Al-Qaida proving elusive on the Net

By Declan McCullagh
http://news.com.com/Al-Qaida+proving+elusive+on+the+Net/2100-1028_3-5895150.
html

Story last modified Fri Oct 14 04:00:00 PDT 2005


An American-led military invasion of Afghanistan took just months to uproot
al-Qaida from the rocky slopes of Tora Bora and the White Mountains.

But nearly four years later, even the combined might of the United States
and its allies have had a far more difficult time scouring the Internet for
the shadowy network of Islamic fundamentalists. The British government's
announcement in July that it planned to clamp down on people who run Web
sites that incite terrorism has had no noticeable results to date.

"For al-Qaida, the survival of the ideology is a lot more important than the
survival of any of their physical assets or members, and the Internet is a
way to ensure the propagation of that ideology," said Rebecca Givner-Forbes,
an analyst for the Terrorism Research Center, which provides research
services to the federal government.

Al-Qaida has adopted online tactics that mirror its offline techniques for
evading discovery: reliance on a constantly shifting collection of Internet
sites and hostile takeovers of Web servers where propaganda can be posted.
Last year, a server operated by the Arkansas highway office was hijacked and
used to distribute 70 files including videos featuring Osama bin Laden.

During the past few years, according to terrorism analysts, al-Qaida has
embraced the Internet as a new tool for organizing, training and
propagandizing. A group believed to be al-Qaida's Web-based propaganda arm
recently debuted a weekly state-of-affairs Webcast and is reportedly
searching online for recruits to aid with the coverage--meaning that the
group will need to find more hijacked computers to distribute the additional
content.

What remains unclear is how the U.S. government will respond to the
increasing visibility of its far-flung nemesis.

"Obviously, these Web sites, there's more and more of them, and it is a
matter of ongoing interest to U.S. intelligence," said an official with the
federal government's National Counterterrorism Center, who spoke on
condition of anonymity. "They have proliferated...Al-Qaida sees the
propaganda value in terms of developing these sites."

That leaves the U.S. government with two obvious choices: attempt to
sabotage the Web sites that appear to have the closest ties to al-Qaida's
leaders, or monitor them closely to unearth who might be behind their
operation. (The National Counterterrorism Center, created by President Bush
last year as an offshoot of the CIA, would not comment.)

Most analysts interviewed by CNET News.com believe the federal government
has chosen the watch-and-learn approach.

"It is very useful to monitor the content of these sites," Givner-Forbes
said. "If you shut down these sites, they would find a way to continue...The
community would kind of find a way to continue and would just make it harder
for us to access and to eavesdrop on the sites." Some of the Web sites are
already protected from the public by usernames and passwords, she said.

If the U.S. government did choose to engage in a limited form of what
pundits used to call an "infowar," there may be few legal barriers standing
in the way.

Jonathan Zittrain, co-founder of the Berkman Center for Internet and Society
at Harvard Law School, said he suspected such a practice could happen
legally. Intelligence operatives could classify the deed as a covert
operation that would be reported later to Congress, he said.

"If the government chose to conduct an operation overseas to bring down Web
sites bearing messages from al-Qaida," Zittrain said, "I don't think the
government would think anything stood in its way from doing it."

An array of options

What's drawn attention of terrorism analysts recently has been a series of
weekly "news" Webcasts put out by a group--purportedly tied to
al-Qaida--that calls itself the Global Islamic Media Front. Online
advertisements plugging the shows--dubbed "The Voice of the
Caliphate"--feature Fox News and Al-Jazeera icons engorged in flames.

The pilot show, which surfaced in late September, drew wide attention for
its belligerent outlook and apparent attempt to discredit reports from
Western and mainstream Arab media. According to a translation circulated by
the Middle East Media Research Institute, an Israel-based group, a
ski-masked anchor announced: "The entire Islamic world overflowed with joy
when Hurricane Katrina struck in America, which seemed to reel from the
strength of the hurricane and went asking for aid from all the countries of
the world."

The U.S. government and its allies would have an array of options if they
were to try to sabotage such a broadcast.

One method, known as a denial of service attack, clogs the target server
with flood of false requests for information, overwhelming the system.
Legitimate users can't connect. Denial of service attacks became more
frequent about five years ago--with Whitehouse.gov and the FBI's Web site
being among the targets.

One problem with that technique, from the government's perspective, is that
terrorist-sympathetic Web sites are often unknowingly hosted by Internet
service providers. A denial of service attack would indiscriminately
restrict access to all the company's customers.

"The government can't just hack into those ISPs," said Dorothy Denning, a
professor of defense analysis at the Naval Postgraduate School in Monterey,
Calif. "Companies like that are generally not trying to support terrorists."

More obvious tactics involve destroying files or network equipment, or
intruding into a system and misconfiguring settings so that proper routing
to the site can't occur. But experts say such measures tend to be considered
a last resort.

"Obviously, when you destroy something your opponent knows that their thing
has been destroyed," said Richard Harknett, a University of Cincinnati
political science professor who specializes in national security. "That's
something that you want to do on a very limited basis (only) when you're
actually using information warfare in combination with a military
operation."

A more subtle approach is the centuries-old military tactic of
disinformation. Government operatives could, for example, gain entry to an
opponent's server and manipulate information just enough to befuddle its
adversaries or the general public.

The tactic of choice

However, surreptitious monitoring may be the government's tactic of choice.
The CIA, for instance, has bankrolled research geared toward spying on
Internet chatrooms in an effort to "combat terrorism through advanced
technology."

"One of the most difficult parts of dealing with terrorism of this sort is
the group conducting it is so remote and insular and it's hard to penetrate
the group for intelligence purposes," said Harvard's Zittrain. "More likely,
it's the kind of thing where they're happy to see the sites stay up."

More recently, a patent obtained by the National Security Agency indicated
that the government may be hoping to find additional ways to trace Internet
users to their geographic location. (An NSA spokesman said that the agency
could not comment on the topic because the patent concerns an "actual or
alleged operational issue.")

But that "geotargeting" tactic--which also been employed by software
companies seeking to tailor ad delivery--is not foolproof, thanks to
anonymizers, proxies and other services that can mask one's location.

"In general, if someone wishes to hide his location, he can," said Gene
Spafford, a Purdue University computer science professor who specializes in
security and cybercrime.

Lack of feasible technology isn't the only obstacle to intelligence
gathering, said Arnaud de Borchgrave, an analyst at the Center for Strategic
and International Studies who has focused on "cyberspace terrorism." Limited
availability of translators for languages in which the sites appear curbs
the government's ability to track activity in "real time," he said.

Even with additional resources, completely dismantling al-Qaida's Web
presence would be an impossible aim, de Borchgrave said: "The number of
people that were required to monitor all of this would be stupendous, and
clearly they don't have all those resources."

In an unusual twist, some members of the shadowy intelligence community fret
that individual vigilantes will try to take down Web sites that appear to be
sympathetic toward terrorists or reproduce their materials.

Ben Venzke, the chief executive of IntelCenter, a government contractor in
Alexandria, Va., warns would-be hackers not to be tempted.

"Messing around on the Internet just because it's accessible from your
living room is no more advisable than packing up your bags for a weekend and
flying to Iraq to play soldier," Venzke said. "There is this sense of
security, this sense of distance. While a lot of people would be
apprehensive flying to Iraq or meandering around the back alleys of
Karachi...a lot of people don't have that (sense) for the Internet because
it is so readily available at their homes."

Individuals "should do what all of the other professionals in this field do.
Apply to the FBI, the military, the intelligence agencies, or work for a
contractor that's working for the government in these fields," Venzke said.


Copyright ©1995-2005 CNET Networks, Inc. All rights reserved.



You are a subscribed member of the infowarrior list. Visit
www.infowarrior.org for list information or to unsubscribe. This message
may be redistributed freely in its entirety. Any and all copyrights
appearing in list messages are maintained by their respective owners.

Reply via email to