Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hoax/Wild Speculation? Coded Images Tell Of Attacks?

Posted on 10/20/2001 5:58:24 PM PDT by Davea

Anybody see this from Koontz.... http://www.bringmenews.com/Messages/National_Security/Alerts/Alert_003.htm


TOPICS: Miscellaneous
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-4041-54 next last

1 posted on 10/20/2001 5:58:24 PM PDT by Davea
[ Post Reply | Private Reply | View Replies]

To: Davea
Wow!! Bizarre.
2 posted on 10/20/2001 6:03:18 PM PDT by monkeywrench
[ Post Reply | Private Reply | To 1 | View Replies]

To: Davea
The yellow mask-like character symbolizes biological attack. Message represents signal to attack on previously specified date, possibly in the latter part of October, maybe in the Halloween time period.

I'd give this more weight if they would have recognized that it's BERT, for cryin' out loud.

3 posted on 10/20/2001 6:04:28 PM PDT by Hawkeye's Girl
[ Post Reply | Private Reply | To 1 | View Replies]

To: Davea
People must be giant dumb-youknowwhats for going through all that trouble and not realizing the 'mask image' is BERT! Maybe they couldn't see through the tinfoil.
4 posted on 10/20/2001 6:10:59 PM PDT by good_ash
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hawkeye's Girl
"I'd give this more weight if they would have recognized that it's BERT, for cryin' out loud." It is recognized as Bert. Under the photo it has a link to the 10/14 article. Click on "Click Here For Original Article"
5 posted on 10/20/2001 6:11:58 PM PDT by Davea
[ Post Reply | Private Reply | To 3 | View Replies]

To: Davea
this is what comes from putting more complicated answers in the toy fortune-telling 8-balls.

dep

6 posted on 10/20/2001 6:17:29 PM PDT by dep
[ Post Reply | Private Reply | To 1 | View Replies]

To: Davea
Someone needs to send that guy to www.touristguy.com.
7 posted on 10/20/2001 6:23:38 PM PDT by supercat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Davea
Spooky, but then I visited his website which features astrology. Nuff said. And, as others pointed out, his failure to recognize the "yellow mask-like character" doesn't help his credibility.
8 posted on 10/20/2001 6:24:48 PM PDT by jaime1959
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hawkeye's Girl
When I was growing up and watching Bert on TV, I just had a felling this guy was to be the downfall of America.
9 posted on 10/20/2001 6:28:50 PM PDT by Marine Inspector
[ Post Reply | Private Reply | To 3 | View Replies]

To: Davea
Notably, the man appears to be dressed in the manner of an airline pilot with his coat off. The man's hair is trimmed in the manner of an airline pilot

This is plain retarded.

This guy doesnt even know who "Bert" from Sesame Street is - everyone knows that pic came from the "Bert is Evil" website. Duh.

10 posted on 10/20/2001 6:37:18 PM PDT by Gasshog
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gasshog
"This is plain retarded."

You are now my most favorite un-PC poster.

11 posted on 10/20/2001 6:40:48 PM PDT by riley1992
[ Post Reply | Private Reply | To 10 | View Replies]

To: Gasshog
He does know it's Bert from Sesame street. He provides the link from the 10/14 Fox news article under the picture. It reads "Click here for original article". Anyway, just some fringe stuff for a Saturday night.
12 posted on 10/20/2001 6:47:36 PM PDT by Davea
[ Post Reply | Private Reply | To 10 | View Replies]

To: Davea
http://zapatopi.net/afdb.html


13 posted on 10/20/2001 6:49:57 PM PDT by NYC GOP Chick
[ Post Reply | Private Reply | To 1 | View Replies]

To: riley1992
Robert has been a Staff Scientist at the Lawrence Berkeley Laboratory, and was once an instructor at the National Security Agency.

Hooo, boy. We might be in trouble here.

14 posted on 10/20/2001 6:50:18 PM PDT by Max McGarrity
[ Post Reply | Private Reply | To 11 | View Replies]

To: Davea; Manny Festo; babylonian; Thinkin' Gal; TrueBeliever9; Prodigal Daughter; Zadokite...
This Robert Koontz link will get the hair standing up on the back of your neck.
15 posted on 10/20/2001 7:00:36 PM PDT by 2sheep
[ Post Reply | Private Reply | To 1 | View Replies]

To: Davea
Only one word comes to mind to arrive at my summation:

BWAAAAAAAAAHAHAHAHAHAHAAAAAA!!!

A bit of a stretch in those "interpretations" is an understatement.

Dr. Robert W. Koontz
Experimental Nuclear Physicist
Former National Security Agency Instructor

Methinks Dr. Koontz has had a few too many Roentgens "experimenting."

16 posted on 10/20/2001 7:20:31 PM PDT by Hoosier Patriot
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hoosier Patriot
Dr. Robert W. Koontz AKA Art Bell
17 posted on 10/20/2001 7:26:34 PM PDT by Lizzy W
[ Post Reply | Private Reply | To 16 | View Replies]

To: Davea
But is it art?
18 posted on 10/20/2001 7:38:30 PM PDT by bayourod
[ Post Reply | Private Reply | To 1 | View Replies]

To: riley1992
-- http://www.knoxstudio.com/shns/story.cfm?pk=SIEGE-INVISIBLE-10-04-01&cat=WW WASHINGTON
------------------------------------------------------------------------
How terrorists hide messages online
By LISA HOFFMAN
Scripps Howard News Service
October 04, 2001

- To terrorist cells such as Al Qaeda, a picture on the Web can be worth thousands of words.

Employing the 21st century version of a concept as old as secrets themselves, alleged terrorists affiliated with Osama bin Laden are believed to have exploited the vastness of the Internet to hide messages between conspirators in what amounts to plain sight.

According to declassified intelligence reports, court testimony and computer security experts, bin Laden's network has been a pioneer in adapting the ancient art of steganography to the Internet. U.S. officials and high-tech researchers seeking to counter such techniques are scrambling for methods to detect or derail them.

Online steganography - derived from the Greek words meaning "covered writing" - essentially involves hiding information or communications inside something so unremarkable that no one would suspect it's there. It's the cyber-equivalent of invisible ink or the "dead drops" that spies use to pass secrets.

Experts say Al Qaeda, along with the Palestinian terrorist groups Hezbollah and Hamas, have used computer software available for free on the Internet to communicate via virtually undetectable messages embedded electronically within innocuous photographs or music files of the sort that millions of Internet users send to each other each day.

Using it as a ruse, bin Laden's terror operatives allegedly have been able to bury maps, diagrams, photos of targets and messages within popular music, auction and sports sites as well as pornographic chat rooms - incongruous territory for devout Muslim fundamentalists.

Secrets even can be hidden in spam, the millions of unwanted e-mail messages ricocheting daily across the Internet that barely register with most users before they delete them. Communicating this way makes it extraordinarily difficult for law enforcement to pick up on, much less interdict or trace.

"The sender can transmit a message without ever communicating directly with the receiver. There is no e-mail between them, no remote logins, no instant messages," wrote Bruce Schneier of Counterpane Internet Security. "Steganography is a good way for terrorist cells to communicate... without any group knowing the identity of the other."

It's an old concept, written about in 474 B.C. by Greek historian Herodotus, who described how Histiaeus of Miletus shaved the head of a slave and tattooed a secret message on his scalp. When the slave's hair grew back, Histiaeus dispatched him to the Greeks, who shaved the slave's head and read the message.

During World War II, invisible ink was used by all sides. And the Germans perfected the use of "microdots," in which a page of writing could be reduced to the size of a dot on a letter - only to be enlarged by the recipients and read.

Computer steganography essentially piggy-backs information on empty or unimportant spaces in digital files. But those who want to employ the method don't need to understand the complex concepts at work - all they have to do is download software available free or for less than $50 from more than two dozen Internet sites.

Follow the instructions for using the software and, with a few mouse clicks, you've hidden a message that is all but undetectable, except by the person you have tipped to where to find it.

Photo or music files with such messages embedded are indistinguishable to the human eye or ear from identical ones lacking the secret data. (For an example of how this works, go to http://www.spammimic.com, and embed your own message in spam.)

That fact exponentially increases the difficulty for investigators trying to track terrorist communications online. "With the volume of documents, photos, video and sound files moving on the Internet, there is no system powerful enough to analyze every object for hidden messages," wrote Barry Collin(CQ), research fellow at the National Interagency Civil-Military Institute of the National Guard Bureau.

And an interceptor can be hamstrung even more if the hidden message is encrypted into code. Bin Laden's network allegedly does just that.

The Justice Department, citing the difficulty of monitoring and detecting cyber-communications among terrorists, is asking Capitol Hill to relax legal restrictions or force software writers to supply their secrecy code "keys" to the government in order to make it easier for agents to tap into everyday e-mail on a broad hunt for miscreants and de-scramble what they find.

Civil libertarians say such privacy invasions are unnecessary; efforts should be directed instead toward techniques to detect and disable cyber-steganography.

The intelligence community is hard at work with university researchers creating sophisticated detection programs that use complex algorithms to conduct statistical tests capable of identifying stenographic footprints.

One new software package of interest to the Air Force was developed by research professor Jessica Fridrich at Binghamton University in New York state. Called "Securestego," it allows a user to return a digital image modified by steganography to its original state - that could derail such a message before it could reach its intended receiver.

(Distributed by Scripps Howard News Service, http://www.shns.com)

19 posted on 10/20/2001 7:44:52 PM PDT by mommadooo3
[ Post Reply | Private Reply | To 11 | View Replies]

To: bayourod
Defense Watch 10/17 interview with Koontz. Plus a David Hackworth article etc.... http://www.sftt.org/dw10172001.html#1
20 posted on 10/20/2001 7:51:01 PM PDT by Davea
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-54 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson