Blogs of War

Hizballah Cavalcade

Internet Haganah



Kremlin Trolls

Making Sense of Jihad

Selected Wisdom

Views from the Occident


American Terrorists

Anwar Awlaki

Al Qaeda


American Al Qaeda Members

Inspire Magazine

Revolution Muslim


News, analysis and primary source documents on terrorism, extremism and national security.

Saturday, February 2, 2008

Jihadists Add Strong Encryption To Terrorist Toolbox

By J.M. Berger

Al Qaeda-linked militants have rolled out improved security software that provides above-military-grade encryption for terrorists communicating online.

A copy of the software, Mujahideen Secrets 2, was obtained by INTELWIRE and forwarded to Paul A. Henry, Vice President for Technology Evangelism at Secure Computing (, for analysis.

According to Henry, the software is a significant upgrade to an earlier version program used by jihadists. The new software can be used to encrypt chat sessions, as well as e-mail, Web forum postings and electronic communications.

The software can easily be loaded on a USB stick, according to Henry, allowing militants to encrypt communications from otherwise insecure locations such as Internet cafes.

The software is extremely easy to use, Henry said. This is a significant factor, since the computer skills (and general intelligence) of al Qaeda operatives run the gamut from highly advanced to embarrassingly inadequate.

On the higher end of that spectrum, Al Qaeda has traditionally employed fairly sophisticated computer techniques, but until recently, its implementation has generally lagged industry standards.

During the early and mid-1990s, terrorists were early adopters of laptop computers, PDAs, online publishing and digital file archiving. But while their computer habits were savvy, they were usually less than professional-level.

For instance, a laptop computer recovered from Ramzi Yousef in 1995 contained deleted files that were able to be recovered by forensic analysis. Yousef was sophisticated enough to use passwords, but not strong encryption. He removed old and sensitive files, but he didn't know to run a file shredder.

With the new software, Yousef's hard drive would have been a much tougher nut to crack. In addition to its 2,048-bit encryption, Mujahideen Secrets 2 includes a shredder and file and folder encryption.

The move to stronger encryption may have been prompted by security breaches on jihadist Web sites back in September, when the U.S. government and counterterrorism analysts obtained copies of an Osama bin Laden video release before it was widely introduced on the Web. At the time, several key jihadist sites temporarily suspended operations to address the breach.

However, it's unlikely the bulk of those security issues will be solved by strong encryption. While the debut of the software represents a significant and dangerous new development for counterterrorism officials, encryption and straight-up network security do not appear to have been the key factors in earlier breaches. The best encryption in the world won't help if you give away your passwords and encryption keys.

Mujahideen Secrets 2 appears to have been assembled and compiled from both open-source and copyrighted material, according to Henry. The software may be detectable when operating over networks or on targeted machines. This could be useful for counterterrorism professionals tracking terrorist and militant Web usage.

Labels: ,

Views expressed on INTELWIRE are those of the author alone.



Tweets referencing this post:



ISIS: The State of Terror, by Jessica Stern and J.M. BergerJessica Stern and J.M. Berger co-author the forthcoming book, "ISIS: The State of Terror," from Ecco, an imprint of HarperCollins. The book, which will debut in early 2015, will examine the rise of the Islamic State in Iraq and Syria, its potential fall, how it is transforming the nature of extremist movements, and how we should evaluate the threat it presents. Jessica Stern is a Harvard lecturer on terrorism and the author of the seminal text Terror in the Name of God: Why Religious Militants Kill. J.M. Berger is author of the definitive book on American jihadists, Jihad Joe: Americans Who Go to War in the Name of Islam, a frequent contributor to Foreign Policy, and editor of

Pre-order the book now | Pre-order Kindle version


Jihad Joe by J.M. BergerJihad Joe: Americans Who Go To War In The Name Of Islam, the new book by INTELWIRE's J.M. Berger, is now available in both Kindle and hardcover editions. Order today!

Jihad Joe is the first comprehensive history of the American jihadist movement, from 1979 through the present. Click here to read more about the critical acclaim Jihad Joe has earned so far, including from the New York Times, Publisher's Weekly, and many more.


Newest posts!

Why 'Islamic Terrorists' And Not 'Christian Terror...

FBI's Deadbeat Tendencies Step Up To Protect Civil...

I'm Sorry, But I Want The Mug

Bizarre Piano Soundtrack on New Bin Laden Tape

Bhutto Update: Pakistan Blames Lashkar-E-Jhangvi

Al Qaeda 1.0 Shows Its Teeth

Full Text: J. Edgar Hoover's Plan To Arrest, Detai...

Fort Dix Six Carry Out al Qaeda Recruitment Drive ...

Suspect Gives First Person Account of CIA Renditio...

Terry Nichols: Justice Department Wanted Me To Lie...


New York Pipe Bomb Suspect Linked to Revolution Muslim

The Utility of Lone Wolves

Interview with Online Jihadist Abu Suleiman Al Nasser

A Way Forward for CVE: The Five Ds

How Terrorists Use The Internet: Just Like You

PATCON: The FBI's Secret War on the Militia Movement

Interview About Jihad With Controversial Cleric Bilal Philips

Forgeries on the Jihadist Forums

U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki

State Department Secretly Met With Followers of Blind Sheikh

State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995

FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs

Gaza Flotilla Official Was Foreign Fighter in Bosnia War

U.S. Had 'High Confidence' Of UBL Attack In June 2001

Behind the Handshake: The Rumsfeld-Saddam Meeting