[iwar] [fc:Al.Qaeda.uses.the.Web.as.a.communications.network]

From: Fred Cohen (fc@all.net)
Date: 2002-06-16 16:42:09


Return-Path: <sentto-279987-4837-1024270906-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 16 Jun 2002 16:43:09 -0700 (PDT)
Received: (qmail 29638 invoked by uid 510); 16 Jun 2002 23:41:53 -0000
Received: from n17.grp.scd.yahoo.com (66.218.66.72) by all.net with SMTP; 16 Jun 2002 23:41:53 -0000
X-eGroups-Return: sentto-279987-4837-1024270906-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.193] by n17.grp.scd.yahoo.com with NNFMP; 16 Jun 2002 23:41:46 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 16 Jun 2002 23:41:45 -0000
Received: (qmail 81902 invoked from network); 16 Jun 2002 23:41:44 -0000
Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 16 Jun 2002 23:41:44 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 16 Jun 2002 23:41:44 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5GNg9q12209 for iwar@onelist.com; Sun, 16 Jun 2002 16:42:09 -0700
Message-Id: <200206162342.g5GNg9q12209@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 16 Jun 2002 16:42:09 -0700 (PDT)
Subject: [iwar] [fc:Al.Qaeda.uses.the.Web.as.a.communications.network]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: ***

cartome.org
13 June 2002

Source: http://www.msnbc.com/news/764107.asp 

Hiding (and Seeking) Messages on the Web 
Al Qaeda uses the Web as a communications network 

By Colin Soloway, Rod Nordland and Barbie Nadeau
NEWSWEEK 

June 17 issue - One day last October, an intelligence-community analyst noticed 
something strange about a radical Islamist Web site she had been monitoring for several 
months. A previously open, innocuous part of the site was suddenly blocked. She checked 
her notes, found the old address for the link and typed it in-to find an otherwise 
empty page commanding in Arabic, MISSIONARIES ATTACK! 
Other "hidden" pages on the site included seemingly nonsensical phrases and quotations 
from the Qur'an-coded instructions for Qaeda operatives and their supporters. U.S. 
intelligence discovered Al Qaeda uses the Web as a communications network. Analysts 
believe Al Qaeda uses prearranged phrases and symbols to direct its agents. An icon 
of an AK-47 can appear next to a photo of Osama bin Laden facing one direction one 
day, and another direction the next. Colors of icons can change as well. Messages 
can be hidden on pages inside sites with no links to them, or placed openly in chat 
rooms. The messages and patterns of symbols are given to analysts at the CIA and 
National Security Agency to decipher.
The operators of these sites, working from Pakistan, Malaysia, Indonesia, the gulf 
states and Britain, are sophisticated in their computer tradecraft. "These guys are 
no fools," says an intelligence source.

Much of the intelligence from the sites comes from "traffic analysis." Analysts 
say they have seen "surges" in traffic since 9-11, in many cases prior to attempted 
attacks. "There was a surge about the time [shoe-bomber] Richard Reid got on the 
plane," says one analyst. "We would get surges, and then you would hear about people 
who were stopped." 

For more direct communication, Al Qaeda uses commercially available encryption software 
or hides messages inside graphics files by a process known as steganography. "They 
are giving strategic direction to their supporters by using the Web [and] using [cryptographic 
software] to transmit e-mail messages," says a British intelligence source.

While encrypted communications keep the content of messages secret, they attract 
the attention of intelligence services, which track the messages to their source 
and recipient; meanwhile, much of the Web communications are hidden in the mass of 
unrelated "chatter" on radical Web sites. "The genius of this method is that they 
are hiding in plain sight," says the analyst. "It's three jigsaw puzzles mixed up 
in one box, when you're only interested in one of them."
Some of the most valuable intelligence gleaned from the sites has been the connection 
between Islamic charities and Qaeda fund-raising operations. Analysts found the same 
bank-account numbers listed in Islamic humanitarian appeals on sites raising funds 
for jihad against the enemies of Islam. Several U.S.-based Islamic "charities" have 
been shut down thanks to the analysts' discovery of this fund-raising scam. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT