View Single Post
Old 09-10-2006, 11:54 PM   #22 (permalink)
host
Banned
 
Quote:
Originally Posted by hiredgun
Host: I just want to point out that the last few pieces of information (concerning technology) aren't necessarily contradictory. A few reports say that al-Qaeda is using advanced technology (a fact so banal that I'd be surprised if it weren't true). Another specifically mentions emails and encryption. Then another says that they left no paper trail, and didn't own laptops. This jives with another report you quote which says that they used public computers to communicate.

Where's the contradiction?
Mueller repeated his April, 2002 coimments, a month later. in a senate hearing:
Quote:
http://www.fbi.gov/congress/congress...ller050802.htm

......... While here, the hijackers did all they could to stay below our radar. They contacted no known terrorist sympathizers. They committed no egregious crimes. They blended into the woodwork.

The hijackers also apparently left no paper trail. In our investigation, we have not yet uncovered a single piece of paper –– either here in the U.S. or in the treasure trove of information that has turned up in Afghanistan and elsewhere –– that mentioned any aspect of the September 11th plot. As best we can determine, the actual hijackers had no computers, no laptops, no storage media of any kind. They used hundreds of different pay phones and cell phones, often with prepaid calling cards that are extremely difficult to trace. And they made sure that all the money sent to them to fund their attacks was wired in small amounts to avoid detection.

In short, the terrorists managed to exploit loopholes and vulnerabilities in our systems, to stay out of sight, and to not let anyone know what they were up to beyond a very closed circle. The patient, skilled and exploitive approach used by the hijackers means our prevention efforts must be massive, globally collaborative and supported by ample technology and analytical capacity. It means that the information possessed by every agency - - both here and abroad, both federal and local - - must go into the multi-agency prevention mix and be acted upon. ............
Quote:
http://www.time.com/time/magazine/ar...001169,00.html
From the Magazine | Terrorism
When Terror Hides Online
By ADAM COHEN

Posted Monday, Nov. 12, 2001

..........It's no secret that bin Laden's terrorist army is Internet savvy. Hijacking ringleader Mohamed Atta made his reservations on Americanairlines.com Some of his confederates seem to have communicated through Yahoo e-mail. And cell members went online to research the chemical-dispersing powers of crop dusters..........
Quote:
http://www.guardian.co.uk/waronterro...558371,00.html
How the plotters slipped US net

Spy networks failed to detect email and satellite conversations used to plot the attack on the US - and now America wants to know what went wrong, reports Duncan Campbell

Special report: Terrorism in the US

Thursday September 27, 2001
The Guardian

.....This month's attacks have provided the first, tragic, test of who was right about the net, encryption and terrorism. The answers, so far as they are known, were given last Tuesday by the FBI at a Washington briefing. FBI assistant director Ron Dick, head of the US National Infrastructure Protection Centre, told reporters that the hijackers had used the net, and "used it well".

FBI investigators had been able to locate hundreds of email communications, sent 30 to 45 days before the attack. Records had been obtained from internet service providers and from public libraries. The messages, in both English and Arabic, were sent within the US and internationally. They had been sent from personal computers or from public sites such as libraries. They used a variety of ISPs, including accounts on Hotmail.

According to the FBI, the conspirators had not used encryption or concealment methods. Once found, the emails could be openly read............
Quote:
http://archives.cnn.com/2002/LAW/09/...ter/index.html
FBI explains missing Moussaoui e-mail

September 4, 2002 Posted: 5:30 PM EDT (2130 GMT)

......."The FBI has discovered that the 19 hijackers also made use of Kinko's computers in other cities to gain access to the Internet," FBI Agent Bridget Lawler said in an affidavit............
Quote:
http://www.washingtonpost.com/ac2/wp...&notFound=true
Hijackers May Have Accessed Computers at Public Libraries
Authorities Investigating Possible Internet Communications

By Sue Anne Pressley and Justin Blum
Washington Post Staff Writers
Monday, September 17, 2001; Page A04

MIAMI, Sept. 16 -- Investigators are looking into the possibility some of the suspected hijackers in last week's deadly attacks on Washington and New York may have communicated with each other by using computers at public libraries.

At least one South Florida librarian has told authorities she recognized the name of a suspected terrorist on one of her computer sign-in sheets after the FBI released the list of hijackers' names Friday.

Library officials in Fairfax County also said today FBI agents Thursday requested the computer lab sign-in lists from the Sherwood Regional Library in the Mount Vernon area. Agents picked up copies of the computer logs from July 1 to Sept. 13, which included approximately 50 pages, according to branch manager Liz Promen.

In Delray Beach, Fla., librarian Kathleen Hensman said Mohald Alshehri, who is listed as a hijacker, and another Middle Eastern man came into the library within the past month wanting to use a computer with Internet access. She said the men appeared to be on edge and watched her to see whether she was monitoring their use.

"It just stood out in my mind, their behavior and the name," said Hensman, 41, who heads the reference department. "It's a public facility -- what can we do? I feel saddened that we were part of this in a way."

Public library officials say the use of computers with Internet access, which affords clients the option of logging into chat rooms and exchanging private messages, is a controversial issue in the library industry, and that policies on patron use and the amount of privacy allowed differ from place to place. In Fairfax County, after marking lab sign-in lists, patrons can work at a computer without logging on.

The Delray Beach library is near where several of the suspects reportedly stayed in the weeks leading up to the attacks. Hensman said it was Alshehri who affixed his name to the computer-use sign-up sheet.

"I asked them, 'Do you need an Internet computer?' One said yes," Hensman recalled.

She said the two men sat down at one of the computers with a screen shielded by a privacy protector.

"They were looking up at me and down at the computer," she said. "They wanted to be aware of what I was doing."

The two men used the computer for an hour, then were joined by a third man. She described the three as in their twenties, Middle Eastern and "good-looking."

Hensman said she called local police Saturday, and they said they would pass on the information to the FBI. As of late this afternoon, however, she said FBI agents had not contacted the library.

The Sun-Sentinel in Fort Lauderdale reported today that visitors to two other libraries in Hollywood, Fla., said they recalled seeing Mohamed Atta there. Authorities have identified Atta as one of the pilots who crashed into the World Trade Center Tuesday and have said he and several other suspects lived in the Hollywood area.

Betty Dejean, the assistant director of the Broward County libraries division, said today neither the FBI nor local law enforcement agencies had contacted library officials to ask about the hijackers' use of the computers. However, she said she could not release any information without a court order, citing Florida statutes.

Dejean said she had sent out a memo to staff members at the 37 Broward County branches, which include three in Hollywood, reminding employees they are not allowed to comment on books checked out by clients or on client computer use.

In Fairfax County, library officials said today none of the five men suspected in the Dulles hijacking possessed a library card. The suspects' names also do not appear on the logs, which library officials provided to The Washington Post, on the three days leading up to the attacks.

In Norman, Okla., where an alleged associate of the hijackers lived until he was arrested in August on a passport violation, public library official Andrew Peters said he had heard of no investigation involving the use of his system's computers. But he said Internet use is "a hot topic" in libraries.

"Some libraries do have it as policy that they allow privacy," said Peters, head of technology for the Pioneer library system, which comprises nine branches in three Oklahoma counties. "In our particular case, our policy is that use of libraries is a public space -- in the same way that we don't allow people to remove their clothes in public, we have our computers out visible, where anybody can see."

Fairfax library officials said the county has not installed filters that prevent people from viewing pornographic Web sites or accessing chat rooms.......
Mueller made two presentations, in April and May, 2002, where it seems fair to me....to point out that he deliberately misled his audeince that no trace of communications of the 9/11 hijackers were found. He gave the impression that he had no confirmation that the hijackers used somputers or the internet to communicate with each other, or with their overseers, if they indeed, had any......since the 9/11 Commission reported that it could not find out who financed their "terrorist" operation.

Mueller could have said that the hijackers were known to use computers....but not their own....to access the internet and use email....but he didn't either time he made essentially the same statement, I'm pointing out curious contradictory statements by officials that cloud determinations, instead of clarifying them. I see Mueller's statements as an example. It is not as strong as the Bush, Cheney, and the Mineta testimony conflict and omission from the 9/11 Commission report....but it does confuse, and he communicated it twice.....as Bush did with his "waiting to go into the classroom....watching the first plane on TV...."schtick"....wierd.
Quote:
Originally Posted by Ustwo
But will does think its a vast conspiracy so I dont' know why you issue a pointless harsh warning when it is indeed true.

In other words why get on the guys case when a vast conspiracy is EXACTLY what will thinks 9/11 was?

He should refain from observing the obvious?

Nice tie in will Ann Coulter though, that was very nicely done if a bit cliche as of late.
In post #6, politicophile makes his "implying" statement, <b>under a second quote box that contain comments attributed to me, not to willravel.</b> It is clear that ratbastid was addressing that comment of politicophile's. Since that seems to be the case, and ratbastid has not posted a follow up, I thought it might be helpful to point out that ratbastid did not post about a comment that politicophile posted in reaction to anything that willravel had posted.

Last edited by host; 09-11-2006 at 12:08 AM..
host is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360