Few obstacles deter cyber-terrorists


Al Qaeda moves operations to Web


By Steve Coll and Susan B. Glasser, Washington Post  |  August 9, 2005

http://www.boston.com/news/world/articles/2005/08/09/few_obstacles_deter_cyb
er_terrorists/

WASHINGTON -- In the snow-draped mountains near Jalalabad in November 2001,
as the Taliban collapsed and Al Qaeda lost its Afghan sanctuary, Osama bin
Laden biographer Hamid Mir watched ''every second Al Qaeda member carrying a
laptop computer along with a Kalashnikov" as they prepared to scatter into
hiding and exile. On the computer screens were photographs of Sept. 11
hijacker Mohamed Atta.

Nearly four years later, Al Qaeda has become the first guerrilla movement to
migrate from physical space to cyberspace. With laptops and DVDs, in secret
hideouts and at neighborhood Internet cafes, young code-writing jihadists
have sought to replicate the training, communication, planning, and
preaching facilities they lost in Afghanistan with countless new locations
on the Internet.

Al Qaeda suicide bombers and ambush units in Iraq routinely depend on the
Web for training and tactical support, relying on the Internet's anonymity
and flexibility to operate with near impunity in cyberspace. In Qatar,
Egypt, and Europe, cells affiliated with Al Qaeda that have recently carried
out or planned bombings have relied heavily on the Internet.

Such cases have led Western intelligence agencies and outside terrorism
specialists to conclude that the ''global jihad movement," sometimes led by
Al Qaeda fugitives but increasingly made up of diverse ''groups and ad hoc
cells," has become a ''Web-directed" phenomenon, as a presentation for US
government terrorism analysts by longtime State Department expert Dennis
Pluchinsky put it. Hampered by the nature of the Internet itself, the
government has proven ineffective at blocking or even hindering
significantly this vast online presence.

Among other things, Al Qaeda and its offshoots are building a massive and
dynamic online library of training materials -- some supported by
specialists who answer questions on message boards or in chat rooms --
covering such varied subjects as how to mix ricin poison, how to make a bomb
from commercial chemicals, how to pose as a fisherman and sneak through
Syria into Iraq, how to shoot at a US soldier, and how to navigate by the
stars while running through a night-shrouded desert. These materials are
cascading across the Web in Arabic, Urdu, Pashto, and other first languages
of jihadist volunteers.

The Saudi Arabian branch of Al Qaeda launched an online magazine in 2004
that exhorted potential recruits to use the Internet: ''Oh Mujahid brother,
in order to join the great training camps you don't have to travel to other
lands," declared the inaugural issue of Muaskar al-Battar, or Camp of the
Sword. ''Alone, in your home or with a group of your brothers, you too can
begin to execute the training program."

''Biological Weapons" was the stark title of a 15-page Arabic language
document posted two months ago on the website of Al Qaeda fugitive leader
Mustafa Setmariam Nasar, one of the jihadist movement's most important
propagandists, often referred to by the nom de guerre Abu Musab Suri. His
document described ''how the pneumonic plague could be made into a
biological weapon," if a small supply of the virus could be acquired,
according to a translation by Rebecca Givner-Forbes, an analyst at the
Terrorism Research Center, an Arlington, Va., firm with US government
clients.

Jihadists seek to overcome in cyberspace specific obstacles they face from
armies and police forces in the physical world. In planning attacks, radical
operatives are often at risk when they congregate at a mosque or cross a
border with false documents. They are safer working on the Web. Al Qaeda and
its offshoots ''have understood that both time and space have in many ways
been conquered by the Internet," said John Arquilla, a professor at the
Naval Postgraduate School who coined the term ''netwar" more than a decade
ago.

Al Qaeda's innovation on the Web ''erodes the ability of our security
services to hit them when they're most vulnerable, when they're moving,"
said Michael Scheuer, former chief of the CIA unit that tracked bin Laden.
''It used to be they had to go to Sudan, they had to go to Yemen, they had
to go to Afghanistan to train," he added. Now, even when such travel is
necessary, an Al Qaeda operative ''no longer has to carry anything that's
incriminating. He doesn't need his schematics, he doesn't need his
blueprints, he doesn't need formulas." Everything is posted on the Web or
''can be sent ahead by encrypted Internet, and it gets lost in the billions
of messages that are out there."

The number of active jihadist-related websites has metastasized since Sept.
11, 2001 . When Gabriel Weimann, a professor at the University of Haifa in
Israel, began tracking terrorist-related websites eight years ago, he found
12; today, he tracks more than 4,500. Hundreds celebrate Al Qaeda or its
ideas, he said. ''They are all linked indirectly through association of
belief, belonging to some community. The Internet is the network that
connects them all," Weimann said. ''You can see the virtual community come
alive."

C Copyright 2005 Globe Newspaper Company.

 



[Non-text portions of this message have been removed]



------------------------ Yahoo! Groups Sponsor --------------------~--> 
<font face=arial size=-1><a 
href="http://us.ard.yahoo.com/SIG=12hmgfmiu/M=362329.6886306.7839369.3040540/D=groups/S=1705323667:TM/Y=YAHOO/EXP=1123609902/A=2894321/R=0/SIG=11dvsfulr/*http://youthnoise.com/page.php?page_id=1992
">Fair play? Video games influencing politics. Click and talk back!</a>.</font>
--------------------------------------------------------------------~-> 

--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to