FOROFHETAL USB ONLY

Supplementaltothe 304thMl Bn PeriodicNewsletter SampleOverview: alQaida-Like Mobile Discussions& PotentialCreative Uses By 304th Ml Bn OSINTTeam October16, 2008 This is a draft FOUOproduct

The above examplesof Nokia Map Functions are displayed in a Pro Islamic State of lraq (aI Qaida) Discussion thread at http ://www,muslm.nethb/showthread.ohp ?o= I 797473 with sofruare description and download instructions. Posting date March 24, 2008. FCIROFFrcIAL USE O}TLY

Overview

Terroristsand personssympathetic to terrorismrecommend a varietyof differentmobile to webtechnologies, , and Voiceover InternetProtocol (VolP)r for theirmobile phoneuse. Someof the tacticsare old,some of the tacticsare stillemerging, and some tacticsmay emerge from hacker, activist, and criminalnon-terrorist use. This paper brieflycovers a few examplesof terroristuse and potentialuse of mobileto web and webto mobiletechnologies and tactics from an opensource perspective. The paper includesthe followingfive topics: Pro TenoristPropaganda Mobile lnterfaces, GPSfor Movements,Ops, Targeting,and Exploitation,The MobilePhone as a SurueillanceTool, VoiceChangers for Terroist Phone Calls,a Red Teaming Perspectiveon the PotentialTerroristUse of Twifter,and a sampleof softwarethat is recommendedon one proterrorist website for mobilephone activities. There are numerouspossibilities that are not coveredin this paperdue to time and research constraints.For example, Google Earth, Mobile GPS Mashups2 and MobilePhone NumberSpoofing techniques are not addressedin this paperbut are certainlyworth OpenSource Intelligence (OSINT) consideration and probably deserve a paper(if not a book)unto itself.

Pleasenote the followingcaveats to this article.The first limitationis the discussed technologieswere not independently verified in a redteaming scenario, so it is unclear whethersome of the discussedtactics and methodologieswould actually work. For example,extremist suggestions to includeintegrating a mobilephone camera into a missilewarhead seem highly improbable. Second, a majorityof the informationwas extractedfrom al Qaida-likewebsites from uncollaboratedpostings made by terrorists, personssympathetic to terrorism,or honeypots3. Third, the researchused to generate this paperwas conductedfrom open sources only and has not beencompared and/or contrastedwith informationin non-opensource (classified) venues. Fourth,each topic is merelyan introductioninto the subjectand deservesfurther research and contemplation. Fifth,the authoris nota linguist,but usedrudimentary Arabic language skills and the Googletranslating toolto extractwebsite context. Finally,the potentialfor use of certain webto mobiletechnologies and tactics is dependentupon the mobileservice available in differentstates and regions.For example, terrorists could theoretically use Twitter social networkingin the U.S.as an operationtool. However,it is unclearwhether that same theoreticaluse would be availableto terroristsin othercountries and to whatextent.

Whatdid becomeclear from conducting research on thistopic is thatthere are numerousdifferent tactics, tools, and softwareservices that can be usedby terroriststo conductactivities that go wellbeyond the originalintent of the mobilephone voice communicationsand that these burgeoning capabilities are available for OSINT exploitation.Further, there may be a possibilityto profilea portionof particularcyber

1Prior August2007 304'n Ml Bn OSINTTeam Research Article 'Terrorist and ExtremistUse of VoiceOvei InternetProtocol" is availableon the 3O4thMl Bn OSINTTeam INTELINK U pageat https://www.intelink.qov/inteldocs/view.php?fDocumentld=10699(lf you do not haveaccess to rNrrErNkuanowouro ir-

2 http://sea-eves.com/vb/t33O6.html t HoneyPot is definedas something(example a website)that is set up in orderto allureselect audiencemembers so thatthey may be trackedand monitored. FCIROFHCIAL IJSEONLY terrorist-likegroups and their audiences based on the particular set of softwareand phonesthat the group recommends from OSINT exploitation.

Tableof Contents PRO TERRORIST PROPAGANDA CELL PHONE INTERFACES...... 2 CELL PHONE GPSFOR MOVEMENTS. OPS.TARGETING & EXPLOITATION...... 3 MOBTLE PHONE SURVEILLANCE...... 4 VOICE CHANGERS FOR TERRORIST TELEPHONE CALLS?...... 5 POTENTIAL FOR TERRORIST USE OF TWITTER: A RED TEAMING PERSPECTM...... 7 SAMPLE OF OTHER MOBILE PHONE TOPICS & SOFTWARE RECOMMENDATIONS...... 9

Pro Terrorist Propaganda Cett ptrone Interfaces The mobilephone provides an activeoutlet for terroristpropaganda. Currently there are thousandsof multimediaclips (audio, video, photo, Power Point, text, PDF)that may be up loadedto mobilephones from multiple websites and multimedia bunkers. In addition, mobilephone texting appears to be consistentlyand possibly increasingly popular amongpro terrorist audiences (just as it is with non-terroristaudiences). Some terrorist organizationsare furtherbranded by a specificcell phoneinterface, which makes the actualphone a pieceof propaganda.Following are two examples:

Army of the MujahedeenCell Phone Interface(Advertized celPhone screen Appearance)

293031 t 2 3 iil $l.Qlert;fJr 10 rl,&jmtjt r$Jd',tz rq{{:r.d;e 22 23 24 dzd'+fi:ri'}s m r 23456t8

lslamic State of lraq Cell Phone Interface (Advertizedcett Phone screen Appearance)

a FOROFFIC}AL IjSE ONLY

The softwarefor the above interfacesis advertizedas beingavailable for downloadon selectextremist websites, such as tamkeen.iraqserve.com.

.a;5:*l .,:LJL" a-,1 Cell PhoneGPS for Movements,Ops, Targeting& ,ri . Exploitation

ii Ji Nokia6210 Navigatorand other F -i Fil rI J. -L"1' s :._*'r )r-a' ;1+- ;. !*; GPScell phone services could ';ts_'-r be usedby ouradversaries for travelplans, surveillance and targeting.

Followingis an exampleof one IlrI E extremistdiscussion thread Source: Arabic DiscussionForum http://llvan.oro/vb/showthread.pho?t=5844 surroundingthe use of Mobile (From Google Search Result Descriplion:"Make your love for God, Eid and PhoneGPS (there are multiple satisfaction and your obedience and Mwalatk and Zkirk and lslamic Jihad .... postingson thisissue which Sailing fast and easy navigation system with A-GPS maps and the application paper of Nokia Maps." couldbe a untoitself.) On Compare the previoustext with a vendo/s write-up"Sailing fast and easy May3, 2008a discussiontopic navigation sysfern with A-GPS and Nokia Maps application maps. Find your wasposted in the proterrorist destination on foot or in the car with a compass for navigation Sena. Take forumal Hebashat pictures and video through the use of high-quality 3.2-megapixel camera with www.alhesbah.net(now defunct) flash The advantage Panoramic 240 x 320QVGA See maps, pictures and videos on the screen QVGA stunning 2.4-inch size and the quality of 320 x 240 on thetheoretical use of Nokia Browse the Internet, send e-mail your uploaded content quickly connect via GPSfor "Specialist use in high-speed3.5G '' Marksmanship,Border Crossings,and in Concealment of Supplies."The followingthree Graphicswere associatedwith this posting. I@ Oneresponse to the W topicthread was that city imagesand pictures werenot adequate becauseadditional information,such as geo- coordinates,was needed for desertsand forests (non-urbanareas). A laterposting in thethread discussedthe pros and consof GPSunder the title"An lntensiveCourse in the Useof LG PSVGPS" (Reference screen capture on nextpage) which briefly covered some of the benefitsand detriments of usingGPS. The articlementioned the useof geocoordinates for bordercrossings, item concealment, andfor identifyingenemy locations. The article also mentioned that GPS would be usefulfor identifyingterrain and natural resources, such as water. In addition,the article mentionedthat attained enemy GPS can be usefulforinformation exploitation. FORCIFFrcI,{t TJSE- ONLJ

.HfK epi Jtr,:-t .i itrs.;rrr :ri.*i stris-;.+tt jl+ilr ciiF:&it rJ+lt !lJL1

iit Ji!Lr..&Lolrri& .s f,Jla'ji *r.rfi:,,.!*r:, r$iit"r;f,:ff -: -rr',*,"irl ;::lil ":; ,.t' t u t tu t 6 ; t. :r $ Ji b,rP,.ri !r,, dr d,n#L Lt' rr .-, tl

rb.r; &!, qn -J ;-FI'Jpr u &Jr r :r r+ &L.r! it r l,r'.. >3 rd -p Jb J d JJ J F.b :!; Ja J$ ? J,qs.oL: *t.eli'P r+ tlu ts,errrrgllsir4,Jir-4r-lJ-strracr*1l.br'tl,J'&.:$Jtrj .4trr F & JP ve fr.,i! gr rs.it)!& U {& Jb vr

: ir J* i{i "An Intensive Course in the f r.r.j, F ji +Ji.l t.i rr, i 4, r.ri J Jr ir ri'F, s JL.i- *;1;,,;J:.i Useof LG PSV GPS" ',

d l..* r ,ry, ::ut* o,'6dte " l!!l-lt{

t\.! ti":itiitiiiitiii/" ir,atin i. i,tAtrtrit&ni -'& ''

.sR','.}J-.Iu1!sli'."'w*FsnH}jMd&<4lll,q'"'*

3.n l,ffit*. r"!@-

( J;!)'.-.Ly'rb.!lrlv{t: s- elr Jt* 6s osi! o2:

Frt ryy'lni,t/g

An al Qaida-like Social Networking Pagein Maktoobblog, www.shhidallah.maktoobblos.cont/l213376 that recommendsthe "An Intensive Course in the Use of LG PSV GPS'

Mobile PhoneSurveillance On September6, 2008an individualusing the pseudonymof "Volcano"provided a theoreticaldiscussion in the MujahedeenArmy of lraqEnabling lslamic Mobiles forum, www.tamkeen.iraqserve.com,on the useof mobilephones for target surveillance and attacks.Under the categoryof basicsurveillance, "Volcano" recommended using the phone/videocamera for monitoringenemy activities and operations in theater.Of uniqueinterest is that"Volcano" posed severaltheoretical examples of howto usethe mobilephone video and camera options in tandemwith conducting attacks. For example,"Volcano" suggested that one could use the mobilephone for remote surveillanceto tag the opportunetime of attack. "Volcano"also hypothesized whether a mobilephone camera could be integratedinto a missilehead to filma targetas it is beingattacked. This recommendation probably would not work but provides insight into adversarialperspectives. (Reference the screen capture on thefollowing page.)

-4- FCIROFFIEIAL USEO}TLY pl!lr:4!qt$&A_ryrti?#ry, 'JJ'lEj lvvr m'a;1 "**xxxno*_ ": -::: A. Ec $c{ f|itqy qffi Id E* O e r8 J G' aMHd |)cer# ff trOn,tt*,nn 'tddl*ltp,iiws.ilqsa... l{Ortofi vLsdLlllEtrIl S tffi,*'

I ffi.$Er-coo*lryad I eoo4crr* 8*dfrd4[hh..E Etd-rfrffi

OK*rhEsdffiffiffi

Dlboylng th. t rg.t mobll. Bkrmlr.alhilv

Th. n.mc of Godttra marclful M.yAll.h AlmkllouklnMohamm.d Afrrl ed hlr fmlly.nd compmion3 Mul.hld.cn brothcrs Ar for GMualng r moblla phona crmara to monltortha .namy md ltt machanlrmt Such $ lnst.ll.tlon otAlcimlrromrm mobllc d.vlc.s to control thr cx.ctdmc otdctonrdon by mobll. phonc to tllm lh. .r.r In whlch thc .n.my rpprorchlng rnd m.chrnbma oftha drvlca by ramotacontol MuJrhida.n bomblng rnd Hmulorlob Mulahld.an crn not Tllk pralanca In lh. n r.gion. Crn conbol th. dcvlc. md you.thomc or In Bldrkrto br moblh, whlch monhort lft..lrblw.l .nolh.? dth. Mul.hld.cn to b. giving th.m Brtonld llourhal|mltirst Can ba urad la roving or mota monitorlng. oJ:Jrffi :x i, :3 S:qP Harala tha racond ld.1 , Thr cn.mica olGod Amarlcanamd Jaw3 dlha d.ttruc{on otr targat rhootlng thrt procatr lnd guldad mlttila with r crm.n rnd lhcn thcy u, olLr on tll.virion ud rc(a thc cnamiaaAvcjrrr.

Can rl3o voluntcGrsto do Tdmirohdryhm lllm.d urlng a cam.ra phonc .nd inshll it on th. liont ofiha mlttll. and rock.t Abokhip Aryi LG Mobllala provan llnk.d to r rack.nd anothrr rt r mobll. ml$ll.l.unchlng th. ..cond ph.3. of r.glrtadon of crmarr md daatoy'ngtfi. tlre.t Ngld ro unbdlavrri. - oUtl*J&lJJ

I a3k God Almightyto mrkGth. rGtugcHdon .vcrywhGr! ofrnG{dt ' *, tG! !.i !gT: i',"d*t{ Dii{* OafTgi

Voice Changercfor TerroristTelephone Calls?

Youmay have seen it in a movie,the villaincalling the victim with an alteredvoice to hidehis/her identity. In the movies,that theme is fairlycommon; the question really is whetherour adversaries will consider voice changing technology for usein future

operations.The I Forum Enginclring audio and vidco.4i'Ennero..sska,vitu dcph.ton3 answercould be yes. on September 12 Pl,I 9, 2008Abu Aisha 09-07-2008. 20 Abu Alsha L avYot€tbnFlhd6.0.10 :lEocr.mcMGdG.mn&fd.dhdf,d the Moroccan, Moroccan Technical Superuisor,of the ((,( The nomeof Godthe merciful TechnicalAudio Discussionof the AVVolceChanqer Dlamond 6.0.'10 Ansaral Jihad forum ryIr orcc|l|m recommended !r.*M voicechanging RcqArdbn Oatc Jd 2O0a ii softwarefor making Ih r.tc of 6i..rm6t lcEl: J VOIPtelephone ra EE@ calls.He mentionedthat the softwarewould be helpfulformostVOIP services including Skypeand Vonage. This recommendationwas postedfollowingpublic media repods of theTaliban using FOROFFrcIAL US,E ONIY

SKYPE.4The timing was most likely coincidental and unrelated but the two concepts cancomplement one another. The Taliban and other like groups suspecting their VOIP communicationsare being be monitoredcould theoretically combine voice changing softwarewith (or without) encryption and caller l.D. spoofing' in orderto makebasic detectionmore difficult. This tactic may or maynot be effectiveto eludeinternational intelligenceagencies. However, it mightbe effectivefor callingin demands,interviews, and/orattack claims to mediaoutlets. Abu Aishathe Moroccanspecifically recommendedAV VoiceChanger Diamond 6.0.10 off a freewaredownload page. Audio for Fun,http://www.audio4fun.com/voice-over.htm, describes the softwarepackage as:

"The latestedition in the VOICE CHANGERSOFTWARE series which is dedicatedto voicechanging and voicemanipulating for onlineand local computer-basedprograms. The softwareis able to do a widerange of voicechanging related tasks for many differentpurposes, such as voice-overand voicedubbing for audio/videoclips, presentations,narrations, voice rnessages, voice mails,E-greeting cards, etc.; mimicthe voiceof any person,create animalsounds, change voices in songs,etc. ThisDiamond edition also presenfsa fasfervoice morphing algorithm, a professional lookinginterface, background effects library and numerousready-to-use nickvoices. The manypackages of parody voiceswill help usersfo talk in the voicesof many Hollywood starsand othercelebrities. VoiceChanger Software Diamond works wellwith many commonVolP programs such as Net2Phone,SkypeOut, Vonage, etc., and many lnstantMessenger programs such as Yahoo Messengerwith Voice, ,,AlM, etc. KEY FEATURES:Ready-to-use nickvoices, Parody Maker, Frequency Morpher, Audio StreamRecorder, Pitch and TimbreMorpher graph, Equalizers Background Effects. MAIN BENEFITS:Voice Changer Software Diamond is usefulforusers who want to be the VoiceMaster of Mediain cyberspace.They can useit to have fun whilechatting usinginstanf messenge r programs,do voicedubbing and voice-oversfor their own video/audioclips, mimic the voiceof theirfavorite ldol, and more."

Terroristsmay or maynot be usingVoice Changing software but it shouldbe of open sourceinterest that on lineterrorists and/or terrorist enthusiasts are discussing it.

o Owen,Glen, "Taliban Using Skype Phones to DodgeM16, UK DailyMail, Sept. 13, 2008, http://www.dailvmail.co.uUnews/worldnews/article-1055611/Taliban-usinq-Skvpe-phones-dodoe- Ml6.html?lTO=1490;Wylie,Pete, "Taliban VOIP Calls," Fierce VOIP, Sept. 15, http://www.fiercevoip.com/storv/tal iban-voip-calls/2008-09- 15

5Spoofing is definedas usingdeception to createsomething that is fabricatedor false,such as a falselP or telephonenumber.

-6- FOROFFIEI,{L, USE. ONLY

P.otah{d.-igrTe*tlr!U6e-d5--ffi A Redf€fil ve

Example lnq lweefs ffii "Less than 24 hrc before I head off for my vacation in lraq and the kids arc already maktng my wife miserable. Today Is not going to be fun." lli'..".s !t r "Going to DFAC - Dining 6drrr Facility - here at BIAP. Try to get on helicopter to Kalsu tonight." Twitteris describedas "a free SocialNetworking and MicroBloggingo service that lets "Put ofl at BIAP (Baghdad lntemational Airpoft). Not sure memberskeep in touchwith peopleusing the web,their wt'y.' phone,or lM (instantmessaging)."' Twitter is similarto othersocial networking sites in that it allowspeople to create 'Chillin in my tent at Baghdad a communityof interestand/or group of onlinefriends. I ntem atlo nal Ai rport (BIAP).' Twitterlaunched in July2006 and has becomean "Drove off base today down increasinglypopular networking venue over the pasttwo Route lrtsh in an'NTV and years.oOn September26, 2008, there were 21,100,000 dldnl get blown up...fun fun." GoogleHits for doinga searchon Twitter.com,which was advertisedon a multitudeof differentlanguage web pages, "Just picked my roomie up from BIAP, now it's ten lil 2 in includingEnglish, Arabic, Armenian, Simplified Chinese, the momlng, ugh." Croatian,Czech, Indonesian, Korean, Thai, and other languagese. "Today is my day oft. 115 already in Camp Bucca,lraq." Whatmakes Twitter unique is thatthe membercan send Example Afg hanistan Tweets Tweets(messages) near realtime to Twittercell phone

"l'm in Bagram waiting for a 6Search Mobile Computing Online defines Micro Blogging as flightto Camp Salemo by "Microbloggingis the practiceof sendingbrief poststo personal Kwost in the volatile easf of a Afghanistan near the Paki. blog on a microbloggingWeb site, such as Twitteror Jaiku. border. Hot daydcold nighb." Micropostscan be madepublic on a Web siteand/or distributed to a privategroup of subscribers.Subscrbers can read microblog "Hi from Bagnm air field; 20 postsonline or requestthat updatesbe deliveredin real time to minutes from now l'll hopefully their desktopas an instantmessage or sent to a mobiledevice as board a flight to the Pakistan an SMS text message." border," htto://searchmobilecomoutinq.techtaroet.com/sDefinition/0..sid40 oci1265620.00.htm1 "Flying to Bagram, Afghanistan ln 12 hourc. Thejourney ts about to beginl' I Example Foft Huachuca Tweefs CrunchBase, 'Twitter Company Profile," 2008, http://www.cru nchbase. com/com panv/Twitte r "Email I just got: -We are changing all of the PMs taslrs at e GoogleSearch of Twitter.com,Sept. 27,2OOB Ft Huachuca. I hope fhis does not add a lot of extra work on your end.' HAI"

"...is at Ft. Huachuca. ltwas great s*ing him last night passing through Tucson Intemational." -7 FORCIFFrcTAL USB OI{LY groupsand to theironline Twitter social networking page. They can alsoMashup their Tweetswith a varietyof othertools including geo coordinatesand GoogleMaps or other electronicfiles/artifacts. Members can directand re-directaudience members to other websitesand locationsfrom "Tweets" and can engagein rapid-firegroup social interaction.For example, the earthquakethat occurred in LosAngeles on July 29,2008 was reportedvia a Twittermember approximately four minutesprior to the information beingreported by the newsand withinminutes there were hundreds of Tweetsfrom peopleexperiencing the earthquakefirst hand.10 Twitter has alsobecome a social activismtoolfor socialists, human rights groups, communists, vegetarians, anarchists, religiouscommunities, atheists, political enthusiasts, hacktivists and othersto communicatewith each other and to sendmessages to broaderaudiences.ll

Twitteris alreadyused by somemembers to postand/or support extremist ideologies and perspectives.For example, there are multiplepro and anti HezbollahTweets. In addition,extremist and terroristuse of Twittercould evolve over time to reflecttactics thatare alreadyevolving in use by hacktivisfsand activistsfor surveillance.This could theoreticallybe combinedwith targeting. Twitter was recentlyused as a counter- surveillance,command and control,and movementtool by activistsat the Republican NationalConvention (RNC). The activistswould Tweet each other and their Twitter pagesto add informationon whatwas happeningwith Law Enforcementnear realtime.

Activist Use of Twitter for Law EnforcementCounter Surveillance and MovementCoordination at the most recent RepublicanNational Convention (RNc)

The followingsample Tweets were collected and postedin a ComputerWorld article 'TwitterHelps Republican Convention Protestors Organize, Elude Police," on September8, 2008(htto://www.pcworld.ido.com.au/index.oho/id:7484771):

o "Arrestteams are approachingseated protesters on MarionBridge. Resisters aretold they'll be metwith force." o "Protestorsare nowfighting back. First reports of violencenow" o "WesternAve. Bridge,west of capitolcan be safelycrossed." o 'City is on lockdown.Go to 14thand Jackson if you needhelp from tear gas pepperspray." (http://www.linuxworld.com.au/index.php/id:7484771 )

Thereare multiplered-teaming examples that could be createdsurrounding potential adversarialuse of Twitter. Followingare threered team scenarios:

toWeaver, Matthew, "Did the EarthTweet For You," UK GuardianBlog, July 30, 2008, http://www.ouardian.co.ul

-8 FOROFFrcI.{t US-EONIY

Scenario1: Terroristoperative "A" uses Twitter with (or without) using a cellphone camera/video functionto sendback messages, and to receivemessages, from the restof hiscell. Operative"A" also has a GoogleMaps Twitter Mash Up of wherehe is undera code wordfor othermembers of hiscell (if they need more in-depth directions) posted on the WWWthat can be viewedfrom their mobiles. Other members of hiscell receive near realtime updates (similar to the movementupdates that were sent by activistsat the RNC)on how,where, and the numberof troopsthat are moving in orderto conductan ambush.

Scenario2: Terroristoperative "A" has a mobilephone for Tweet messaging and for taking images. Operative"A" also has a separatemobile phone that is actuallyan explosivedevice and/ora suicidevest for remotedetonation. Terrorist operative "8" hasthe detonator anda mobileto view"A's" Tweets and images. This may allow "B" to selectthe precise momentof remotedetonation based on nearreal time movementand imagerythat is beingsent by "A."

Scenario3: CyberTerrorist operative "A" finds U.S. Army Smith's Twitter account. Operative "A" joinsSmith's Tweets and begins to elicitinformation from Smith. This information is then usedfor a targetingpackage (targeting in thissense could be for identitytheft, hacking, and/orphysical.) This scenario is notnew and has already been discussed for other socialnetworking sites, such as My Spaceand/or Face Book.

Sample of other Mobile Phone Topics & Software Recommendations

SampleSource: The mobilephone technology forum in www.tamkeen.iraqserve.com

r Recommendsand debates mobile phone brands (Samsung, Nokia, etc.) . Propagandamultimedia downloads for the phone(videos, audio clips, text files, PDF, etc.) . Mobilephone tips for surveillanceactivities . Usesof SMStext messaging . WindowsLive Messenger for the mobile r Freeadvanced mobile messages to yourmobile from website Huda 76 . MobilePhone GPS tracking options o Howto uploadsoftware updates . Religiousupload software, such as prayertimes reminders . Religiousand ideological background wall paper o TheSoftware package-Mobile Master Professional 7.0.1 Build 2699 . Xilisoft3GP Video Converter o convert3GP to avior mpg,and vice versa, as wellas 3gpmpg, mpeg2, mpeg4, wmv,mp4, 3gp, mov, rm, dv, yuv, h264 and MP3, WAV, AC3, WMA, m4a, ogg . EgoShare Software (data recovery) . Howto maintainand crack mobile phone security codes o Howto makemobile software programs . Discussionson howto protectand penetrateBlue Tooth technology . PDAprograms for the mobilephone (Some of the softwaredownloads that were advertizedare sub-listedbelow) o BestTaskMan v2.01

9- FOROFFICIALUSB OD.ILY o emTubeV1.06 o InstFastv0.01 o lslamicOrganizer v2.00 o Blacklistv2.00 o ActiveFilev1.25 o AnsweringMachine.vl.l0 o rotateMev2.0.5 o .Guru.BT.Guard.vl.00.S60v3.SymbianO59.l.Unsigned.Arabic-ArabPDA o QuickOffice Premier Upgrade 4.5.25.0 o TobiasStoger.S60Ticker.S60v3.SymbianOS9. 1.Arabic-ArabPDA o CorePlayer.v1.1.2 o Flashlitev3.0 o MobiolaMedia Player v2.1 o AudioNotes.v1.31 o S60SpotOnv0.7 o Pocket.Quran.v0.96b o ThemeDIY v1.2 o FreeTones.vl.05.S60v3.SymbianOS9. 1.Unsigned.Arabic o SmartGuardv2.00 o Total recall(advertized for wire tapping) o BestDictaphone v1.0 o Operav8.65 (search engine) o KavMobile6.1.8 (Antivirus)

- l0-