Blogs of War

Hizballah Cavalcade

Internet Haganah



Kremlin Trolls

Making Sense of Jihad

Selected Wisdom

Views from the Occident


American Terrorists

Anwar Awlaki

Al Qaeda


American Al Qaeda Members

Inspire Magazine

Revolution Muslim


News, analysis and primary source documents on terrorism, extremism and national security.

Saturday, February 2, 2008

Jihadists Add Strong Encryption To Terrorist Toolbox

By J.M. Berger

Al Qaeda-linked militants have rolled out improved security software that provides above-military-grade encryption for terrorists communicating online.

A copy of the software, Mujahideen Secrets 2, was obtained by INTELWIRE and forwarded to Paul A. Henry, Vice President for Technology Evangelism at Secure Computing (, for analysis.

According to Henry, the software is a significant upgrade to an earlier version program used by jihadists. The new software can be used to encrypt chat sessions, as well as e-mail, Web forum postings and electronic communications.

The software can easily be loaded on a USB stick, according to Henry, allowing militants to encrypt communications from otherwise insecure locations such as Internet cafes.

The software is extremely easy to use, Henry said. This is a significant factor, since the computer skills (and general intelligence) of al Qaeda operatives run the gamut from highly advanced to embarrassingly inadequate.

On the higher end of that spectrum, Al Qaeda has traditionally employed fairly sophisticated computer techniques, but until recently, its implementation has generally lagged industry standards.

During the early and mid-1990s, terrorists were early adopters of laptop computers, PDAs, online publishing and digital file archiving. But while their computer habits were savvy, they were usually less than professional-level.

For instance, a laptop computer recovered from Ramzi Yousef in 1995 contained deleted files that were able to be recovered by forensic analysis. Yousef was sophisticated enough to use passwords, but not strong encryption. He removed old and sensitive files, but he didn't know to run a file shredder.

With the new software, Yousef's hard drive would have been a much tougher nut to crack. In addition to its 2,048-bit encryption, Mujahideen Secrets 2 includes a shredder and file and folder encryption.

The move to stronger encryption may have been prompted by security breaches on jihadist Web sites back in September, when the U.S. government and counterterrorism analysts obtained copies of an Osama bin Laden video release before it was widely introduced on the Web. At the time, several key jihadist sites temporarily suspended operations to address the breach.

However, it's unlikely the bulk of those security issues will be solved by strong encryption. While the debut of the software represents a significant and dangerous new development for counterterrorism officials, encryption and straight-up network security do not appear to have been the key factors in earlier breaches. The best encryption in the world won't help if you give away your passwords and encryption keys.

Mujahideen Secrets 2 appears to have been assembled and compiled from both open-source and copyrighted material, according to Henry. The software may be detectable when operating over networks or on targeted machines. This could be useful for counterterrorism professionals tracking terrorist and militant Web usage.

Labels: ,

Views expressed on INTELWIRE are those of the author alone.



Tweets referencing this post:



", granular analysis..."

ISIS: The State of Terror
"Jessica Stern and J.M. Berger's new book, "ISIS," should be required reading for every politician and policymaker... Their smart, granular analysis is a bracing antidote to both facile dismissals and wild exaggerations... a nuanced and readable account of the ideological and organizational origins of the group." -- Washington Post

More on ISIS: The State of Terror

"...a timely warning..."

Jihad Joe: Americans Who Go to War in the Name of Islam:
"At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times

More on Jihad Joe


INTELWIRE is a web site edited by J.M. Berger. a researcher, analyst and consultant covering extremism, with a special focus on extremist activities in the U.S. and extremist use of social media. He is a non-resident fellow with the Brookings Institution, Project on U.S. Relations with the Islamic World, and author of the critically acclaimed Jihad Joe: Americans Who Go to War in the Name of Islam, the only definitive history of the U.S. jihadist movement, and co-author of ISIS: The State of Terror with Jessica Stern.


Newest posts!

Why 'Islamic Terrorists' And Not 'Christian Terror...

FBI's Deadbeat Tendencies Step Up To Protect Civil...

I'm Sorry, But I Want The Mug

Bizarre Piano Soundtrack on New Bin Laden Tape

Bhutto Update: Pakistan Blames Lashkar-E-Jhangvi

Al Qaeda 1.0 Shows Its Teeth

Full Text: J. Edgar Hoover's Plan To Arrest, Detai...

Fort Dix Six Carry Out al Qaeda Recruitment Drive ...

Suspect Gives First Person Account of CIA Renditio...

Terry Nichols: Justice Department Wanted Me To Lie...


New York Pipe Bomb Suspect Linked to Revolution Muslim

The Utility of Lone Wolves

Interview with Online Jihadist Abu Suleiman Al Nasser

A Way Forward for CVE: The Five Ds

How Terrorists Use The Internet: Just Like You

PATCON: The FBI's Secret War on the Militia Movement

Interview About Jihad With Controversial Cleric Bilal Philips

Forgeries on the Jihadist Forums

U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki

State Department Secretly Met With Followers of Blind Sheikh

State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995

FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs

Gaza Flotilla Official Was Foreign Fighter in Bosnia War

U.S. Had 'High Confidence' Of UBL Attack In June 2001

Behind the Handshake: The Rumsfeld-Saddam Meeting