Counter-Terrorism: Useful Advice For Potential Holy Warriors

Archives

June 13, 2015: ISIL (Islamic State in Iraq and the Levant) has been updating its online training manuals to make it easier for potential recruits who want to join either in an ISIL controlled area or as a holy warrior in another country, including where they now live. Among the useful information available is advice on how to hide the fact that they are Moslems while in a non-Moslem country. This is vital if the recruit is to avoid arrest while preparing to travel to an ISIL base. The advice covers essentials, like appearance, meaning no beard or traditional Islamic clothing, always praying in private, training inconspicuously (paintball is particularly useful) and not wearing military clothing. Women are advised to wear a colorful headscarf (as the black one marks you as hard core). Much useful advice is given on how to raise money illegally and how to get it to ISIL without getting caught.

Practical and proven information on obtaining or making weapons is given as well as emphasis on how important physical and weapons training is. Potential recruits are urged to get in shape and learn martial arts if possible. There is also a lot of practical information about how to transport weapons and other contraband in such a way that is not noticed or if there is a search the hidden items are not discovered. There is also a lot of information on how to detect if you are being watched and how to escape surveillance. This includes useful information on obtaining and using false ID.

Of course most police and intelligence agencies are aware of these techniques but ISIL reminds potential recruits that potential recruits who do not follow all this advice will keep the police busy while the clever and learned fellows remain less obvious, at least long enough to strike a blow in defense of Islam.

Since these documents first appeared (usually in printed on paper or even audio cassettes) in the 1990 the growing importance of electronic communications was noted. Thus recruits were warned about wiretaps and electronic intelligence. As more Moslems in Western nations got access to the Internet advice on how to handle that were also covered. Since 2001 more Moslem majority nations have gained access to the Internet and now a major part of the Islamic terrorist instruction manuals covers the benefits and dangers of this new media.

Potential recruits are urged to use available Internet privacy tools and techniques to avoid detection. Recruits are warned of the extensive monitoring of electronic media the “enemies of Islam” employ to catch actual or potential Holy Warriors. Over the last few years al Qaeda has learned how to keep their heads down on the Internet. Much information given on how to use of VPNs, encryption, and anonymity systems (like Tor) to hide identities and data to make it more difficult for intelligence agencies to monitor and track terrorist activity on the web. Using all this advice will not make terrorists invisible, just not as easy to monitor.

Since the defeat of the Iraqi al Qaeda in 2008 Islamic terror organizations learned the hard way that operating without these secrecy tools makes using the web openly (like they have to do for initial recruiting or some fund raising) very risky, especially for new recruits and donors. At the same time, the secrecy tools have made it easier for intel agencies to zero in on the really eager and dangerous terrorists (because they are better at hiding, which identifies them as hard core) and pay less attention to all the supporters of Islamic terrorism who are more inclined to talk about it than to actually take action. The web also remains a key source of “how to” documents for wannabe terrorists. Counter-terror organizations have had some success in “poisoning” these documents with subtle changes that will make bombs less effective or cause other problems to people using these documents to become more effective terrorists.

Islamic terrorists still have to pay attention to their web fans because these people are useful in counteracting the terrorists’ bad reputation within the Islamic community because of all the bad publicity created by all those Moslems killed by terror attacks. Another bit of unappetizing reality is the fate of so many Islamic terrorists, especially if they try to operate in the United States. There, the best you can hope for is a quick death. If you are really unlucky you get captured, prosecuted, and sent to a supermax prison for a life of isolation and not much else. While the growing number of terrorists serving long terms in Western prisons are hailed as heroes, it is bad for morale to see that number constantly growing. Getting put away like this is the worst thing that can happen to an Islamic fanatic who joins terrorist organizations to either improve their lives or die.

While it was initially believed that the Internet was a boon to Islamic terrorists that has not actually been the case. The main reason for this is that the Internet gives terrorists the illusion that they have a safe, secure form of communication. But there are many eavesdropping tools available to police that can detect this communication and the net result is the Internet has become a prime counter-terrorist weapon. New surveillance tools are developed all the time. Many senior Islamic terrorists deal with this by not using the Internet at all.

There are techniques terrorists can use to make their communications more secure, but most terrorists or supporters don't know about them or don't bother to use them. Things like leaving email as a draft, rather than sending it, or using encryption. But even techniques like these make your messages vulnerable to interception. In the end, any use of the Internet can be intercepted. Often this is accomplished with commercial software and hardware designed for network administration, not spying. While more and more terrorists and supporters are finding out about Internet security techniques, the monitoring capabilities of police and intel agencies also increases.

The general public, and many journalists, are unaware of this situation. Terrorists tend to be better informed about the dangers of using the Internet because so many of their cohorts have been taken down when their Internet communications were intercepted. But since Islamic terrorists tend to be rather too cocky or too confident because they are on a mission from God, many continue to employ the Internet despite the obvious dangers and look down on those to resort to secrecy tools.

One of the alleged great strengths of al Qaeda, after their Afghan bases were lost in 2001, was the dispersed nature of the organization. The problem with that was that most of these "dispersed" members were untrained in the need for OPSEC (Operational Security, things like not using the Internet for critical communications). The higher up the food chain you go, the less use of the Internet you encounter. At the very top people rely on human couriers, often to deliver memorized messages verbally. While the lower ranks of al Qaeda are entranced by the Internet and other communications technology, the senior people are terrified of it. Mostly, it's a matter of experience. See enough of your chums get caught, or killed, because of cell phone, email, or beeper use and you get a bit paranoid about electronic devices.

Often, counter-terrorism organizations allow the terrorist small fry to keep emailing and using their cell phones, just to monitor their "chatter" for useful bits of information. Out of many tiny pieces of data often comes a picture of what the leaders are up to and where they are. The Internet gives many terrorists the illusion that they are in touch, without realizing that the people at the other end have arrest warrants, not tickets to paradise.

In the face of all this potential recruits are urged to find trusted ISIL contacts and to verify that they are not intelligence agents. This often means meeting people at a local mosque or at the recommendation of a known fellow Moslem. Finally the advice indirectly addresses the biggest problem potential Islamic terrorist recruits and that is their tendency to act rashly and without thinking. Islamic terror groups have traditionally recruited from the shallow end of the gene pool but even the less bright recruits can be useful. Thus the advice to try and find someone who is more “experienced” (smarter) to help you get to ISIL controlled territory or to prepare for terror attacks where you are.

 

 


Article Archive

Counter-Terrorism: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close