From: "Pedro Martori"
Subject: CUBA'S ROLE IN THE TERRORIST ACTIVITIES
charset = "UTF-8"
Date: Fri, 6 Sep 2002 17:42:49 -0400
NNTP-Posting-Date: Sat, 07 Sep 2002 11:41:08 EDT
Organization: Bell Sympatico
De: "Dan Christensen"
Asunto: CUBA'S ROLE IN THE TERRORIST ACTIVITIES
Fecha: Saturday, September 07, 2002 2:27 AM
When the Cold war ended, it was widely believed that a new era of
international cooperation had begun. However, simply put, the end
cold war has not led to a more peaceful world.
The United States is the target of those who challenge the status
one of those is Cuba. Furthermore, the PRC has joined efforts
with Cuba in a
new axis. The deterioration in China's relations with the United
also being accompanied by a warmer relationship with Russia.
There are four nations that use intensively their intelligence
harm the interests of the United States. The nations are: Russia,
and North Korea. These nations continue to expend significant
conduct intelligence operations against the United States.
These efforts are centered on producing intelligence concerning
States military capabilities, other national security activities,
military research and development activities.
They have now expanded their collection efforts to place
on collecting scientific, technical, economic, and proprietary
These collection efforts are designed to provide technologies
the acquisition and maintenance of advanced military systems, as
well as to
promote the national welfare of these nations.
Each one of these countries has the ability to collect
targeted U.S. activities using HUMINT, SIGINT, and the analysis
source material. Also, Cuba, China, and Russia have access to
products that can be used to produce IMINT.
The United States is now the target of those who want to
existing state of affairs. Security threats, in this new era of
warfare, will inevitable emerge more and more frequently.
The 'fall of communism" has not reduced the level or amount of
other potential serious activities conducted against the United
Recent espionage cases involving Russia, China, Cuba are just the
tip of the
Software is one weapon of information based attacks. Such
computer viruses, Trojan Horses, worms, logic bombs, and
sniffers. Advanced electronic hardware can also be useful in
attacks. In terms of maturity of the threat, the numbers tell the
far, in July of this year there have been over 300 reported
High Performance Computers (HPCs) are important for many military
applications, including processing information acquired through
HPCs provided to Cuba by the PRC could facilitate many of Cuba's
military modernization objectives.
The PRC has obtained the HPCs from the United States.The
HPCs to military modernization is also dependent on related
such asTelecommunications, Microelectronics, and Computer
in which the PRC has been assisting Cuba intensively since 1998.
The principal intelligence collection arms of the Cuban
government are the
Â· Directorate General of Intelligence (DGI)of Ministry of
Interior, and the
Military Counterintelligence Department of the Ministry of the
The DGI is responsible for foreign intelligence collection.
Â· The DGI has six divisions divided into two categories of
The Operational Divisions and the Support Divisions.
The operational divisions include the Political/Economic
Divisions, the External Counterintelligence Division, and the
The support divisions include the Technical Support Division, the
Information Division ,and the Preparation Division.
The Technical Support Division is responsible for production of
documents, communication systems supporting clandestine
development of clandestine message capabilities. The Information
Preparation Divisions are responsible for intelligence analysis
Â· The Political Economic Intelligence Division consists of four
Eastern Europe, North America, Western Europe, and
Africa-Asia-Latin -America. The External Counterintelligence
responsible for penetrating foreign intelligence services and the
surveillance of exiles.
Â· The Military Intelligence Department is focused on collecting
on the U.S. Armed Forces and coordinates SIGINT operations with
at Lourdes, and controls the Bejucal base.
Â· The Military Counterintelligence Department is responsible for
counterintelligence, SIGINT, and electronic warfare activities
The full range of Cuba's espionage activities are a very serious
concern. Despite the economic failure of the Castro regime, Cuban
intelligence, in particular the DGI, remains a viable threat to
States. The Cuban mission to the United States is the third
delegation. The United States' intelligence agencies should
resources to the most serious security threats, principally
terrorism, and adverse political trends.
II. CUBA's ELITE MILITARY GROUP: SPECIAL TROOPS
What are Cuba's elite forces? Who commands them? Who trains them?
their training camp? What are the main missions they are prepared
mid 1980s, Cuba established in Los Palacios, Pinar del Rio, in a
known as El Cacho, a special troop military training school.
It is named Baragua school. It is situated in a big valley, near
del Rio mountains. A very large training camp, with arificial
lakes, and the
most modern training technology. The School is exactly located
first missiles were seen during the 1962 missile crisis.
The School was founded by the de la Guardia brothers. It is now
General Jose Luis Mesa, very close to Raul Castro. General Mesa
is 50 years
old. Speaks fluent English, well mannered. Veteran of Vietnam as
officer, and the African wars. He is assisted by Colonel Ramirez,
Cuban. Veteran of Angola, Vietnam, and other war places. Colonel
an expert on this kind of special troop training. Presently they
assistant from special personnel from China and Vietnam. The
school has about a constant flow of 2500 men in training.
Their age range from 18 to 35 years old. They are a breed apart,
a cut above
the rest. Unquestionable, one of the world's finest
experts. Certainly, second only to the United States Special
Troops in this
Hemisphere. They are kept on an uncommon physical and mental
Mature, highly skilled, and superbly trained.
They are always ready to serve anywhere, at any time.
commando operations, biowarfare, cyberwarfare, espionage. Special
trained to deliver people, equipment, and weapons with surgical
Locate high-value, strategic, movable targets, and deliver
accurately. They are trained to operate in small independent
They have advanced personal camouflage with enhanced protection
harsh environments and climatic conditions. Clothing will offer
individual body armor and safeguards against biological and
They have helmets fitted with enhanced sensory head-up displays
thermal, image-intensified, and acoustic sensors. External and
optics enable them to see long distances clearly without using
They have external skeletal systems that will improve individual
enabling special operators to move faster, jump farther, and lift
weight. Such enhanced physical attributes allow them to deliver
force with greater accuracy and penetrating power. They also have
miniaturized command, control, and communication functions, as
embedded artificial intelligence for situational decision making.
In Baragua School, Special troops are trained to perform the
Â· Unconventional Warfare, UW: A broad spectrum of military
conducted in politically sensitive territory or "enemy" held
Including interrelated fields of guerrilla warfare, evasion and
Â· Direc Action, DA: Either overt or cover action against an
Seize, damage, and destroy a target. Short duration, small scale
actions. Ambushes, direct assault tactics, emplace mines.
Â· Special Reconnaissance, SR: Infiltration behind "enemy" lines.
meteorological, hydrographic, geographic, and demographic data.
Â· Psychological Operations,PSYOP: Induce or reinforce foreign
behavior favorable to Cuba objectives. Influence emotions,
behavior of foreign governments, organizations, groups, and
They also receive additional training and skills in freefall
underwater operations, target interdiction strategic
operations and intelligence.
Obviously, this group is strictly an offensive military group.
Cuba is an
island, and therefore has not borders to defend from neighboring
The most serious threats from the Special troops are: biowarfare
cyberwarfare operations, infiltrations, commando attacks,
Â· Cuba started its biological program in 1982. Dr. Ernesto Bravo
Boston University. There, with Dr. Lynn Margulis, and Dr. Harlyn
NACSEX had conducted several seminars and short courses in Cuba.
several Cuban scientists, engineers, physicians spent time at
Â· Dr. Silva Rodriguez spent three months at Boston University,
Robert Zimmerman, learning new technology related to genetic
Â· While these events were happening, Castro had visited the
Soviet Union in
1982, where he obtained from Brezhnev a laboratory donated to
E.coli bacteria could be genetically altered to produce
visit was followed by a visit to Cuba of General Vladimir
Lebedensky, with a
team of military scientists in biowarfare.
Â· By 2000, Cuba is the world's second largest producer, by
volume, of Alpha
Interferon. Cuba is also the only country, besides highly
producing a high range of human and recombinant interferons on an
Â· Therefore, for the past thirty years, Cuba has been working in
research and development of biotechnological agents. Viruses and
been altered genetically to heighten their lethality, paving the
way for the
development of pathogens capable of overcoming existing vaccines
Â· The arsenal in Cuba include weapons based on tularemia,
epidemic typhus, dengue fever, Marburg, Ebola. It also includes
agents, based on chemical substances produced naturally in the
Â· Cuba has acquired the technology and capacity to manufacture
equipment. Some of the equipment required are very similar to
related to diary production, sugar cane processing, and liquor
manufacturing, areas where Cuba has had experience and technology
Â· Cuba has developed, in conjunction with the PRC's company
Instrumentation Neuke, a toxin that paralyze the nervous system.
Â· Cuban main Centers dedicated to the research and development of
biotechnological agents are: CIGB, or Center for Genetic
Biotechnology; National Bio-preparations Center, or Biocen; the
Tropical Medicine; The Finlay Institute;the Center for Molecular
or CIM; the National Academy of Sciences.
Â· There are also some other 160 Centers, smaller, disseminated
the country. Approximately 10,000 researchers-scientists,
physicians, are working nationally in the field of biotechnology
IV. CUBA'S CHEMICAL WARFARE CAPABILITIES
Chemical warfare is the use of poison gases and other toxic
kill or incapacitate an enemy. Modern nerve gases and chemical
agents are a by-product of insecticide research. They are
organic chemicals known as organophosphorus compounds that
production of cholinesterase.
Cuba initiated its first steps in chemical warfare during the
Africa. Cuba learned its manufacturing, maintenance, and use from
Vietnamese, and the PRC. Later on, by the former Soviet Union.
efficient plants can turn out chemical weapons by the ton. These
scattered in Cuba, but mainly in La Habana, Central Cuba, near
Spititus, and in Santiago de Cuba.
Chemical weapons usually cause burns, asphyxiation, and
Cuba has developed, in conjunction with the PRC, a very effective
neurological damaging gas. They have also developed, with the
the former Soviet Union, a nerve gas called Novichok. This gas is
as deadly as conventional nerve gases. It is purported that
40,000 tons of
Novichok is enough to kill all human life on earth.
Of course, the use of chemical weapons is limited by the
excessive bulk of
the chemical agents. Weather, winds and the practical limitations
dispersal would generally limit chemical weapons to use against
targets. Chemical weapons can be very effective against troop
concentrations, military facilities, and highly populated areas.
Intelligent sources strongly suspect that Cuba has worked on, and
Â· Tabun (GA)-cholisterase inhibitor
Â· Sarin (GB)-cholinesterase inhibitor
Â· Soman (GD)- cholinesterase inhibitor
Â· Yellow Rain-Unknown compound that causes bleeding and rapid
include mycotoxins produced by the genus Fusarium fungi-Tropical
Â· Novichok-A choline sterase inhitor. Affect human genes.
Â· Mustard- (H, HID, HS)-causes skin and membrane inflammation.
Â· Phosgene Oxime (CX)-destroys skin and membrane tissue
A blood agent is absorbed into the body through the lungs where
it is then
picked up by the blood.
Â· Arsine Trihydride (SA)-causes gasping and choking, asphyxiation
Â· Hydrogen Cyanide (PB)-Penetrates current issue U.S. military
Causes convulsions, gasping, choking. Cuba and Irak worked
together on this
Â· Buzz (13Z)- Hallucinogenic LSD derivative
V. CUBA's CORE FOR BIOLOGICAL WARFARE: CIGB
The core of the biowarfare efforts of the Cuban government is the
Genetic Engineering and Biotechnology (CIGB), located at 31
158 and 190 streets, Cubanacan, La Habana. This institution is at
vanguard in the Hemisphere, second only to selected centers in
States. Over 1,100 engineers, scientists, technicians work at the
It occupies a total area of over 62,000 square meters, with
occupying approximately 44,000 square meters, including
offices and service areas. There is a huge greenhouse of 1,700
and 2.7 hectares of fertile soil. They also house a theater for
and congresses, and rooms for seminars, libraries, gymnasium,
The main production plant of bioagents covers 7,500 square
the CIGB shares production with the Biopreparations Center, or
located in Bejucal, at Carretera Beltran km 1 Â½, nearby the
espionage and interference base.
The CIGB is structured into several big sub directions: research,
control, production, engineering and services, teaching. The main
work lines are: pharmaceutical, vaccine, immunology, clinical,
automation, chemistry/physics, mammal cell genetics, plant
The CIGB has a CIGBnet which is the network for the Center. It
computer communications, database access, information services
processing. It is operated by the Network Services Group of the
Division of the CIGB. It provides computer networking access to
members.(out of the 1,100). LANs located in the Center are linked
using both dialup UUCP technology and RENACYT, the national
network, operated by ICIMAF/CIDET.
Protocols running on the LAN side are IPX/SPX, giving access to
based and UNIX base services. PWGlue is an off line email
of the Center, based on the Pegasus Mail. Glue code to get those
shareware packages working together was developed at the Center.
batching and compression engines were also added. Data
are compatible with UNIX standard compress utility or GNU's
certain personnel in the Center follow as this: last
The CIGB has a biotherium, barrier zones, white rooms, for
sensitive and lethal bio agents. The CIGB' modern and efficient
technological equipment includes mass spectrometers, infrared and
ultraviolet electron and scanning microscopes, gamma counters,
Also, and very important, downstream fermenters, drying and
machines, centrifuges, which can guarantee research and
bioweapons, such as bacteria and virus agents.
The process of weaponizing anthrax, for example, can be done at
facilities. A few grains of the freeze-dried bacteria are kept in
stoppered vial. Then, a small amount of a nutrient medium is put
vial. A mother culture is created. With tiny pippetes, the
mixture is drawn
out of the vial and a small amount is transferred into several
larger bottles. The bottles are left to incubate in a
thermostatic oven for
two days. This process, up to this point, is very similar to the
one to make
A seed stock in a standard vial will swell to billions of
after 48 hours, but it will take weeks of brewing to produce the
required for weaponization. Once the culture emerges from the
oven, it is
siphoned off into large flasks. The flasks are taken into a
where they are connected to air-bubbling machines, which turn the
into a light froth. The bacteria then grow more efficiently.
Each new generation of bacteria is transferred into larger
vessels, until is
vacuum pressure into fermenters. The substance is incubated for
two days in
the fermenters, until it reaches maximum concentration. At this
process is passed through a centrifuge to be concentrated as much
times further. However, we do not have a weapon yet. The pathogen
has to be
mixed with special additives to stabilize it over a long period.
weapon is ready.
Smallpox virus can also be produced at the Center. Tissue cells
from animals or humans. The tissue is kept alive outside its
in cell lines and stored at very precise temperature. Cells are
from the kidneys of green monkeys or from the lungs of human
special combination of amino acids, vitamins, salts, and sera,
with de-ionized water, is crucial for the process.
Many of the equipment needed for the production of bioagents are
the equipment used in the dairy industry, liquor industry, and
Therefore Cuba has the technology and the facilities to produce
China has developed a large biotechnological area in its
of the country. It is close to one of China's nuclear research
China has concentrated its efforts in the development of viral
Since 1997 China has been working very closely with Cuba in the
development of bioweapons. China has provided Cuba, among other
with two High Performance Computers, needed in the specialized
certain bioagents, as well as to study weather patterns for a
delivery or attack with bioagents. Chinese military scientists
joined Cubans at the CIGB conducting joint ventures in the
Â· On 1991 Cuba formed a group, under the Military Intelligence
of the Armed Forces. The group was charged to obtain information
computer viruses. The project was under the military authority of
Guillermo Bello, and his wife Colonel Sara Maria Jordan. The
authorities were the engineers Sergio Suarez, Amado Garcia, and
Â· Cuba's main centers are: the Lourdes base, under Russian
Bejucal base, under Cuban authorities; the Paseo complex, between
13th streets; the Jaruco complex; the Wajay complex.
Â· There are several research and development Centers at
Institutes, as well as centers in Santiago de Cuba and Guines.
Â· Cuba has done extensive studies on electromagnetic radiation
These are weapons capable of destroying microelectronic equipment
from a two
miles distance radius.
Â· There are several areas under cyberterrorism, all of which Cuba
capacity and the technology to produce. We have: electronic
espionage; computer network intrusion, in the form of viruses;
networks intrusion to change, alter, or read files; destruction
and electronic equipment through electromagnetic radiation
Â· Cuba has obtained from PRC several HPC-high performance
can be used for military research and development in the areas of
Â· Since 1998, Cuba has being working very closely with the PRC in
areas, as well as in the biowarfare area.
VII. WHAT CAN BE DONE FROM THE BEJUCAL BASE BESIDES ELECTRONIC
From the Bejucal base in Cuba, besides the listening to
channels in the United States, they can also produce attacks on
of the United States' computer systems or networks. The general
of attack are:
Interruption: An asset of the system is destroyed or becomes
unusable. This is referred to as an attack on availability.
destruction of a piece of hardware, such as a hard disk, the
cutting of a
communication line, or the disabling of the file management
Interception: They get access to an asset.This is referred to as
on confidentiality. Example is the unauthorized copying of files
Modification: The attacker tampers with an asset. This is
referred to as an
attack on integrity. Examples include changing values in a data
altering a program so that it performs differently, and modifying
content of messages being transmitted in a network
Fabrication: The attacker inserts counterfeit objects into the
is referred to as an attack on authenticity. Examples include the
of spurious messages in a network or the addition of records to a
CATEGORIES OF ATTACKS
A useful categorization of these attacks is in terms of passive
active attacks. Passive attacks are in the nature of monitoring
transmissions. The goal of the attacker is to obtain information
Two types of passive attacks are(1) release of message
analysis. A release of message content is easily understood. A
conversation, an electronic mail message, and a transferred file
sensitive or confidential information. The second passive attack,
analysis, is more subtle. Suppose that we had a way of masking
of a message or other information traffic so that Cuba, even if
the information, could not extract the real information because
of the use
of encryption. The attacker could after a period of time extract
information and messages, defeating the encryption process.
The second major category of attack is active attacks. These
some modification of the data stream or the creation of a false
can be subdivided into four categories: masquerade, replay,
message, denial of service.
A masquerade takes place when the attacker, under certain entity,
to be a different entity, and therefore enabling an authorized
obtain extra privileges. Replay involves the passive capture of a
and its subsequent retransmission to produce an unauthorized
Modification of service simply means that some portion of a
message is altered, or that messages are delayed or reordered, to
unauthorized effect. The denial of service prevents or inhibits
use or management of communications facilities. This is a very
serious possible attack. It could disrupt an entire network,
disabling the network or by overloading it with messages so as to
The attacker could target airports, financial centers, power
control centers, etc. It is quite difficult to prevent active
goal is to detect them and to recover from any disruption or
There are three classes of intruders:
Masquerader: the intruder is not authorized to use the computer
penetrates a system's access controls to get inside. This can be
the Bejucal base
Misfeasor: A legitimate user who access data, programs, or
which is not authorized. This can be done by an insider, not from
Clandestine: the intruder seizes supervisory control of the
system. Can be
done from inside or from the Bejucal base
The objective of the intruder is to gain access to a system or to
the range of privileges accessible on a system. The intruder must
information that should have been protected. In most cases, this
is in the form of a password. The password file can be protected
by one way
encryption or by limiting the access control to the file.
What are the most common techniques used so far to truy to break
Â· Try words on the system's online dictionary
Â· Collect information about the users. Full names, spouses'
Â· children's names, pictures in their offices, books in their
Â· (Here the operating personnel in Bejucal needs inside
Â· Users' phone numbers, social security numbers, room numbers,
Â· plate numbers, etc (inside information is also needed)
Â· Use a Trojan horse
Â· Tap the line between a remote user and the host system
Network security has assumed increasing importance. Individuals,
corporations, government agencies, must heighten their awareness
data and messages, and to protect systems from network-based
disciplines of cryptography and network security have matured,
the development of practical, readily available applications to
This report is an assessment of the Cuban threat to the United
national security. The assessment addresses the unconventional or
threats of infiltrations, commando attacks, espionage,
The FBI has identified the following countries as State sponsors
terrorism: Iran, Iraq, Cuba, Syria, Sudan, Libya, North Korea.The
Office of Technological Assessment has identified seventeen
believed to possess biological weapons. Cuba is one of them.
There is a definite and important relationship between Cuba and
Iran in the
field of biotechnology. Luis Herrera, one of the founders of the
the biowarfare industry in Cuba is directing the Iran/Cuba
sells to Iran equipment and technology to assist Iran in the
its biowarfare industry. Dr. Miyar Barruecos, a physician, very
Castro, has very strong ties to the Iran government. He was the
official involved in the initial development of this
Cuba and Iraq also maintain a close relationship in this field.
Alvarez Cambra, an orthopedic surgeon, very close to Castro, has
main official involved in the Cuba/Iraq relations. He has
operated on some
members of the Hussein's family. Iraq and Cuba interchange
technology in the biowarfare field.
Cuba's intelligence activities against the United States have
diversity and complexity in the past few years. The Director of
stated before the Senate Select Committee on Intelligence, 1998,
was among six countries that poses a threat to the United States
Cuba, due to its proximity to the United States, its electronic
facilities, and the constant flow of people between the United
Cuba, has served as a Center for Logistics for all terrorist
Cuba, obviously, represents a serious threat to the security of
Visit my website at
http://www.netcom.ca/~dchris/CubaPropagandal -- Dan]