Laden to the Pentagon attack and the

bombings of the USS Cole last year and the two US embassies in East Africa

in 1998.

American and British intelligence officials now believe Khalid al-Mihdhar,

who died in the Pentagon attack, may have played a role in planning the

events of 11 September equal to or exceeding that of Mohamed Atta, the

33-year old Egyptian named as the principal organiser.



Al-Mihdhar has taken on a 'more prominent' role in the investigation, senior

US administration officials said yesterday, confirming theories developed by

British intelligence.



He now appears to have the strongest connection to bin Laden's al-Qaeda

network, because he is the only one known to have ties to the group's

previous attacks against US targets.



Since late last year, the CIA had been aware of a man called Tawifiq bin

Atash, known throughout bin Laden's network by his alias 'Khallad'. Khallad

was born in Yemen and had fought in Afghanistan against the Soviet Union,

going on to become bin Laden's bodyguard and a crucial lieutenant in the

al-Qaeda structure: deemed too precious to die.



According to US intelligence and federal investigators on bin Laden's trail,

'Khallad' was the pivotal figure behind the attack on the Cole. Late in

January 2000, he was captured on a video shot in an hotel in Malaysia, along

with a group of men known to be part of the al-Qaeda network. One was Fahad

al-Quso, who was assigned to shoot a film of the suicide attack on the Cole.



Two others were Nawaf al-Hazami, travelling under surveillance by US

intelligence, and Khalid al-Mihdhar. Both these names would resonate on 11

September, as being among the 19 hijackers. When one investigator saw their

names he uttered an expletive.



As soon as it was determined that he had been at the Malaysian meeting, the

appearance of al-Mihdhar there suddenly elevated his importance. But he

proved an extraordinarily difficult figure to track. Not only did he use

three or four different aliases, but US intelligence agencies spelt each in

different ways and are not even certain that his name is really Khalid

al-Mihdhar.



Still, it is believed that al-Mihdhar took Seat 12B on the American Airlines

flight that crashed into the Pentagon, and eyewitness reports and

surveillance tapes have placed him at Dulles airport where the flight

originated.



Once he had entered the US in January on a Saudi passport, the FBI picked up

his trail in San Diego where he took flying lessons at Sorbi's Flying Club

in May 2000. Rick Garza, al-Mihdhar and al-Hazami's flight instructor at the

school, has said that al-Mihdhar spoke little English but was able say that

he wanted to obtain a private pilot licence.



They were impatient students, Garza said, saying they wanted to learn to fly

jets, specifically Boeings. 'They had zero training before they got here, so

I told them they had to learn a lot of other things first,' he told the New

York Times. 'It was like Dumb and Dumber. I mean, they were clueless. It was

clear to me they weren't going to make it as pilots.'



Al-Mihdhar appears to have left the United States in June 2000 and the trail

goes dead for a year. Then, in July 2001, he flew from Saudi Arabia to New

York on a different Saudi passport, officials say. This time, he listed his

address as a hotel in New York but instead travelled to Virginia where he

obtained a driving licence at the same time as Hani Hanjour, another of the

suspected hijackers on the Pentagon plane.



By then, the CIA had already placed him at the Malaysia meeting and moved to

put him on their watch list of potential terrorists. Realising he was

already in the country, they alerted the FBI he was wanted in connection

with the attack on the Cole.



The FBI has determined that some of the terrorists bought life-size training

posters of the inside of Boeing cockpits from a flying shop in Ohio. The

posters - priced at $39.95 - show the exact locations of controls and detail

the view the pilots would have from the Boeing 767s. Pilots use the posters

for training.



-=-=-=-

07 Oct 2001 20:10



U.S. on alert for al Qaeda plot after strikes





By Tabassum Zakaria



WASHINGTON, Oct 7 (Reuters) - U.S. strikes on Afghanistan may prompt the al Qaeda network to activate some long-planned plot against American targets and U.S. intelligence agencies were on high alert, officials said on Sunday.



"There will be more strikes by terrorists against U.S. interests, whether it's here or abroad or both remains to be seen," one official told Reuters on condition of anonymity.



"There are lots of potential threats out there and there is little doubt that they are going to do something," the official added. "They have been killing Americans for a number of years and were going to continue doing it whether we did this or not."



U.S. and British forces launched air strikes on targets across Afghanistan that included military positions of the country's ruling Taliban and training camps of militant Osama bin Laden's al Qaeda network.



The United States has said bin Laden and his group backed the Sept. 11 attacks on New York and Washington that left nearly 5,600 people dead or missing.



Al Qaeda's method has been to have a plot planned long in advance with the network more likely to activate such a plan rather than formulate a new one to respond to Sunday's strikes on Afghanistan, U.S. officials said.



"Most of the kinds of attacks that we've seen tend to have been planned months and months and months, in some cases years in advance," Defense Secretary Donald Rumsfeld said.



Other U.S. officials said Al Qaeda was likely to decide to go to such a plan.



"Their MO (modus operandi) is to have plans in place long in advance, so they're not going to come up with a new plan as a result of this," the U.S. official who spoke on condition of anonymity said.



"They might time their next response in light of this, it's hard to say. Now that this has happened they can say 'OK, the next thing in our playbook let's go to it now,' but they were going to go to it anyway," the official said.





U.S. WARNS CITIZENS



The U.S. government warned its citizens overseas to be on heightened alert because the strikes may lead to strong anti-American sentiment, and the Federal Aviation Administration said it was working closely with air carriers to ensure maximum safety at the nation's airports.



U.S. President George W. Bush said, "Our government is taking strong precautions. All law enforcement and intelligence agencies are working aggressively around America, around the world and around the clock."



He said at his request many governors had activated the National Guard to strengthen airport security.



"We have called up reserves to reinforce our military capability and strengthen the protection of our homeland," the president said.



The State Department advised Americans to leave Afghanistan and Americans elsewhere to maintain contact with the embassy.



"This action may result in strong anti-American sentiment and retaliatory actions against U.S. citizens and interests throughout the world by terrorists and those who are sympathetic to or otherwise support terrorism," a State Department announcement said.



Rumsfeld said the strikes on Afghanistan had not targeted bin Laden, but were aimed at terrorist networks.



"This is not about a single individual, it's about an entire terrorist network and multiple terrorist networks across the globe," he said.



"The only way to deal with these terrorist threats is to go at them where they exist. You cannot defend at every place, at every time, against every conceivable, imaginable, even unimaginable terrorist attack," Rumsfeld said.



The U.S. official said the "entire national security establishment from intelligence to law enforcement to the Pentagon is all engaged in a way that I've never seen before."



There were "lots of threats, rumors, reports, we take them all seriously," the official said, adding that the intelligence cooperation from different countries has been "unprecedented in its nature."



"We have received more assistance than we've ever received before, but we need much more," the official said. ((Washington newsroom 202 898-8300, fax 202 898 8383, email Washington.bureau.newsroom@reuters.com))

notes on Dallas Suspects

Name:

Motaz Al-Hallak



ID#:

015



Aliases:

Moataz Alhallak, Moataz M Alhallak, Mu'Taz Al-Hallaq, Mohammad Al-Hallak, Mo'Ataz Al-Hallak



DOB:

5.1.1961



SSN:

547-93-2126



Status:

Not in Custody, probably under surveillance



Address:

138 King Row

Arlington, TX 76010



9568 Muirkirk Road, Apt 301

Laurel, MD 20708



Phone:

817-275-2169

240-456-0375

c - 240-988-5611

---

Name:

Ahmed Khalefa



ID#:

137



Aliases:

Almad Khafefa, Alham Khaled



DOB:

1.1.1970



SSN:

097-88-2750



Address:

2095 9th Pl.

Vero Beach, FL 32960



4045 N. Belt Line Road, Apt 314

Irving, TX 75038



745 Polk Drive, #3C

Arlington, TX



Phone:

561-569-5908

c - 561-913-3753



Email:

ahmad3000@aol.com

Sunday, October 7, 2001

Canadian Military

Source: CP

Oct 7, 2001 16:50



Facts on the Canadian military:



PERSONNEL

Total: About 58,000

Army: About 22,000

Navy: About 9,000

Air Force: About 14,000



Other: Staff, administration, support, etc., about 13,000.



KEY WEAPONS SYSTEMS



Army:



_ Leopard I tanks: recently refurbished with new turrets and sights.

Main armament is one 105-mm rifled cannon.



_ LAV (Light armoured vehicles): armoured personnel carrier-armoured

fighting vehicles. Main armament is one 25-mm chain gun.



_ Coyote armoured reconnaissance vehicle: equipped with long range TV,

infra-red and radar sensors.



_ M109 self-propelled howitzers, 155-mm gun.



_ C7 rifles, machine guns.



Air Force:



_ 80 CF-18 fighter-bombers. Some equipped to drop laser-guided bombs and

fire TV-guided Maverick missiles.



_ 32 C-130 Hercules tactical transports.



Navy:



_ 12 patrol frigates armed with a 100-mm gun, various anti-ship and

anti-air missiles.



_ Four Tribal-class destroyers equipped for air defence with standard

missile launch cells.



_ One Victoria-class attack submarine; three more on order from Britain.





COMMAND STRUCTURE

Chief of the defence staff: Gen. Raymond Henault.

Vice-chief (head of administration): Vice-Admiral Gary Garnett.

Deputy chief (head of operations): Vice-Admiral Gary Maddison.

Chief of the maritime staff (head of the navy) Vice-Admiral Ron Buck.

Chief of the air staff (head of the air force) Lt.-Gen. Lloyd Campbell.

Chief of the land staff (head of the army): Lt.-Gen. Mike Jeffery.



MOST RECENT MILITARY ACTION (not including peacekeeping)



1999: Canada sends CF-18 fighter-bombers to the three-month NATO air

campaign over Kosovo. They fly hundreds of bombing missions _ 10 per

cent of the allied total _ with no casualties.



1990-1991: Canada sends three warships, a squadron of CF-18s, an aerial

tanker and a field hospital to the Gulf War. There were no Canadian

casualties.



1950-53: Canada sends ships and infantry to fight with United Nations

forces against a North Korean invasion of South Korea. Over 30,000

Canadians served. More than 500 were killed.



MAIN ALLIANCES



NATO: Founding member. Fought in Kosovo under NATO auspices, operates

1,800-member peacekeeping mission in Bosnia-Herzegovina under NATO.



Norad: Founding member of North American Aerospace Defence Command.

Deputy commander of Norad, stationed at Colorado Springs, Colo., is

always a Canadian.



PEACEKEEPING



1. Bosnia-Herzegovina. NATO Stabilization Force. (1653 people).



2. Croatia. UN Mission of Observers in Prevlaka. (1 person).



3. Kosovo. UN Mission in Kosovo. (5 people).



4. Macedonia. (203 people).



5. Golan Heights. Middle East UN Disengagement Observer Force. (190

people).



6. Cyprus. UN Forces in Cyprus. (3 people).



7. Jerusalem. UN Truce Supervision Organization. (8 people).



8. Sinai. Multinational Force and Observers. (29 people).



9. Sierra Leone. UN Observer Mission. (5 people). International Military

Assistance Training Team. (11 people).



10. Congo. UN Organization Mission. (6 people).



11. Ethiopia and Eritrea. United Nations Mission. (7 people).



INDEX: DEFENCE POLITICS INTERNATIONAL



---



Monday October 8, 2001 12:30 AM



A look at armed forces in Afghanistan:



Forces of the Taliban:



-Troops: 50,000.



-Small arms: AK assault rifles, machine guns, rocket-propelled grenades,

recoilless rifles.



-Armored forces (650 vehicles total): T-62, T-54, T-55 main battle tanks,

BMP infantry fighting vehicles, BTR troop carriers, BRDM-2 scout cars.



-Artillery: 76mm mountain gun, 122mm and 152mm towed guns, 107mm and 122mm

multiple-rocket launch systems, 82mm and 120mm mortars.



-Air Defenses: 23mm ZU-23-2 automatic cannons, 100mm anti-aircraft guns,

possibly U.S.-made Stinger surface-to-air missiles.



-Air Force: 10 Su-22 fighter-bombers, 5 MiG-21 fighters, 10 transport

helicopters, 40 cargo airplanes.



Forces of the Northern Alliance:



-Troops: 12,000-15,000.



-Small arms: AK assault rifles, machine guns, rocket-propelled grenades,

recoilless rifles.



-Armored forces (60-70 vehicles total): T-62, T-54, T-55 main battle tanks,

BMP infantry fighting vehicles, BTR troop carriers, BRDM-2 scout cars.



-Artillery: 107mm, 122mm, 140mm, 220mm multiple-launch rocket systems, 82mm

and 120mm mortars, 100mm, 122mm and 152mm towed guns, 76mm mountain guns.



-Air Defenses: One ZSU-23-4 self-propelled anti-aircraft gun, ZU-23-2

truck-mounted automatic cannons, Stinger surface-to-air missiles.



-Missiles: FROG-7 surface-to-surface missiles, Scud-B short-range ballistic

missiles (25-30 missiles at most).



-Air Force: Eight transport helicopters, 3-4 cargo airplanes.