Intelligence: A Christmas Gift From al Qaeda

Archives

p>

January 21, 2008: Western intelligence agencies could not believe their good fortune, when al Qaeda came through with an unbelievable Christmas present. Over the last month, the brains behind al Qaeda, Ayman al Zawahiri (the number two guy), made several announcements encouraging terrorism fans to make greater use of the Internet. This includes downloading al Qaeda ringtones for their cell phones, as well as al Qaeda approved videos. This last bit involves files as large as 120 megabytes. Al Zawahiri also encouraged followers to regularly download new pronouncements and terrorism "how to" documents.

 

It's no secret that intelligence and police agencies the world over monitor Internet activity by actual, or wannabe, Islamic terrorists. Many terror plots have been foiled because of this surveillance. But the new al Zawahiri announcements made the job so much easier. While some al Qaeda Internet users know how to cover their tracks, or at least make it more difficult to be tracked, most do not. These are the newbies that for intelligence experts find easier to work and exploit. And the little guys, if they are serious, eventually lead you to the big fish.

 

What was al Zawahiri thinking? No one knows. Al Zawahiri is a big fan of the Internet, but he is apparently less familiar with how many tools intelligence agencies have available for tracking Internet users, what they are doing, and who they are doing it with. Some of these tools are classified, but many are available to corporate users (for protecting secrets, or controlling misbehavior by employees.) The communications companies that run the Internet also have specialized tools to track, and identify, data that is moving through their network. The terrorists don't have a clue, but the people tracking them now have a lot more.

 

There's also a certain irony to all this. In several countries, the local Islamic radicals persecute users of the Internet, as well as those who use stuff like ring tones. At the same time, al Qaeda just released the second version of its custom encryption software (Mujahideen Secrets 2), which makes it easier for intel agencies to spot terrorist email. One must never expect logic and consistency from this crowd, or much respect for Western code breaking capabilities.

 

 

 

Article Archive

Intelligence: Current 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad Help Keep Us Online!
 

Help Keep Us Afloat! Go to other sites on the World Wide Web and they look like the a mad marketer has gained control of them. Lots of ads and little content! Ad revenues are down for everyone! We don’t want to follow the crowd. But here is the deal we cannot keep our site relative ad free without your support. Each month we need your subscriptions or contributions plus what meager ad revenue we do receive to stay in business. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..

Drake appreciates any help you can give him.

Subscribe   Contribute   Close