http://www.cio.in/news/viewArticle/ARTICLEID=4128803
 
Al-Qaeda Group's Encryption Software Stronger   

Al-Qaeda support group Al-Ekhlaas has improved its encryption software.
Mujahideen Secrets 2 has added the ability to encrypt chat communications,
says Paul Henry, VP of technology evangelism at Secure Computing.
  <http://www.cio.in/Images/Graphics/spacer.gif>        

Henry says he got the software through a contact in the intelligence
community. The home-grown Mujahideen Secrets 2 encryption software, based on
open source RSA code, can encrypt binary files so they can be posted on
ASCII-text-based bulletin boards and Web sites.

"They have improved the operation of the graphical user interface and it
will now encrypt chat communications," says Henry, who adds that the Arabic
translation suggests the software is encouraged for use by Al-Ekhlaas
members to evade U.S. government efforts at surveillance.

Tampa-based ISP NOC4Hosts and Rochester, Minn.,-based SiteGenesis in January
found out their operations were being used to host the Al-Ekhlaas Web sites
where Mujahideen Secrets 2 can be found. Both hosting firms pulled the plug
on the Web sites after receiving specific technical information about the
content.

This week another Web hosting company, CrystalTech Web Hosting in Phoenix,
shut down sites linked to the Al Qaeda-link support group.

"As soon as we found out, we brought the IP sites down," says Bob Cichon,
president of CrystalTech Web hosting, who blamed a reseller for it
happening. "We're a very large host and it's hard to track everything."

In its analysis of Mujahideen Secrets 2, Secure Computing has noticed that
the software appears to violate copyright law.

"Typically with open source, they still require a copyright notification,"
Henry says. "There's no copyright notification whatsoever here."

Another notable thing is that the public-key signature in Mujahideen Secrets
2 leaves a tell-tale sign that the Al-Ekhlaas home-rolled software produced
it. The encryption itself is strong at up to a 2,048-bit key length, and
like the previous version, provides e-mail and file encryption using
public-key certificates.

 



[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to