Non-STOP
www.fact.com.pk



Advertise Here

 
 
 
A web wise terror network
By Gordon Corera

The capture of alleged al-Qaeda computer expert Mohamed Naem Noor Khan by the Pakistani authorities in July brought with it an unprecedented haul of high-tech intelligence.

Speaking in London last month, America's homeland security chief Tom Ridge said the volume of potential information was "the largest we've ever seen - I mean potentially millions and millions of pages of information", and revealed that intelligence officers had yet to decipher it all.

Communications have always been an essential part of al-Qaeda's strategy, but the internet and email have become even more important in recent years.

They have provided the terror network with new possibilities - but, as the Khan case illustrates, fresh vulnerabilities too.

WHY THE WEB?

"The terrorists have fully exploited the modernisation of communications to their advantage," says Sajjan Gohel of the Asia-Pacific Foundation.

The al-Qaeda ideology can be very well served on the internet. It is able to purport its agenda, goals and ideology probably better on the internet than any other means."

As the core of the al-Qaeda leadership has been put under pressure, the organisation has been forced to evolve and become more decentralised - a structure to which the internet is perfectly suited.

The web offers a way for like-minded people located in different communities to interact - especially important when operatives may be isolated and having to lie low.

Denied a physical place to meet and organise, al-Qaeda has increasingly sought to create a virtual community through these chat rooms and websites to spread its propaganda, teaching and training.

"They lost their base in Afghanistan, they lost their training camps, they lost a government that allowed them do what they want within a country. Now they're surviving on internet to a large degree. It is really their new base," says terrorism expert Peter Bergen.

Those who watch the issue closely believe that it would be unlikely for al-Qaeda to use websites to communicate about the most sensitive matters, preferring to use it for general debate, the exchange of views and attempts to spread its thinking.

The propagation of a jihadist ideology has always been a central goal of al-Qaeda and the internet provides the broader jihadist movement with an effective vehicle to do this.

But it is not without liabilities, as it can prove a useful way of tracking down the network and closing in on cells. Khan's laptop contained a great deal of information - including a huge number of names. Some reports claim that Khan was in fact working against al-Qaeda - sending messages out to the network and monitoring their response to track down members, although this has not been confirmed.

SPREADING FEAR

One of the most important weapons in Al-Qaeda's armoury is its ability to generate fear. Jihadist groups in general use videos and still images of attacks - and especially gruesome attacks like beheadings - as part of psychological warfare.

These videos and messages have the dual impact of spreading anxiety among enemies while simultaneously boosting morale for sympathisers and like minded groups.

As well as videos, messages purporting to be from al-Qaeda or al-Qaeda related groups also make frequent appearances on certain sites. These often involve warnings against countries coupled with the threat of imminent attacks.

Some of these are undoubtedly false, others probably real. And while some of the messages are directed internally, in a number of cases - the messages, like the images - are designed to scare.

COMMUNICATING OBJECTIVES

Analysts believe that in some cases, messages are issued to set broad strategic objectives or target lists of places and people who should be subject to attack with the hope that independent cells, individuals and networks will then act on these in their own way.

They sometimes display a high degree of political awareness. One important paper entitled "Jihadi Iraq: Hopes and Dangers", spotted in Norway in December, looks at how members of the coalition occupying Iraq could be peeled off through terrorist attacks.

Spain is identified as presenting a particular opportunity given the general election that was then a few months off. It could, of course, be a coincidence that Madrid was then targeted just days before its election, but no one is sure.

There is less evidence of the internet being used by the Al Qaeda core for issuing specific orders or operational commands, or even for fundraising.

Email is used more often, but al-Qaeda operatives are trained to avoid detection, only using cyber-cafes briefly and using an email account for only one message before abandoning it.

Complex but publicly available encryption could also be used, but using this technology could draw attention - rendering regular message boards and groups a safer way of operating.

The 9/11 hijackers communicated through internet chat rooms, often using codenames and codewords for their plans. There is also some debate over a technique called steganography, which involves embedding secret messages within publicly available files and images on the internet, but there is little evidence so that al-Qaeda has used this.

Similarly there is some debate over whether messages from Osama Bin Laden and his deputy Ayman Al-Zawahiri contain any kind of message triggering groups around the world to attack. Again here the evidence is mixed.

DISCUSSING TACTICS

As well as propaganda and ideological material, jihadist sites seem to be heavily used for practical training, important since the loss of Afghan training camps.

Sites like Al Battar contain hugely detailed information on how to kidnap VIPs, conduct surveillance and fire rocket propelled grenades.Careful instructions were recently posted on one jihadist website on how to use mobile phones as detonators for explosives, as was used in Madrid.

Al-Qaeda's "Encyclopaedia of Jihad" which runs to thousands of pages has also been distributed over the internet.

The internet can also be a place on which terrorists can research information and find details of potential targets for attack, often known as 'cyberplanning'. Al Qaeda training manuals have emphasised the usefulness of publicly available information about its enemy. Huge amount of reconnaissance material and files have been found on captured computers.

Arguments also rage in chat rooms over what tactics and methods of violence are valid - whether hostage taking, beheading or the role of innocent - sometimes Muslim - casualties, in attacks.

The aftermath of the Russian school siege was interesting because many messages condemning what had happened were posted on sites which usually carry gruesome pictures and videos.

RECRUITMENT

Recruitment, often through chat rooms, may take place, and there is some evidence that people have been given instructions on how to get involved in Iraq.

This summer, a new online publication seeking specifically to encourage women to take part in Jihad appeared.

Researchers have also noted a rise of participants in radical Islamic forums who write in English or using the Latin alphabet, possibly reflecting a rise of interest in Muslims in the West in these sites.

SHIFTING SITES

Many Western governments have tried to respond to the communications challenge, using numerous methods that include monitoring traffic on the net and exchanges in chat rooms, using "sniffers" - programs that check e-mails for suspicious material, and blocking access to certain websites which contain sensitive information, according to Gabriel Weimann of Haifa University, who has extensively researched the subject.

The posting of videos is an especially important sign to counterterrorism analysts as it suggests that a particular website must have access or be used by those who actually carry out acts of violence.

An elaborate game of cat and mouse is often played out as websites move URLs regularly, changing address to avoid being shut down by ISPs and hackers. The more organised tend to have mirror sites. Alneda.com which has been thought to be al-Qaeda's primary website, keeps moving, often by embedding itself within innocent websites.

"As the technology develops, the terrorists keep ahead of the pace as well," warns Sajjan Gohel of the Asia-Pacific Foundation.

Apart from the occasional video and audio tape, there is less evidence for Osama Bin Laden himself using high-tech methods. During the 1990s he did communicate through a satellite phone before the fact that the US could listen in was leaked.

Since then, analysts believe that he mainly communicates through human couriers.

 


| Home | Top |


Site Credits: Zubair Technologies

Copyright © 2004 Fact Group Of Publications, All rights reserved