http://service.spiegel.de/cache/international/0,1518,340599,00.html

 


AL-QAIDA ON THE INTERNET

How Islamic Extremists Are Turning the Web into Terror.com

By Yassin Musharbash in Berlin

"Posted on an Islamist Internet site" is a phrase that often comes up
in connection with violent terror attacks in Iraq and elsewhere.
Groups often take credit for the crimes in Internet postings. But what
does it mean? The Internet, as it turns out, is vital to al-Qaida's
propaganda machine. Last week's "kidnapping" of a soldier doll shows why.

 



AP
The image, supposedly of a kidnapped American soldier, posted last
week on the Internet. It turned out to be a fake.
The message that terrorists have to communicate is not a complicated
one. Violence. Death. Hate. Clouds of smoke rising above a city
skyline, images of bloody death and destruction at the scene of a
suicide bombing, videos of kidnapped victims pleading for their lives
-- all are the currency used by terror to reach the world. Yet the
arsenal of terror would be incomplete without one further weapon --
one that allows terror groups to control the message they send out.
The weapon is the Internet.

Indeed, when Abu Musab al-Zarkawi -- Osama bin Laden's representative
of terror in Iraq -- wants to catch the eye or ear of the world, he
doesn't just rely on journalists who report on the bombs he sets off
or the attacks he perpetrates. The images his deadly assaults generate
sometimes need captions -- and al-Zarkawi wants to be the one to write
them. 

His cyber-pseudonym is "Abu Maisara al-Iraqi", and a number of times
daily, pictures or statements originating from Abu Maisara are posted
on the Web. He used to run a Web site himself, but that proved to be
more trouble than it was worth and is now offline. Instead, Abu
Maisara's messages reach the public eye quickly and reliably through
postings in a popular, Islamist forum -- from there, al-Zarkawi can be
sure that his musings will soon be in newspapers and on televisions
around the world.

Using the Internet to spread the message

Al-Zarkawi's method of spreading his message via the Internet follows
one of the basic rules of terrorism: It creates maximum effect with a
minimum of effort. Even the horrifying videos of hostage executions
follow this pattern. When al-Zarkawi or one of his followers murders
somebody before the running cameras, he is able to spread disgust,
fear and revulsion around the globe without investing much in the way
of planning or organization. The beheading of two Iraqis on a public
sidewalk as happened recently was, for shock value, just as effective
as a medium-sized attack somewhere in Iraq. Making sure the public
knows who was responsible for such a coup of terror is, for al-Zarkawi
and other terrorists, just as important as the act of violence itself.
The Internet is the preferred method. 



AP
The soldier Cody is produced by Dragon Models USA.
"Abu Maisara's" favored forum is called "ansarnet." But other sites,
including "al-Qala" and "Islah" are used by terrorists, who often use
the cites as a means of taking credit for terror attacks, execution
videos and terrorist-strategy papers. News agencies, international
secret service organizations and Arab speaking journalists scan such
sites a number of times each day; it is generally these three forums
that are meant when a report says a statement or document was found in
the Internet or "on an Islamist Web site." When something new is
posted, it becomes a news story almost immediately. 

One of the most recent examples of this propaganda machinery in action
was last Tuesday. The following message was posted on the Qala Web
site: "Our heroic Mujahedeen of the Jihad unit in Iraq has succeeded
in kidnapping the US soldier John Adam." Attached was a photograph
showing a US soldier sitting on the ground, his legs stretched out
before him, hands tied behind him and a rifle pointed at his head. He
would be killed within 72 hours, the terrorist posting threatened, if
the US did not immediately release all the prisoners being held by the
army. 

At first glance, the claim of responsibility and the attached picture
had all of the standard elements of these sites: In the background of
the picture was an Islamic creed printed in Arabic and the letter was
written in the style one has come to expect. 

Bloggers smelled a rat

But a closer look revealed that the terror announcement was false.
Attentive bloggers made the discovery and journalists were forced to
admit they jumped at the story too quickly and failed to catch a fake.
"Something about that picture doesn't look right. Not sure what
though," wrote one participant in the discussion forum of the
conservative anti-terror Web site "homelandsecurityus.com" immediately
after the publication of the picture. "It looks like they superimposed
the man's head on someone else's body," agreed a second participant.
They were both right and there is now little doubt that the picture of
"John Adam" is actually a doll from the toy manufacturer Dragon Models
USA. A further indication: The US army has said it is not missing
anybody by the name of John Adam. 



REUTERS
Blindfolded US hostage Paul Johnson, who was later killed, from summer
of 2004. Posted on the Internet.
The fake in this case was relatively easy to recognize -- a picture of
a doll instead of a real human is a difficult sell -- and the news
agencies quickly reacted by retracting the story of the kidnapping.
But there were a number of other indications that something wasn't
quite right with the story. 

It is difficult to imitate the material and style of Islamist terror
groups. Al-Qaida and Co. have managed to achieve a high degree of
professionalism in the realm of publicity. They regularly publish an
online magazine dedicated to the waging of holy war, for example.
Likewise, strategy papers are occasionally posted. They know how best
to use the Internet and how best to reach their followers, many of
whom access al-Qaida messages from Internet cafes across the Arab
world. They sometimes urge followers to use the Internet for
disinformation as well. Last year, for example, a message was posted
on a Saudi al-Qaida site urging terrorists to establish as many
pseudo-organizations as possible with the goal of confusing the West
and its secret services.

Authenticity is key

But one lesson the terror groups have learned well is that media
interest generated by an Internet posting and the ensuing publicity is
only possible if observers and reporters can be relatively certain of
a given posting's authenticity. And because such postings have become
vital to the terrorists' cause, they attach great value to remaining
easily and unmistakably recognizable. Distinctive letterhead is often
used and characteristic sayings are frequently spelled out using
recognizable fonts. The Saudi al-Qaida group's trademark on its
communiqu�s is a logo saying "the voice of the Jihad" and often
includes a white horse logo as well. Another strategy is that used by
al-Zarkawi. Postings in his name always come from the same forum
username -- Abu Maisara al-Iraqi -- which, because the sites he uses
require user registration, makes it difficult for others to hijack his
identity. 

Of course while Internet messages have a role to play, it's the videos
that have the most sweeping effect. Not only can they be used to prove
that a murder has actually taken place, but images of hostages
pleading for their lives have a huge effect on the public -- a
terrorist's message of fear and violence can immediately reach a wide
audience. The strategy worked almost to perfection with the autumn
kidnapping of the British aid worker Margaret Hassan.



An execution video from Iraq.
One final tactic used by terrorists is to photograph passports and
other personal documents of their victims. Pictures of a business card
and passport belonging to Paul Marshal Johnson in connection with his
filmed decapitation in summer 2004 -- the first such video posted on
the Web -- went a long way toward proving its authenticity. Al-Zarkawi
and the terror group "Jaish Ansar al-Sunna" likewise use this strategy
to establish proof of their claims. 

None of these pertinent elements were part of last Tuesday's "John
Adam" claim. No proof of his identity was offered, and his uniform was
suspiciously clean. In addition, the posting was signed by a group
calling itself Mujahedeen Units Iraq. A group with the exact same
signature took responsibility for kidnapping three Japanese and a
Brazilian last year. (The Japanese were later let go but the fate of
the Brazilian remains uncertain.) But the name Mujahedeen Units Iraq
is more interchangeable than the uninitiated might think: Mujahedeen
Units is used for Islamist fighters the world over. Those taking
responsibility for Tuesday's "kidnapping" therefore seemed to want to
conceal, rather than flaunt their identities. 

For this reason, a number of terror experts discarded the document the
moment they saw it. Too bad the news media wasn't as careful. 







------------------------ Yahoo! Groups Sponsor --------------------~--> 
Give underprivileged students the materials they need to learn. 
Bring education to life by funding a specific classroom project.
http://us.click.yahoo.com/FHLuJD/_WnJAA/cUmLAA/TySplB/TM
--------------------------------------------------------------------~-> 

--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 


Reply via email to