Information Warfare: War of Wits on the Web

Archives

March 18, 2006: Terrorists and, other Internet based criminals, are becoming more aware that they are being pursued and observed on the web. Thus, to survive, they are becoming more sophisticated in their use of the web. This has forced investigators and intelligence agencies to stay competitive in order to keep up. For example, a common way for the bad guys to meet is via IRC (Internet Relay Chat), with password protected chat rooms set up in out of the way places so that meetings can be held and information exchanged. Investigators often get access to these locations, but are increasingly finding that the bad guys quickly discovering the true identity of the intruders, and shutting the chat room down. It seems the terrorists have learned to use standard web analysis tools to their advantage. For example, IP addresses (the "telephone number" like ID every Internet user is assigned while online) provide information on the general geographic location of the user. Terrorists will install a program that screens the IP addresses of chat room users, and shut down if they see an IP address from say, North America. To defeat this, agents have to fake their IP address, to make it look like their coming from Yemen, not Virginia. Another terrorist trick is to use only certain operating systems, screen resolution and browsers. All this information can be detected, and if a user does not show the right profile, you have an interloper and its time to shut down the site.

The Internet has been an excellent source of quality information on terrorist activities. Many terrorists, and their supporters, have been sloppy in their use of the web. Better prepared intelligence agents have been able to eavesdrop on a lot of the terrorist Internet activity. This has led to many arrests, and many aborted terrorist attacks. Another benefit is the fear it puts into terrorist Internet users. In many cases, terrorists have stopped using the Internet altogether, fearing whatever "magic" the evil CIA or NSA possesses on the web will inevitably lead to discovery. There is so much turnover among the Islamic terrorists, and so little control over training or communications, that there are always segments of the terrorist population who are online, and vulnerable.

 


Article Archive

Information Warfare: Current 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close