fredag 10. april 2009

Datahackeren bin Laden

(RIKS24) Minst fire drept i rakettangrep i Pakistan
USA mistenkes for å ha stått bak. Lørdagens angrep var det tredje på en måned og var trolig rettet mot antatte al-Qaida eller Taliban-ledere i området.

(Dagbladet) Terrormistenkte filmet seg selv ved mulige terrormål
De pågrepne mennene skal alle være fra den nordvestlige delen av Pakistan, et område som i stor grad er dominert av al-Qaida.

Al-Qaida er i Afghanistan, Irak og Pakistan, og de dukker sikkert opp flere steder etterhvert. Våpenmakten USA har prøvd å banke disse siden 2001. Men jeg tror de bare later som.

(TV2Nyhetene) Taliban på fremmarsj i Pakistan. Og reporteren trekker bin Laden inn i saken.

(TV2Nyhetene) En professor han ha funnet Laden i Pakistan utifra hans kroppsstørrelse, hans behov for elektrisitet og hans behov for ekstra plass til livvakter.

Terrorists' Online Methods Elusive (Washington Post 19. September)
Government agencies are contacting computer experts for help in understanding how Osama bin Laden and his associates may have used the Internet to send encrypted electronic messages to one another to coordinate last week's attacks on the World Trade Center and the Pentagon, sources said yesterday.

Basic encryption tools allow people to scramble messages so that only those with a "key" can read them. An increasing number, however, go beyond this by allowing messages to be hidden inside graphics, music files or in the headers of e-mails. The technology, known as steganography, allows users to get around electronic wiretaps by piggybacking messages on seemingly innocent digital files for things such as 'N Sync songs, a posting on eBay or a pornographic picture.

Digital moles in White House? (WorldNetDaily 20. September)
Terrorists had top-secret presidential codes

"Air Force One is next," read the message received by the U.S. Secret Service at 9 a.m. Sept. 11, after two hijacked planes struck the twin towers of the World Trade Center in New York.

Three minutes later, Secret Service agents grabbed Vice President Dick Cheney from his seat opposite a television set in the White House and hustled him down to the president's emergency operations center, a bunker built to withstand a nuclear blast.

The terrorists' message threatening Air Force One was transmitted in that day's top-secret White House code words. As the clock ticked away, the Secret Service reached a frightening conclusion: The terrorists had obtained the White House code and a whole set of top-secret signals.

This made it possible for a hostile force to pinpoint the exact position of Air Force One, its destination and its classified procedures. In fact, the hijackers were picking up and deciphering the presidential plane's incoming and outgoing transmissions.

The discovery shocked everyone in the president's emergency operations center – Cheney, National Security Adviser Condoleezza Rice and Transportation Secretary Norman Mineta. Their first question was: How did the terrorists access top-secret White House codes and procedures? Is there a mole, or more than one enemy spy in the White House, the Secret Service, the FBI, the CIA or the Federal Aviation Administration?

In the week after the attacks in New York and Washington, more hair-raising facts emerged. The terrorists had also obtained the code groups of the National Security Agency and were able to penetrate the NSA's state-of-the-art electronic surveillance systems. Indeed, they seemed to have at their disposal an electronic capability that was more sophisticated than that of the NSA.

This startling observation came as no surprise to those tracking the globe-spanning investments of Saudi Arabia's bin Laden family and those of its exiled son, Osama, in some of the world's biggest and most advanced satellite and telecommunications companies.
[klipp]

U.S. intelligence has been unable to trace their authors and recipients in the three years since first detecting evidence of their existence in the files of the bin Laden organization. U.S. agencies now believe that the attacks in New York and Washington were coordinated through those encrypted electronic messages, which were opened by "key" holders.

They also believe that terrorists are in possession of all or part of the codes used by the Drug Enforcement Administration, the National Reconnaissance Office, Air Force Intelligence, Army Intelligence, Naval Intelligence, Marine Corps Intelligence and the intelligence offices of the State Department and Department of Energy.

Intelligence and counter-terror sources report that, while rescuers in New York and Washington were sifting through rubble inch by inch, US government experts were changing codes one-by-one – and even more difficult, replacing procedures and methods of encryption. The nagging question of a mole in the highest reaches of the U.S. government and intelligence community – with direct or indirect links with bin Laden – remains. Since no single individual has access to every top-level code at any given time – a single mole would not answer the case; it would have to be a large, widely spread number. U.S. experts do not believe bin Laden was capable of infiltrating double agents into the heart of the U.S. administration on a large scale. They are looking elsewhere, instead, at a country with a very well-oiled intelligence apparatus – Iraq.


Fra sin lille hule i Afghanistan sitter Laden og lytter til alle samtaler i Det Hvite Hus og stort sett alle andre steder. Han har også en joystick som han bruker til å styre Air Force One rundt med.

Til tross for at Laden har verdens mest avanserte satellitt og teleutstyr tok det ham seks dager å krabbe fram til en TV-stasjon for å hevde sin uskyld. Og ikke en gang da nådde han fram til det amerikanske publikum.

Eksperter kan ikke tro at Laden har infiltrert Det Hvite Hus helt alene, så han har nok fått hjelp fra Irak...

Ingen kommentarer:

Legg inn en kommentar