Jihad in the Digital Age
IPT News May 31, 2011 http://www.investigativeproject.org/2923/jihad-in-the-digital-age Jihad has gone digital. Al-Qaida has long embraced the Internet and modern technology, but loosely-affiliated jihadists are hunting for new ways to fight the West in the Information Age <http://en.wikipedia.org/wiki/Information_Age> . At the cutting edge of technology, from Apple IPad 2 to using new internet protocols, jihadists are carrying the 7th century idea of an Islamic Caliphate well into the 21st century. Recently, jihadi hackers have produced <http://webcache.googleusercontent.com/search?q=cache:CwWZo0WT_q8J:www.as-an sar.com/vb/showthread.php%3Fp%3D188102+%22+%D8%A3%D9%86%D8%B5%D8%A7%D8%B1+%D 8%A7%D9%84%D9%82%D8%A7%D8%B9%D8%AF%D8%A9+%D8%A7%D9%84%D8%AA%D9%82%D9%86%D9%8 A%D8%A9+%22&cd=1&hl=en&ct=cln> a magazine <http://www.as-ansar.com/vb/showthread.php?p=188102> of their own and Islamist programmers have modified a shooting game for al-Qaida. A major jihadi commentator even released his first message to the 'brothers' on Facebook, a sign that Western social media is being used by those who want its destruction. Collectively, there is a growing jihadi reliance on high technology, social media, and the Internet. The "Magazine <http://azelin.files.wordpress.com/2011/05/journal-of-supporters-of-the-tech nical-base-for-information-security-and-hacking-1.pdf> for the Technical Supporters of Al-Qaida for Information Security and Hacking," provides news about hacker attacks on high-level political and economic sites, as well as holes in security to exploit. Word Press blogs, PlayStation's Internet network, and mysql.com, "the world's most popular open source databases," appear to be popular targets. Hacker attacks <http://www.reuters.com/article/2011/04/07/us-russia-medvedev-cyberattack-id USTRE7367GF20110407> on the now-defunct blog <http://community.livejournal.com/blog_medvedev.> of Russian President Dmitry Medvedev and the theft of millions from American banking magnate Citi Group show the potential in mass hacking attacks. Many of the articles in the magazine are drawn from a group called "Arab Pirates <http://www.xp10.com/> ," a little-known hacking group that runs a password protected forum. An article about IPV6, the long-discussed replacement Internet protocol for IPV4 that is only just now making headway online, is also a topic of discussion. In addition to hacking, the magazine discusses technological innovations and attacks on the large-scale hardware that makes Internet possible. In one article, the magazine marvels about reports that a 75-year-old woman from Georgia accidentally cut Internet <http://www.bbc.co.uk/news/world-europe-12985082> access to the entire country of Armenia. The article mentions the weakness of concentrated Internet lines in the territory of the former Soviet Union. Another article notes how Libyan rebels were able to build their own cell phone network, rerouting <http://techland.time.com/2011/04/13/how-libyan-rebels-built-their-own-cellp hone-network/> existing infrastructure to bypass Gaddafi's brutal crackdown on the flow of information. http://www.investigativeproject.org/pics/541_large.jpgThe development of "AlQaida-Strike 1.4 <http://as-ansar.com/vb/showthread.php?t=40202> ," a modification of a popular <http://store.steampowered.com/css> but dated game called Counter-Strike <http://planethalflife.gamespy.com/cs/> , is one of several first-person shooter games developed by the group. Easily modifiable, this version of the popular series replaces secular music with jihadi nasheeds - or instrument-less songs - and adds levels adapted to al-Qaida. A screenshot of the modified game's opening image shows links to a method to play on a local offline network and images from al-Qaida training camps. Critical to al-Qaida's needs, the modification contains another feature important to the group's needs. Chat rooms link players to one another, attracting those who glorify the group's violent aims. "The Media Organization of the Lion's Den," a group associated with al-Qaida web forum Shumukh al-Islam, also released <http://jihadology.net/2011/05/24/al-ma%E2%80%99sadat-media-foundation-prese nts-a-new-poem-from-umar-bin-ma%E1%B9%A3ud-al-%E1%B8%A5adushi-in-praise-of-t he-youth-of-al-shamukh-and-facebook/> a poem <http://azelin.files.wordpress.com/2011/05/umar-bin-mae1b9a3c5abd-al-e1b8a5a dc5abshc4ab-in-praise-of-the-youth-of-al-shamc5abkh-and-facebook.pdf> praising the brothers of the forum and Facebook. While the poem itself is relatively insignificant, senior commentator Umar bin Masud al-Hadushi recognizes that Facebook is playing an increasing role in organizing jihadists. A statement from Shumukh al-Islam, which has been on the forefront of embracing new technology, is symbolic of social media's importance to hardcore jihadists. "Active pro-jihad contributors to 'al-Faloja Islamic Forums' urged al-Qaida's supporters to "invade" Facebook in December 2008 by creating sympathetic groups-a feature available on the networking site-to spread the Salafi-Jihadi message," wrote <http://www.jamestown.org/single/?no_cache=1&tx_ttnews%5Btt_news%5D=36002> Jamestown Foundation's Murad Batal al-Shishani in "Taking al-Qaeda's Jihad to Facebook." While al-Shishani claimed then that radicals "cannot easily infiltrate Facebook," the acknowledgement of Facebook activists by al-Hadushi suggests otherwise. "Jihad supporters and mujahideen are increasingly using Facebook. to propagate operational information, including IED recipes primarily in Arabic, but in English, Indonesian, Urdu and other languages as well," said an internal DHS memo <http://publicintelligence.net/ufouoles-dhs-terrorist-use-of-social-networki ng-facebook-case-study/> , "Terrorist Use of Social Networking - Facebook Case Study." "The majority of extremist use of Facebook focuses on disseminating ideological information and exploiting the site as an alternative media outlet for terrorist propaganda," the memo continues. "However, to a lesser degree, the site is used as a gateway to radical forums and jihadi sites with explicit radical agendas (and easily downloadable operational information) and as a platform to promulgate some tactical and operational information." Read more at: http://www.investigativeproject.org/2923/jihad-in-the-digital-age [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-os...@yahoogroups.com. -------------------------- Brooks Isoldi, editor biso...@intellnet.org http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: osint-subscr...@yahoogroups.com Unsubscribe: osint-unsubscr...@yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: osint-dig...@yahoogroups.com osint-fullfeatu...@yahoogroups.com <*> To unsubscribe from this group, send an email to: osint-unsubscr...@yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/