-Caveat Lector-

Hi All - A new wave of "ani-Internet" disinformation stories are starting to
appear in the "news".  The version below is put out by NATO/USA intelligence
agencies.  Query: Is their function to set up a "terrorist" crackdown on
Internet freedome of expression/information?

Alfred Webre
EcoNews Service, Vancouver, BC
http://www.ecologynews.com
=====
 Tuesday February 6 3:09 PM ET
       Web Sites Act As Host for Extremist
       Plots

                             By Sue Pleming

                             WASHINGTON (Reuters) - Extremist
                             groups, including Saudi dissident Osama
                             bin Laden (news - web sites)'s network,
                             are using popular web sites to post
                             encrypted messages to their agents
                             plotting guerrilla activities, security
 sources
                             said on Tuesday.

       The Internet has become the medium of choice among many
       guerrilla groups to pass on hidden messages, replacing the
       classified columns in newspapers that Cold War-era spies used to
       deliver their secrets.

       ``This is warfare on the cheap and very easy to activate,'' said
       Yonah Alexander, head of the International Center for Terrorism
       Studies at the Potomac Institute for Policy Studies.

       Internet bulletin boards carrying pornographic and sports
       information -- which get huge numbers of ``hits'' -- are among the

       most popular hosts for extremist groups such as bin Laden's, said
       cyber-intelligence expert Ben Venzke.

       Bin Laden, a dissident Saudi businessman, has been indicted for
       the 1998 bombing of two U.S. embassies in East Africa and has
       been named as a possible suspect behind last fall's bombing of the

       USS Cole destroyer in Yemen. Four alleged bin Laden associates
       went on trial Monday in federal court in New York for the embassy
       bombings.

       USA Today newspaper reported on Tuesday that bin Laden began
       using encryption five years ago, but recently increased its use
 after
       U.S. officials revealed they were tapping his satellite telephone
 calls
       from Afghanistan, where he lives.

       Busy Bulletin Boards Are Popular Target

       Venzke said just as the recipient reading a coded classified ad
       would know what to look for, a secret message could be
       embedded, or encrypted, in an image seen by millions on an
       Internet bulletin board.

       He cited the example of a pornographic picture labeled 'blond
       bombshell' posted on an Internet bulletin board which would
       probably be downloaded by thousands of users who were unaware
       of a coded message ``hidden'' in the existing image.

       ``The cell (guerrilla), though, will download that image, know
 what
       program to run to extract it, what encryption software to use to
       decrypt it and then will have that information,'' said Venzke,
 director
       of intelligence, special projects, at iDefense cyber-intelligence
       company in Virginia.

       Venzke declined to name sites where material is being hidden but
       said any bulletin board or public forum that generated lots of
 traffic
       was a target.

       ``Because it's done on a heavily-used public bulletin board, it's
       extremely challenging and difficult to track,'' he added.

       Security experts said some messages are scrambled using free
       encryption programs set up by groups that advocate privacy on the
       Internet, which are then decrypted using a code known only by the
       recipient and sender.

       Cia Worried About Use Of Internet

       One U.S. security official said the authorities were extremely
       worried about the use of the Internet by extremist groups and that

       this was an area being watched very closely.

       In testimony to Congress last year, the CIA (news - web sites)'s
       information operations issue manager, John Serabian, said Middle
       East groups such as Hizbollah, Hamas and bin Laden's, were using
       computerized files, email, and encryption to support their
       organizations.

       ``We also recognize that cyber tools offer them new, low-cost,
 easily
       hidden means to inflict damage. Terrorists and extremists already
       use the Internet to communicate, to raise funds, recruit, and
 gather
       intelligence,'' he said.

       CIA director George Tenet also addressed the issue in a closed
       hearing last year when he referred to millions of potential
       ``information warriors.''

       Extremist groups now routinely send their operatives for training
 on
       how to manipulate the Internet for plotting attacks, security
 sources
       said.

       ``Some groups are sending their people to study computer
       engineering. What is of grave concern here is the motivation
 behind
       these groups and their capability,'' said Alexander.

       Alexander suggested that the government should devote more
       attention to fighting this problem, which he said was becoming
       more sophisticated by the day.

_________
EcoNews Service - Always online for Ecology, Consciousness & Universe
Exopolitics.
EcoNews http://www.ecologynews.com/
Prague  http://mujweb.cz/www/ecologynews/
mailto:[EMAIL PROTECTED]/Vancouver, BC V6M 1V8

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to