Few obstacles deter cyber-terrorists
Al Qaeda moves operations to Web By Steve Coll and Susan B. Glasser, Washington Post | August 9, 2005 http://www.boston.com/news/world/articles/2005/08/09/few_obstacles_deter_cyb er_terrorists/ WASHINGTON -- In the snow-draped mountains near Jalalabad in November 2001, as the Taliban collapsed and Al Qaeda lost its Afghan sanctuary, Osama bin Laden biographer Hamid Mir watched ''every second Al Qaeda member carrying a laptop computer along with a Kalashnikov" as they prepared to scatter into hiding and exile. On the computer screens were photographs of Sept. 11 hijacker Mohamed Atta. Nearly four years later, Al Qaeda has become the first guerrilla movement to migrate from physical space to cyberspace. With laptops and DVDs, in secret hideouts and at neighborhood Internet cafes, young code-writing jihadists have sought to replicate the training, communication, planning, and preaching facilities they lost in Afghanistan with countless new locations on the Internet. Al Qaeda suicide bombers and ambush units in Iraq routinely depend on the Web for training and tactical support, relying on the Internet's anonymity and flexibility to operate with near impunity in cyberspace. In Qatar, Egypt, and Europe, cells affiliated with Al Qaeda that have recently carried out or planned bombings have relied heavily on the Internet. Such cases have led Western intelligence agencies and outside terrorism specialists to conclude that the ''global jihad movement," sometimes led by Al Qaeda fugitives but increasingly made up of diverse ''groups and ad hoc cells," has become a ''Web-directed" phenomenon, as a presentation for US government terrorism analysts by longtime State Department expert Dennis Pluchinsky put it. Hampered by the nature of the Internet itself, the government has proven ineffective at blocking or even hindering significantly this vast online presence. Among other things, Al Qaeda and its offshoots are building a massive and dynamic online library of training materials -- some supported by specialists who answer questions on message boards or in chat rooms -- covering such varied subjects as how to mix ricin poison, how to make a bomb from commercial chemicals, how to pose as a fisherman and sneak through Syria into Iraq, how to shoot at a US soldier, and how to navigate by the stars while running through a night-shrouded desert. These materials are cascading across the Web in Arabic, Urdu, Pashto, and other first languages of jihadist volunteers. The Saudi Arabian branch of Al Qaeda launched an online magazine in 2004 that exhorted potential recruits to use the Internet: ''Oh Mujahid brother, in order to join the great training camps you don't have to travel to other lands," declared the inaugural issue of Muaskar al-Battar, or Camp of the Sword. ''Alone, in your home or with a group of your brothers, you too can begin to execute the training program." ''Biological Weapons" was the stark title of a 15-page Arabic language document posted two months ago on the website of Al Qaeda fugitive leader Mustafa Setmariam Nasar, one of the jihadist movement's most important propagandists, often referred to by the nom de guerre Abu Musab Suri. His document described ''how the pneumonic plague could be made into a biological weapon," if a small supply of the virus could be acquired, according to a translation by Rebecca Givner-Forbes, an analyst at the Terrorism Research Center, an Arlington, Va., firm with US government clients. Jihadists seek to overcome in cyberspace specific obstacles they face from armies and police forces in the physical world. In planning attacks, radical operatives are often at risk when they congregate at a mosque or cross a border with false documents. They are safer working on the Web. Al Qaeda and its offshoots ''have understood that both time and space have in many ways been conquered by the Internet," said John Arquilla, a professor at the Naval Postgraduate School who coined the term ''netwar" more than a decade ago. Al Qaeda's innovation on the Web ''erodes the ability of our security services to hit them when they're most vulnerable, when they're moving," said Michael Scheuer, former chief of the CIA unit that tracked bin Laden. ''It used to be they had to go to Sudan, they had to go to Yemen, they had to go to Afghanistan to train," he added. Now, even when such travel is necessary, an Al Qaeda operative ''no longer has to carry anything that's incriminating. He doesn't need his schematics, he doesn't need his blueprints, he doesn't need formulas." Everything is posted on the Web or ''can be sent ahead by encrypted Internet, and it gets lost in the billions of messages that are out there." The number of active jihadist-related websites has metastasized since Sept. 11, 2001 . When Gabriel Weimann, a professor at the University of Haifa in Israel, began tracking terrorist-related websites eight years ago, he found 12; today, he tracks more than 4,500. Hundreds celebrate Al Qaeda or its ideas, he said. ''They are all linked indirectly through association of belief, belonging to some community. The Internet is the network that connects them all," Weimann said. ''You can see the virtual community come alive." C Copyright 2005 Globe Newspaper Company. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> <font face=arial size=-1><a href="http://us.ard.yahoo.com/SIG=12hmgfmiu/M=362329.6886306.7839369.3040540/D=groups/S=1705323667:TM/Y=YAHOO/EXP=1123609902/A=2894321/R=0/SIG=11dvsfulr/*http://youthnoise.com/page.php?page_id=1992 ">Fair play? Video games influencing politics. Click and talk back!</a>.</font> --------------------------------------------------------------------~-> -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/