MENU

HOME

DAILY BRIEF

JIHAD JOE

SOURCEBOOKS

J.M. BERGER

RECENT WORK

MULTIFACETED MEDIA GROUP

LINKS

Blogs of War

Flashpoint

Gunpowder & Lead

Internet Haganah

Jihadology

Jihadica

Long War Journal

Making Sense of Jihad

Registan

Selected Wisdom

Views from the Occident

Waq-Al-Waq

TAGS

American Terrorists

Anwar Awlaki

Al Qaeda

AQAP

American Al Qaeda Members

Inspire Magazine

Revolution Muslim

OKBOMB


News, analysis and primary source documents on terrorism, extremism and national security.


Saturday, February 2, 2008
 

Jihadists Add Strong Encryption To Terrorist Toolbox

By J.M. Berger
INTELWIRE.com


Al Qaeda-linked militants have rolled out improved security software that provides above-military-grade encryption for terrorists communicating online.

A copy of the software, Mujahideen Secrets 2, was obtained by INTELWIRE and forwarded to Paul A. Henry, Vice President for Technology Evangelism at Secure Computing (www.securecomputing.com), for analysis.

According to Henry, the software is a significant upgrade to an earlier version program used by jihadists. The new software can be used to encrypt chat sessions, as well as e-mail, Web forum postings and electronic communications.

The software can easily be loaded on a USB stick, according to Henry, allowing militants to encrypt communications from otherwise insecure locations such as Internet cafes.

The software is extremely easy to use, Henry said. This is a significant factor, since the computer skills (and general intelligence) of al Qaeda operatives run the gamut from highly advanced to embarrassingly inadequate.

On the higher end of that spectrum, Al Qaeda has traditionally employed fairly sophisticated computer techniques, but until recently, its implementation has generally lagged industry standards.

During the early and mid-1990s, terrorists were early adopters of laptop computers, PDAs, online publishing and digital file archiving. But while their computer habits were savvy, they were usually less than professional-level.

For instance, a laptop computer recovered from Ramzi Yousef in 1995 contained deleted files that were able to be recovered by forensic analysis. Yousef was sophisticated enough to use passwords, but not strong encryption. He removed old and sensitive files, but he didn't know to run a file shredder.

With the new software, Yousef's hard drive would have been a much tougher nut to crack. In addition to its 2,048-bit encryption, Mujahideen Secrets 2 includes a shredder and file and folder encryption.

The move to stronger encryption may have been prompted by security breaches on jihadist Web sites back in September, when the U.S. government and counterterrorism analysts obtained copies of an Osama bin Laden video release before it was widely introduced on the Web. At the time, several key jihadist sites temporarily suspended operations to address the breach.

However, it's unlikely the bulk of those security issues will be solved by strong encryption. While the debut of the software represents a significant and dangerous new development for counterterrorism officials, encryption and straight-up network security do not appear to have been the key factors in earlier breaches. The best encryption in the world won't help if you give away your passwords and encryption keys.

Mujahideen Secrets 2 appears to have been assembled and compiled from both open-source and copyrighted material, according to Henry. The software may be detectable when operating over networks or on targeted machines. This could be useful for counterterrorism professionals tracking terrorist and militant Web usage.

Labels: ,


     



 

Tweets referencing this post:

loading..




OSINT on Terrorism and Extremism, Social Media Monitoring, Analysis and Strategies | Read More...



RESOURCES


Book: Jihad Joe: Americans Who Go to War in the Name of Islam (Reviews)

E-Book: Beatings and Bureaucracy: The Founding Memos of Al Qaeda

E-Book: Interview online jihadist Abu Suleiman Al Nasser (Abridged)

Sourcebook: The 9/11 Investigation (coming soon)

Sourcebook: Al Qaeda in America

Sourcebook: Ali Mohamed

Sourcebook: Gitmo Detainees

Sourcebook: Siege at Mecca

Sourcebook: Islamic Extremism in Egypt

Sourcebook: The Sadat Assassination

ALERTS

JIHAD JOE

Jihad Joe by J.M. BergerJihad Joe: Americans Who Go To War In The Name Of Islam, the new book by INTELWIRE's J.M. Berger, is now available in both Kindle and hardcover editions. Order today!

Jihad Joe is the first comprehensive history of the American jihadist movement, from 1979 through the present. Click here to read more about the critical acclaim Jihad Joe has earned so far, including from the New York Times, Publisher's Weekly, Redstate.com and many more.

RECENT

Newest posts!

Why 'Islamic Terrorists' And Not 'Christian Terror...

FBI's Deadbeat Tendencies Step Up To Protect Civil...

I'm Sorry, But I Want The Mug

Bizarre Piano Soundtrack on New Bin Laden Tape

Bhutto Update: Pakistan Blames Lashkar-E-Jhangvi

Al Qaeda 1.0 Shows Its Teeth

Full Text: J. Edgar Hoover's Plan To Arrest, Detai...

Fort Dix Six Carry Out al Qaeda Recruitment Drive ...

Suspect Gives First Person Account of CIA Renditio...

Terry Nichols: Justice Department Wanted Me To Lie...

NEWS NOW

EXCLUSIVES


New York Pipe Bomb Suspect Linked to Revolution Muslim

The Utility of Lone Wolves

Interview with Online Jihadist Abu Suleiman Al Nasser

A Way Forward for CVE: The Five Ds

How Terrorists Use The Internet: Just Like You

PATCON: The FBI's Secret War on the Militia Movement

Interview About Jihad With Controversial Cleric Bilal Philips

Forgeries on the Jihadist Forums

U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki

State Department Secretly Met With Followers of Blind Sheikh

State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995

FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs

Gaza Flotilla Official Was Foreign Fighter in Bosnia War

U.S. Had 'High Confidence' Of UBL Attack In June 2001

Behind the Handshake: The Rumsfeld-Saddam Meeting