al Qaida-Like Mobile Discussions & Potential Creative Uses, MI Bn OSINT Team, 2008
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
FOR OFFICIAL USE ONLY Supplemental to the 304th MI Bn Periodic Newsletter Sample Overview: al Qaida-Like Mobile Discussions & Potential Creative Uses By 304th MI Bn OSINT Team October 16, 2008 This is a draft FOUO product .r The above examples ofNokia Map Functions are displayed in a Pro Islamic State of Iraq (al Qaida) Discussion thread at http://www.muslm.net/vb/showthread.php?p=I797473 with software description and download instructions. Posting date March 24,2008. FOR OFFICIAL USB 0 LV Overview Terrorists and persons sympathetic to terrorism recommend a variety of different mobile to web technologies, software, and Voice over Internet Protocol (VoIP)1 for their mobile phone use. Some of the tactics are old, some of the tactics are still emerging, and some tactics may emerge from hacker, activist, and criminal non-terrorist use. This paper briefly covers a few examples of terrorist use and potential use of mobile to web and web to mobile technologies and tactics from an open source perspective. The paper includes the following five topics: Pro Terrorist Propaganda Mobile Interfaces, Mobile Phone GPS for Movements, Ops, Targeting, and Exploitation, The Mobile Phone as a Surveillance Tool, Voice Changers for Terrorist Phone Calls, a Red Teaming Perspective on the Potential Terrorist Use of Twitter, and a sample of software that is recommended on one pro terrorist website for mobile phone activities. There are numerous possibilities that are not covered in this paper due to time and research constraints. For example, Google Earth, Mobile GPS Mashups 2 and Mobile Phone Number Spoofing techniques are not addressed in this paper but are certainly worth Open Source Intelligence (OSINT) consideration and probably deserve a paper (if not a book) unto itself. Please note the following caveats to this article. The first limitation is the discussed technologies were not independently verified in a red teaming scenario, so it is unclear whether some of the discussed tactics and methodologies would actually work. For example, extremist suggestions to include integrating a mobile phone camera into a missile warhead seem highly improbable. Second, a majority of the information was extracted from al Qaida-Iike websites from uncollaborated postings made by terrorists, persons sympathetic to terrorism, or honey pots 3 . Third, the research used to generate this paper was conducted from open sources only and has not been compared and/or contrasted with information in non-open source (classified) venues. Fourth, each topic is merely an introduction into the subject and deserves further research and contemplation. Fifth, the author is not a linguist, but used rudimentary Arabic language skills and the Google translating tool to extract website context. Finally, the potential for use of certain web to mobile technologies and tactics is dependent upon the mobile service available in different states and regions. For example, terrorists could theoretically use Twitter social networking in the U.S. as an operation tool. However, it is unclear whether that same theoretical use would be available to terrorists in other countries and to what extent. What did become clear from conducting research on this topic is that there are numerous different tactics, tools, and software services that can be used by terrorists to conduct activities that go well beyond the original intent of the mobile phone voice communications and that these burgeoning capabilities are available for OSINT exploitation. Further, there may be a possibility to profile a portion of particular cyber th 1 Prior August 2007 304 MI Bn OSINT Team Research Article "Terrorist and Extremist Use of th Voice Over Internet Protocol" is available on the 304 MI Bn OSINT Team INTELINK U page at https://www.intelink.gov/inteldocs/view.php?fDocumentld=10699 (If ~do not have access to INTELINK U and would like a copy of this newsletter please e-mail ~ 2 http://sea-eyes.comlvb/t3306.html Honey Pot is defined as something (example a website) that is set up in order to allure select audience members so that they may be tracked and monitored. 3 - 1- fOR OffICIAL USE ONLY terrorist-like groups and their audiences based on the particular set of software and phones that the group recommends from OSINT exploitation. Table of Contents PRO TERRORIST PROPAGANDA CELL PHONE INTERFACES 2 CELL PHONE GPS FOR MOVEMENTS, OPS, TARGETING & EXPLOITATION 3 MOBILE PHONE SURVEILLANCE 4 VOICE CHANGERS FOR TERRORIST TELEPHONE CALLS? 5 POTENTIAL FOR TERRORIST USE OF TWITTER: A RED TEAMING PERSPECTIVE. 7 SAMPLE OF OTHER MOBILE PHONE TOPICS & SOFTWARE RECOMMENDATIONS 9 Pro Terrorist Propaganda Cell Phone Interfaces The mobile phone provides an active outlet for terrorist propaganda. Currently there are thousands of multimedia clips (audio, video, photo, Power Point, text, PDF) that may be up loaded to mobile phones from multiple websites and multimedia bunkers. In addition, mobile phone texting appears to be consistently and possibly increasingly popular among pro terrorist audiences (just as it is with non-terrorist audiences). Some terrorist organizations are further branded by a specific cell phone interface, which makes the actual phone a piece of propaganda. Following are two examples: Army of the Mujahedeen Cell Phone Interface / !l Mellu :, --.>-:'.a ~ I (Advertized Cell Phone Screen Appearance) ~ Mo Tu We Th Fr Sa Su !iii 29 30 31 Calendar 5, 2.d 2 26 25 2& 2'1' 28 II ptiDlI\ I Islamic State of Iraq Cell Phone Interface 2 " 12131: 25 1.8, 1 5 3 9 10 1.617 22 23 24 ~9 30 q rxit (Advertized Cell Phone Screen Appearance) ile Illqr. - 2- (,aile FOR OFFICIAL USE ONLY The software for the above interfaces is advertized as being available for download on select extremist websites, such as tamkeen.iragserve.com. Cell Phone GPS for Movements, Ops, Targeting & _ _~E~xploitation "'_.;.,..'.,l':.J,..i;.:r-JZ..' ..f~l b')l...Jt J~ ~ -.JJ-e-J .)·y..JI loa Nokia 6210 Navigator and other GPS cell phone services could be used by our adversaries for travel plans, surveillance and targeting. Following is an example of one extremist discussion thread surrounding the use of Mobile Source: Arabic Discussion Forum http://llyan.org/vb/showthread.php?t=5844 (From Google Search Result Description: "Make your love for God, Eid and Phone GPS (there are multiple satisfaction and your obedience and Mwalatk and Zkirk and Islamic Jihad .... postings on this issue which Sailing fast and easy naVigation system with A-GPS maps and the application could be a paper unto itself.) On of Nokia Maps." May 3, 2008 a discussion topic Compare the previous text with a vendor's write-up "Sailing fast and easy was posted in the pro terrorist navigation system with A-GPS and Nokia Maps application maps. Find your destination on foot or in the car with a compass for navigation Serra. Take forum al Hebash at pictures and video through the use of high-quality 3.2-megapixel camera with www.alhesbah.net (now defunct) flash The advantage Panoramic 240 x 320QVGA See maps, pictures and on the theoretical use of Nokia videos on the screen QVGA stunning 2.4-inch size and the quality of 320 x 240 GPS for "Specialist use in Browse the Internet, send e-mail your uploaded content quickly connect via high-speed 3.5G '" Marksmanship, Border Crossings, and in Concealment of Supplies." The following three Graphics were associated with this posting. One response to the topic thread was that city images and pictures were not adequate because additional information, such as geocoordinates, was needed for deserts and forests (non-urban areas). A later posting in the thread discussed the pros and cons of GPS under the title "An Intensive Course in the Use of LG PSV GPS" (Reference screen capture on next page) which briefly covered some of the benefits and detriments of using GPS. The article mentioned the use of geo coordinates for border crossings, item concealment, and for identifying enemy locations. The article also mentioned that GPS would be useful for identifying terrain and natural resources, such as water. In addition, the article mentioned that attained enemy GPS can be useful for information exploitation. -3- FOR OFFICIAL USE ONLY .GPS (,):'i t.C ut-!\ JLW...\ .) ~ o,)JJ :4,;£ .l.l\"t J Jel' U;.e:i :JiJ\ ~,a.J\ Dk7t1J7"Jo-..JICt,1, ~~~ 111:..,iS~ ~ .,»J..,.."f.;t.JI..,·c..hl...f\.,.o4.,~~~~J"il~'·..:l,e,....fl.:ftjoJl':I~,·: 4JJ,""' .. ...J.I,....~a'-lI,~.;.~U,..;.~ .;,~ .·.·::)'''*';.l"l;f\.iJ.-\J"l,II~.''\.I!o- ...'Il,V'", ......... ,d.J-".tl.-,)Jl~.~J "f~ .. I,J~I)~~.il.l.f-1l.t-.jl.,..r':L.JI'~' ... '..i "'' '.;.>, .,., .,,~~ ~,.}bl"l~."""'~" w..Jl~,.~F-i~,.~,}~ ... j4.l ..., .... t,.:l 'J1"'~""'<;';.r'?" ;,1,,1 ... ......~I".to~~/# .. ·,--.....J,.&:l~'t.~~"~<UfI'''tI.~,."...:.J..",.,. ..... C~'+! ,-,.d.-..:. J-.) ~'- .~"f--~W~ ..;-.)~"t.l ...ro-.:..t :';'1...+',- "An Intensive Course in the Use ofLG PSV GPS" ,.... 8 ~ ~~ ••1......1 ~ ~J~Jo.l~-4ow....:J .... ;JJ .a~;,,)a-.:.t-,,~. . . . .... . . ... .r.,,-..'l1» .~.J~J~~j:& . "", ...... .. ... ~ ~J1MU'.. I.!II\)fl...MC<.'Qo<tc!Ie .. AodI1'iJ)I,.~.~{~IlUJJt,f,""_.....Jtv--..• ..P~.o\o~,.l6.U~It.-{..,~ Idrrtty ....., .. • ~I· "I.oQ-rw. 2008'O7 .... 1~1 (.. ).._ .......r-JI~r-JI,,~~I.;... 'Jl~ J t - I x~..a::::.~:-.; ....."JI.,..,-,.JI..;,I,...,..... ,,~!ll~ ............. ~ p\l-Jl ,\L:JI ..ill ~ An al Qaida-Iike Social Networking Page in Maktoobblog, www.shhidallah.maktoobblog.com/1213376 that recommends the "An Intensive Course in the Use of LG PSV GPS" Mobile Phone Surveillance On September 6, 2008 an individual using the pseudonym of "Volcano" provided a theoretical discussion in the Mujahedeen Army of Iraq Enabling Islamic Mobiles forum, www.tamkeen.iragserve.com. on the use of mobile phones for target surveillance and attacks. Under the category of basic surveillance, "Volcano" recommended using the phone/video camera for monitoring enemy activities and operations in theater. Of unique interest is that "Volcano" posed several theoretical examples of how to use the mobile phone video and camera options in tandem with conducting attacks. For example, "Volcano" suggested that one could use the mobile phone for remote surveillance to tag the opportune time of attack. "Volcano" also hypothesized whether a mobile phone camera could be integrated into a missile head to film a target as it is being attacked. This recommendation probably would not work but provides insight into adversarial perspectives. (Reference the screen capture on the following page.) - 4- FOR OFFICIAL USE 0 LV !Jj Jj:J lr I"j . /",1" I J'IJ" I! !J.JJI.. fUJ' '.J.I' IJJJ!iJ I :.I!.J". .... 'J.~ r ~ !I.' _.............."""'" . . . . . . . . . . .'1_._.. _'1_·.. . C Norton 8 http://74 125.93.104/bal'1SWe_(~au-http://WWW·t.1rTNMln·.aqserve·wtrtlshololdYead.~28771!l4Jrev-IS61JI~ ..... ser .....WII_ _ ~..,,:JOi.I-;Law tJ G ldentty Safe .. ......_........ •• loq-hs .. --- Jwl·Twlter5earch Ooetroying the terget mobile Bkemlr..lholv The name of God the merciful Mey Alleh Almklloukln Mohammed Ahal and his family and companions Mujahideen brothers AI for GM using I mobile phone clm.r. to monitor the en.my end its mech.nlaml Such as Installation of A1camlraomam mobile devices to control the exact time of detonation by mobile phone to 111m the area In which the enemy approaching and mechanisms of the device by ramote control MuJahldeen bombing and Hmaaloalob MuJahldeen can notTIlk prasenceln the raglon. Can control the device and you at home or In Bldakr to be mobile, which monitors Mtsa'abjwal another at the Mujahldeen to be giving them B.loralti Iiourhajawal first. Can be uI.d I' roving or more monitoring. ~:Jl.'12C1lJ .149:~"'J 535:Yli:.J:ooII Here Is the second Idea. The .n.ml,. of God Americana and Jews at the destruction of. target shooting that procesl and guided ml.sile with • eamef. and then they offer on television and scar. the enemi•• Avcjar•. r.t.4.74: ...... 5O::.aIl ... ea-:...,. ._fit, Can also volunteers to do Tdmirohdavhm IIlmed using a camera phone and Install It on the front of the missile and rocket Abokhip Arpl LG Mobile Is proven linked to a ..ck and another at a mobile missile launching the second phase of ragiatratlon of camera and destroying the target Ngld so unbelievers. O.... rt..... .t"'-I... ." o x Fnd: o ..... ~ .n. I ask God Almighty to mekethe refuge Hdon everywhere _ _ .... adt. . .JfieJct.ereYlOU5 Voice Changers for Terrorist Telephone Calls? You may have seen it in a movie, the villain calling the victim with an altered voice to hide his/her identity. In the movies, that theme is fairly common; the question really is whether our adversaries will consider voice changing technology for use in future operations. The Forum Engineering audio and video ~OQIne~r,ngfOf' all vok.~. v~ itnd ~MpIanatIOM answer could be yes. On September 9, 2008 Abu Aisha L I prooram chanoe votes wonckfrul and the Moroccan, Technical Supervisor, of the Technical Audio Discussion of the AV Voice Changer Diamond 6.0.10 Ansar al Jihad forum recommended voice changing Dale JuI ZOO8 Posts: software for making The 01 level: lIe VOIP telephone calls. He mentioned that the software would be helpful for most VOIP services including Skype and Vonage. This recommendation was posted following public media reports of the Taliban using AV Vok~ (han~f DllMllOnd 6.0.10/ bettutlrul The name of God the merciful I. - R~~allOf'l S).& rat~ <Hses~ -5- FOR OFFICIAL USB 0 LY SKYPE. 4 The timing was most likely coincidental and unrelated but the two concepts can complement one another. The Taliban and other like groups suspecting their VOIP communications are being be monitored could theoretically combine voice changing software with (or without) encryption and caller 1.0. spoofing 5 in order to make basic detection more difficult. This tactic mayor may not be effective to elude international intelligence agencies. However, it might be effective for calling in demands, interviews, and/or attack claims to media outlets. Abu Aisha the Moroccan specifically recommended AV Voice Changer Diamond 6.0.10 off a freeware download page. Audio for Fun, http://www.audi04fun.com/voice-over.htm. describes the software package as: 'The latest edition in the VOICE CHANGER SOFTWARE series which is dedicated to voice changing and voice manipulating for online and local computer-based programs. The software is able to do a wide range of voice changing related tasks for many different purposes, such as voice-over and voice dubbing for audio/video clips, presentations, narrations, voice messages, voice mails, E-greeting cards, etc.; mimic the voice of any person, create animal sounds, change voices in songs, etc. This Diamond edition also presents a faster voice morphing algorithm, a professional looking interface, background effects library and numerous ready-to-use nickvoices. The many packages of parody voices will help users to talk in the voices of many Hollywood stars and other celebrities. Voice Changer Software Diamond works well with many common VolP programs such as Net2Phone, SkypeOut, Vonage, etc., and many Instant Messenger programs such as Yahoo Messenger with Voice, Skype, Windows Live Messenger, AIM, etc. KEY FEA TURES: Ready-to-use nickvoices, Parody Maker, Frequency Morpher, Audio Stream Recorder, Pitch and Timbre Morpher graph, Equalizers Background Effects. MAIN BENEFITS: Voice Changer Software Diamond is useful for users who want to be the Voice Master of Media in cyberspace. They can use it to have fun while chatting using instant messenger programs, do voice dubbing and voice-overs for their own video/audio clips, mimic the voice of their favorite Idol, and more. " Terrorists mayor may not be using Voice Changing software but it should be of open source interest that on line terrorists and/or terrorist enthusiasts are discussing it. Owen, Glen, 'Taliban Using Skype Phones to Dodge M16, UK Daily Mail, Sept. 13,2008, http://www.dailymail.co.uk/news/worldnews/article-1 055611 fT aliban-using-Skype-phones-dodgeMI6.html?ITO=1490; Wylie, Pete, 'Taliban VOIP Calls," Fierce VOIP, Sept. 15, http://www.fiercevoip.com/storv/taliban-voip-calls/2008-09-15 4 5 Spoofing is defined as using deception to create something that is fabricated or false, such as a false IP or telephone number. -6- FOR OFFICIAL SB ONLY Potential for Terrorist Use of Twitter: A Red Teaming Perspective Example Iraq Tweets _ ... ,qo 1 ....- "Less than 24 hrs before I head off for my vacation in Iraq and the kids are already making my wife miserable. Today is not going to be fun." "Going to DFAC - Dining Facility •• here at BIAP. Try to get on helicopter to Kalsu tonight." "Put off at BIAP (Baghdad International Airport). Not sure why." "Chil/in in my tent at Baghdad International Airport (BIAP)." "Drove off base today down Route Irish in an 'NTV and didn't get blown up...fun fun." "Just picked my roomie up from BIAP, now it's ten 'til 2 in the morning, ugh." "Today is my day off. 115 already in Camp Bucca, Iraq." Example Afghanistan Tweets "I'm in Bagram waiting for a flight to Camp Salerno by Kwost in the volatile east of Afghanistan near the Paki. border. Hot days/cold nights." "Hi from Bagram air field; 20 minutes from now I'll hopefully board a flight to the Pakistan border." "Flying to Bagram, Afghanistan in 12 hours. The journey is about to begin!" Example Fort Huachuca Tweets "Email I just got: ·We are changing all of the PMs tasks at Ft. Huachuca. I hope this does not add a lot of extra work on your end.• HA!" "...is at Ft. Huachuca. It was great seeing him last night passing through Tucson International. " Twitter is described as "a free Social Networking and Micro Blogging 6 service that lets members keep in touch with people using the web, their phone, or 1M (instant messaging).,,7 Twitter is similar to other social networking sites in that it allows people to create a community of interest and/or group of online friends. Twitter launched in July 2006 and has become an increasingly popular networking venue over the past two years. 8 On September 26, 2008, there were 21,100,000 Google Hits for doing a search on Twitter.com, which was advertised on a multitude of different language web pages, including English, Arabic, Armenian, Simplified Chinese, Croatian, Czech, Indonesian, Korean, Thai, and other languages9 • What makes Twitter unique is that the member can send Tweets (messages) near real time to Twitter cell phone Search Mobile Computing Online defines Micro Blogging as "Microblogging is the practice of sending brief posts to a personal blog on a microblogging Web site, such as Twitter or Jaiku. Microposts can be made public on a Web site and/or distributed to a private group of subscribers. Subscribers can read microblog posts online or request that updates be delivered in real time to their desktop as an instant message or sent to a mobile device as an SMS text message." http://searchmobilecomputing.techtarget.com/sDefinition/0..sid40 gci1265620,OO.html 6 Crunch Base, ''Twitter Company Profile," 2008, http://www.crunchbase.com/companyfTwitter 8 9 Google Search of Twitter.com, Sept. 27, 2008 -7- FOR OFFICIAL USB ONLY groups and to their online Twitter social networking page. They can also Mashup their Tweets with a variety of other tools including geo coordinates and Google Maps or other electronic files/artifacts. Members can direct and re-direct audience members to other websites and locations from "Tweets" and can engage in rapid-fire group social interaction. For example, the earthquake that occurred in Los Angeles on July 29, 2008 was reported via a Twitter member approximately four minutes prior to the information being reported by the news and within minutes there were hundreds of Tweets from people experiencing the earthquake first hand. 10 Twitter has also become a social activism tool for socialists, human rights groups, communists, vegetarians, anarchists, religious communities, atheists, political enthusiasts, hacktivists and others to communicate with each other and to send messages to broader audiences. 11 Twitter is already used by some members to post and/or support extremist ideologies and perspectives. For example, there are multiple pro and anti Hezbollah Tweets. In addition, extremist and terrorist use of Twitter could evolve over time to reflect tactics that are already evolving in use by hacktivists and activists for surveillance. This could theoretically be combined with targeting. Twitter was recently used as a countersurveillance, command and control, and movement tool by activists at the Republican National Convention (RNC). The activists would Tweet each other and their Twitter pages to add information on what was happening with Law Enforcement near real time. Activist Use of Twitter for Law Enforcement Counter Surveillance and Movement Coordination at the most recent Republican National Convention (RNC) The following sample Tweets were collected and posted in a Computer World article 'Twitter Helps Republican Convention Protestors Organize, Elude Police," on September 8, 2008 (http://www.pcworld.idg.com.au/index.php/id;7484771): • • • • "Arrest teams are approaching seated protesters on Marion Bridge. Resisters are told they'll be met with force." "Protestors are now fighting back. First reports of violence now" "Western Ave. Bridge, west of capitol can be safely crossed." "City is on lockdown. Go to 14th and Jackson if you need help from tear gas pepper spray." (http://www.linuxworld.com.au/index.php/id;7484771) There are multiple red-teaming examples that could be created surrounding potential adversarial use of Twitter. Following are three red team scenarios: 10 Weaver, Matthew, "Did the Earth Tweet For You," UK Guardian 810g, July 30,2008, http://www.guardian.co.uk/news/blog/2008/jul/30/laearthguakehitsrealitvtv 11 304 th MI 8n OSINT Team Review of Member Twitter Pages -8- FOR OFFICIAL USE ONLY Scenario 1: Terrorist operative "A" uses Twitter with (or without) using a cell phone camera/video function to send back messages, and to receive messages, from the rest of his cell. Operative "A" also has a Google Maps Twitter Mash Up of where he is under a code word for other members of his cell (if they need more in-depth directions) posted on the WWW that can be viewed from their mobiles. Other members of his cell receive near real time updates (similar to the movement updates that were sent by activists at the RNC) on how, where, and the number of troops that are moving in order to conduct an ambush. Scenario 2: Terrorist operative "A" has a mobile phone for Tweet messaging and for taking images. Operative "A" also has a separate mobile phone that is actually an explosive device and/or a suicide vest for remote detonation. Terrorist operative "B" has the detonator and a mobile to view "A's" Tweets and images. This may allow "B" to select the precise moment of remote detonation based on near real time movement and imagery that is being sent by "A." Scenario 3: Cyber Terrorist operative "A" finds U.S. Army Smith's Twitter account. Operative "A" joins Smith's Tweets and begins to elicit information from Smith. This information is then used for a targeting package (targeting in this sense could be for identity theft, hacking, and/or physical.) This scenario is not new and has already been discussed for other social networking sites, such as My Space and/or Face Book. Sample of other Mobile Phone Topics & Software Recommendations Sample Source: The mobile phone technology forum in www.tamkeen.iragserve.com • • • • • • • • • • • • • • • • Recommends and debates mobile phone brands (Samsung, Nokia, etc.) Propaganda multimedia downloads for the phone (videos, audio clips, text files, PDF, etc.) Mobile phone tips for surveillance activities Uses of SMS text messaging Windows Live Messenger for the mobile Free advanced mobile messages to your mobile from website Huda 76 Mobile Phone GPS tracking options How to upload software updates Religious upload software, such as prayer times reminders Religious and ideological background wall paper o The Software package-Mobile Master Professional 7.0.1 Build 2699 Xiiisoft 3GP Video Converter o convert 3GP to avi or mpg, and vice versa, as well as 3gp mpg, mpeg2, mpeg4, wmv, mp4, 3gp, mov, rm, dv, yuv, h264 and MP3, WAV, AC3, WMA, m4a, ogg Ego Share Software (data recovery) How to maintain and crack mobile phone security codes How to make mobile software programs Discussions on how to protect and penetrate Blue Tooth technology PDA programs for the mobile phone (Some of the software downloads that were advertized are sub-listed below) o Best TaskMan v2.01 -9- FOR OFFICIAL USE ONLY o o o o o o o o o o o o o o o o o o o o o o o emTube V1.06 InstFast vO.01 Islamic Organizer v2.00 Blacklist v2.00 ActiveFile v 1.25 AnsweringMachine.v1.10 rotate Me v2.0.5 Symbian.Guru.BT.Guard.v1.00.S60v3.SymbianOS9.1.Unsigned.Arabic-ArabPDA Quick Office Premier Upgrade 4.5.25.0 Tobias Stoger.S60Ticker.S60v3.SymbianOS9.1.Arabic-ArabPDA CorePlayer.v1.1.2 FlashLite v3.0 Mobiola Media Player v2.1 AudioNotes.v1.31 S60SpotOn vO.? Pocket.Quran.vO.96b Theme DIY v1.2 FreeTones.v1.05.S60v3.SymbianOS9.1.Unsigned.Arabic SmartGuard v2.00 Total recall (advertized for wire tapping) Best Dictaphone v1.0 Opera v8.65 (search engine) KavMobile 6.1.8 (Antivirus) - 10-