Rantburg

Today's Front Page   View All of Thu 05/29/2025 View Wed 05/28/2025 View Tue 05/27/2025 View Mon 05/26/2025 View Sun 05/25/2025 View Sat 05/24/2025 View Fri 05/23/2025
2004-08-12 Terror Networks
Internet is a virtual classroom for al-Qaeda supporters
Al Qaeda has turned the Internet into a virtual classroom for its supporters around the world after U.S. troops drove Osama bin Laden's followers from training bases in Afghanistan, security experts say. The Internet played a key role in al Qaeda's planning and coordinating for the Sept. 11, 2001, attacks on U.S. landmarks. In the years since, the Web has taken on an even greater role in recruiting, spreading fear and propaganda, and executing attacks, according to the security experts. "The Internet is even more dangerous than it was in the past," said Rita Katz, director of the SITE Institute, in a telephone interview from Washington.

"Whatever you had in Afghanistan in the training camps, you have today on the Internet," said Katz, whose nonprofit organization tracks militant Islamic sites and counts the U.S. government and major U.S. corporations among its clients. "Some of the manuals (posted on the Web) are the actual manuals from Afghanistan ... some written by Saif al-Adel, one of the most wanted military commanders of (Al Qaeda) who has not been captured. He's on the FBI most-wanted list," she said. A recent posting detailed how to use a mobile phone in a bomb attack, a method used to kill 191 people in March in coordinated blasts on Madrid commuter trains. "It was step-by-step, and to make sure you get the picture they had a video to demonstrate it. It's scary," Katz said.

A month before a wave of kidnappings in Iraq and Saudi Arabia, she said, manuals appeared on Jihad Web sites with precise instructions on how to seize hostages. One was posted by Abu Hajer, who later kidnapped U.S. engineer Paul Johnson and assassinated him, she said. "I was asking myself, 'Why are we getting so many warnings?' Maybe the answer is that this way they communicate with other members, saying look, this is our agenda."

Continued from Page 2



Jonathan Schanzer, research fellow at the Washington Institute, said: "After 9/11, I don’t think Al Qaeda can be seen as much as an organization as a movement, and that sharing of information among this movement is incredibly critical. It’s increasingly crucial, not so much for recruitment but in terms of communications, sending encrypted messages, coded messages, maintaining data bases, etc."

Gabriel Weimann, senior fellow with the Washington-based U.S. Institute of Peace, said the Internet threat had been widely misunderstood due to a misplaced focus on the "exaggerated threat of cyber attacks." It is the use of the Internet for more routine purposes -- not attacks on the network itself -- that is worrying. In a 6-year-old study of militants’ use of the Internet, Weimann’s group details routine ways militants use the Web, including psychological warfare, propaganda, fund-raising, recruitment, data mining and coordinating attacks.

The Internet’s role was highlighted this month with news of the secret arrest in July of Mohammad Naeem Noor Khan, a computer expert used by Pakistan to track down al Qaeda militants in Britain and America. Security agencies are developing other ways to pierce Al Qaeda’s veil of secrecy, including electronic surveillance of communications and secret messages embedded in apparently innocuous Web sites. But Western intelligence must increase the resources devoted to studying the network and be far more flexible if it is to take the cyber trail to track down militants, analysts say. "I think it’s going to take them a while to be able to monitor the Internet in a way that will enable us to be on the right trail before something happens," Katz said.

Schanzer welcomed improved monitoring of "chatter" on militant Web sites, but disinformation and small-time braggers masked the tiny number of genuine operatives planning attacks. "The question is not so much whether we have the technology, but whether intelligence gathering organizations have the flexibility ... are able to adapt as quickly as Al Qaeda."
Posted by Dan Darling 2004-08-12 12:46:55 PM|| || Front Page|| [11140 views since 2007-05-07]  Top

#1 Remember "The Anarchist Cookbook", by person or persons unknown? Well, mysteriously, in the later editions, many chemical names were replaced with their German equivalents.
Guess what happens if you call up a chemical supply warehouse and ask for a large amount of certain chemicals using their German names?
Also, several of the recipes don't quite give you what you are hoping for--or do, just a lot sooner than you would like.

The Internet is like a library. There are lots of good books in it, and a lot of poorly written pulp. You have to take the good with the bad.
Posted by Anonymoose 2004-08-12 5:02:39 PM||   2004-08-12 5:02:39 PM|| Front Page Top

#2 goddamit! speking internet my goddamer boss is tell us today they are look at all places we are visit this wek and he is say rantburg inaproepriat. he is not mention any other blogs im visit just rantburg. this is goddam piss me off!
Posted by muck4doo 2004-08-12 5:55:05 PM|| [http://meatismurder.blogspot.com/]  2004-08-12 5:55:05 PM|| Front Page Top

#3 did he also mention unsatisfactory typing - not enough words per minute? no? then you're OK, Mucky, my man!
Posted by Frank G  2004-08-12 5:57:56 PM||   2004-08-12 5:57:56 PM|| Front Page Top

#4 Well, when ya use the company's resources, don't be surprised if at some point they decide to place limits on its usage.
Posted by Bomb-a-rama 2004-08-12 5:58:51 PM||   2004-08-12 5:58:51 PM|| Front Page Top

#5 Go underground. "Edit" your history and temp files.
Posted by 2% 2004-08-12 6:04:06 PM||   2004-08-12 6:04:06 PM|| Front Page Top

#6 bar the main problem was new peples they are hire kep playing yahoo games. so im can understand that. he is just want us lay low while on usage and isnt mind what we are do on free time. what ima not like is he is single out rantburg as an inapropate web site to visit. he isnt mention rest. that what is piss me off!
Posted by muck4doo 2004-08-12 6:06:55 PM|| [http://meatismurder.blogspot.com/]  2004-08-12 6:06:55 PM|| Front Page Top

#7 im going have ta lern do that.
Posted by muck4doo 2004-08-12 6:10:16 PM|| [http://meatismurder.blogspot.com/]  2004-08-12 6:10:16 PM|| Front Page Top

#8 If Al Qaeda relies so much on internet information I wouldn't be surprised if the CIA and the Mossad ran a few websites with bomb recipes in Arabic... with little errors...

Lost in translation, so to speak...
Posted by True German Ally 2004-08-12 6:11:26 PM||   2004-08-12 6:11:26 PM|| Front Page Top

#9 Muck...then you should go to the jihadi sites from work, then report back to RB from home...
Posted by Seafarious  2004-08-12 6:11:32 PM||   2004-08-12 6:11:32 PM|| Front Page Top

#10 TGA...anyone here know what the arabic for "blue wire connects to the red green wire?"
Posted by Seafarious  2004-08-12 6:13:07 PM||   2004-08-12 6:13:07 PM|| Front Page Top

#11 Seafarious, if we let Mucky write the recipes the jihadis will be busy for years :-)
Posted by True German Ally 2004-08-12 6:15:49 PM||   2004-08-12 6:15:49 PM|| Front Page Top

#12 Muck --> My Computer/C:/Documents and Settings/muck4doo/Local Settings

At least thats the path I've always used.

Just in case you dont know where to go. Ive been surprised by many here on the job that have no idea about this sort of stuff.
Posted by 2% 2004-08-12 6:25:54 PM||   2004-08-12 6:25:54 PM|| Front Page Top

#13 2% count me as one of em peples like that. thanks i am save that somewhere and try it tomorow. thanks. :)
Posted by muck4doo 2004-08-12 6:31:18 PM|| [http://meatismurder.blogspot.com/]  2004-08-12 6:31:18 PM|| Front Page Top

#14 Editing your settings won't do jack if the network has a proxy that tracks usage.

Of course, often the "inappropriate" site lists are random or oddly skewed. For example, my current client blocks Daniel Pipe's site and a site called fxhome.com, which is the home site of a small video-effects software company.
Posted by Robert Crawford  2004-08-12 6:32:28 PM|| [http://www.kloognome.com/]  2004-08-12 6:32:28 PM|| Front Page Top

#15 yep - most IT staff has the ability to completely track usage. I'm constantly using unattended fellow worker's computers to keep my RB usage below the "high stakeout" level LOL
Posted by Frank G  2004-08-12 6:41:58 PM||   2004-08-12 6:41:58 PM|| Front Page Top

#16 Mucks, tell boss no:1 to take favourite MSM rag, roll it up, light it and put it up his arse.

Rantburg Rules
Posted by rhodesiafever 2004-08-12 8:51:35 PM||   2004-08-12 8:51:35 PM|| Front Page Top

#17 Mucky, be sure to remember "arse." Ass is only if he has a favourite quadroped, and the results would certainly not be appropriate for the office ;-)
Posted by trailing wife 2004-08-12 11:03:22 PM||   2004-08-12 11:03:22 PM|| Front Page Top

#18 TW!! I'm shocked! I though you were better than us? ;-)
Posted by Frank G  2004-08-12 11:08:26 PM||   2004-08-12 11:08:26 PM|| Front Page Top

18:33 Frank G
18:33 badanov
18:26 Hellfish
18:23 Hellfish
17:40 swksvolFF
17:34 Ebbuger Whuque4103
17:30 Ebbuger Whuque4103
17:02 Melancholic
16:27 Gravilet Snanter4154
16:20 Chaise Speaking for Boskone7897
16:02 Skidmark
16:01 Skidmark
15:46 Skidmark
15:41 Skidmark
15:37 swksvolFF
15:36 Skidmark
15:34 Skidmark
15:27 Skidmark
14:48 NoMoreBS
14:31 NoMoreBS
14:16 NoMoreBS
14:15 NoMoreBS
14:04 swksvolFF
13:47 Regular joe









Paypal:
Google
Search WWW Search rantburg.com