A Christmas Gift From al Qaeda


http://www.strategypage.com/htmw/htintel/articles/20080121.aspx

January 21, 2008: Western intelligence agencies could not believe their good
fortune, when al Qaeda came through with an unbelievable Christmas present.
Over the last month, the brains behind al Qaeda, Ayman al Zawahiri (the
number two guy), made several announcements encouraging terrorism fans to
make greater use of the Internet. This includes downloading al Qaeda
ringtones for their cell phones, as well as al Qaeda approved videos. This
last bit involves files as large as 120 megabytes. Al Zawahiri also
encouraged followers to regularly download new pronouncements and terrorism
"how to" documents.   

It's no secret that intelligence and police agencies the world over monitor
Internet activity by actual, or wannabe, Islamic terrorists. Many terror
plots have been foiled because of this surveillance. But the new al Zawahiri
announcements made the job so much easier. While some al Qaeda Internet
users know how to cover their tracks, or at least make it more difficult to
be tracked, most do not. These are the newbies that for intelligence experts
find easier to work and exploit. And the little guys, if they are serious,
eventually lead you to the big fish.   

What was al Zawahiri thinking? No one knows. Al Zawahiri is a big fan of the
Internet, but he is apparently less familiar with how many tools
intelligence agencies have available for tracking Internet users, what they
are doing, and who they are doing it with. Some of these tools are
classified, but many are available to corporate users (for protecting
secrets, or controlling misbehavior by employees.) The communications
companies that run the Internet also have specialized tools to track, and
identify, data that is moving through their network. The terrorists don't
have a clue, but the people tracking them now have a lot more.   

There's also a certain irony to all this. In several countries, the local
Islamic radicals persecute users of the Internet, as well as those who use
stuff like ring tones. At the same time, al Qaeda just released the second
version of its custom encryption software (Mujahideen Secrets 2), which
makes it easier for intel agencies to spot terrorist email. One must never
expect logic and consistency from this crowd, or much respect for Western
code breaking capabilities. 

 
<http://www.nytimes.com/2008/01/21/world/europe/21spain.html?ref=europe&page
wanted=print> 

(F)AIR USE NOTICE: All original content and/or articles and graphics in this
message are copyrighted, unless specifically noted otherwise. All rights to
these copyrighted items are reserved. Articles and graphics have been placed
within for educational and discussion purposes only, in compliance with
"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.
The principle of "Fair Use" was established as law by Section 107 of The
Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain
permission or pay royalties for the use of previously copyrighted materials
if the purposes of display include "criticism, comment, news reporting,
teaching, scholarship, and research." Section 107 establishes four criteria
for determining whether the use of a work in any particular case qualifies
as a "fair use". A work used does not necessarily have to satisfy all four
criteria to qualify as an instance of "fair use". Rather, "fair use" is
determined by the overall extent to which the cited work does or does not
substantially satisfy the criteria in their totality. If you wish to use
copyrighted material for purposes of your own that go beyond 'fair use,' you
must obtain permission from the copyright owner. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 

THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS
PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 


[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to