Академический Документы
Профессиональный Документы
Культура Документы
org
Al Qaeda’s
Exploitation
Of The Internet
For Terrorist Command, Control, And Communications
A l Q a e d a ’s
deputy leader
Ayman al-Zawahri
speaks in an image taken
from video footage released on
April 29, 2006. Zawahri said hundreds
of suicide bombers had “broken America’s
back” in three years of war in Iraq, according to
a video posted on the Internet. The release of the video
came just days after the broadcast of an audio tape from Al
Qaeda leader Osama bin Laden and a rare video from Abu Musab
12 al-Zarqawi, the group’s leader in Iraq. REUTERS
Vol.16, No.1
Journal of Counterterrorism & Homeland Security International
Communication is critical. A message must movement that needs to motivate lone wolves by the Aum Shinrikyo sect. To be successful,
and small homegrown cells, the terror network it concluded, the terrorist had to be more af-
be relayed to the intended audience in an must be able to communicate in a bi-directional fective in atomizing the nerve agent.
fashion, while protecting its own infrastructure
effective and clear manner…. from security forces. Finally, the SME advised the jihadist who had
asked the question how to improve his safety in
Many people have seen downloaded tapes on the production and transportation phases of us-
Every Western organization that hopes the techniques of making a suicide bombing ing sarin. The answer dealt with the production
vest – from the mixing of the chemicals for the of two compounds that can be more easily and
to succeed faces the issue of effective production of an explosive to the placement of safely transported. The binary compound would
employee development. Seminars are BBs to maximize the affects of shrapnel. While be safer to transport, but would turn into sarin
these training videos will never “go out of style,” when mixed. Now, all the aspiring jihadist would
conducted; trainers are contracted and the terrorists are always reaching for new ways have to do is buy or steal a bug sprayer and pump
to perfect their deadly craft. the compound into the ventilation system of an
hold day-long training sessions; and the office building.
intranet is used for cost effective employee International terrorists adapt to the failures and
successes of themselves as well as other terror Other training examples include:
skills development. All of this time and elements. Hezbollah tactics are improved by the • Preparation of toxic materials.
Taliban, and Hamas suicide bombers are studied • Preparing explosives including tutorials
expense is aimed at improving employee by the Al Qaeda movement all with a goal of and detailed instructions.
– and thus organizational – morale, constantly sharing lessons learned and tactics • Preparation of missiles.
and techniques to outdo the security forces and • Organizing cells and recruiting members.
motivation, and performance. countermeasures in place. • Terrorism / hackers.
• Methods and tactics.
A
Various portals for information delivery are • All books and movies are accompanied
l Qaeda and Al Qaeda-linked organi- used by the adversary to effectively assure clear by very detailed explanations.
zations face exactly the same issues. instructions and guidance to specific parties in
How do you provide training for a particular regions – intended to efficiently guide On-Line Courses
decentralized organization? How do their mission objective without getting caught or
you teach a person who has never been inside a being identified. Although the student of Al Qaeda’s On-Line
modern classroom to use the appropriate house- University will never attend a graduation cer-
hold chemicals to create explosive compounds? Enter The SMEs emony for his education, the subject matter
How do you teach the person wearing the suicide experts ensure that the sincere student can gain
vest where to stand on a crowded bus to maxi- In most terror-related training sites today, jihad a full appreciation of what to use and how to
mize civilian casualties? blogs are titled “Preparation and Planning Divi- use it to destroy the property and lives of the
sion.” Within these training and education
What’s more, Al Qaeda must constantly be wings, there is the capability for members
concerned with its own security and Western to ask any question and get any questions
intelligence interdiction of their activities. All of answered directly from the web-
this while at the same time maintaining a high site or email.
level of quality assurance, communications,
control, and delegation of global responsibilities A recent posting to a jihadist
to assure mission success. website was identified by the
A recent posting to a jihadist website was
Institute of Terrorism Re- identified by the Institute of Terrorism
These terror organizations use the internet for search and Response’s Arabic
conveying information, instructions, and com- language researchers. It was Research and Response’s Arabic
mands to relevant members of the organization, written by an individual who
other organizations, potential new members as wanted to kill Westerners, but
language researchers. It was written
well as to its adversary itself, the West. For ter- wasn’t motivated enough to by an individual who wanted to kill
rorist organizations, the internet has become the die in the process. He posed
most effective tool for transferring and receiving the “How do I do it?” question Westerners, but wasn’t motivated
information at a global and local level. to the website. Within hours a
Subject Matter Expert (SME)
enough to die in the process. He posed
Al Qaeda-linked organizations have mastered had posted a multi-page re- the “How do I do it?” question to the
the management of training and education at sponse to his question. Poison
both a global and local level. This has enabled gas was the answer. website. Within hours a Subject Matter
customized and site specific communications
with better information and data transfer. What followed was a dis-
Expert (SME) had posted a multi-page
course on the chemicals response to his question. Poison gas
Al Qaeda’s On-Line University needed to make sarin gas
– the proportions and the was the answer.
The response to human resource development is- dangers to the person pro-
sues by Al Qaeda-linked organizations is exactly ducing the nerve agent. The
the same as the response by major international posting also included “lessons
corporations – training and teaching through the learned” from the 1995 Tokyo sarin
internet. As a decentralized organization and a gas subway terror attack carried out
www.thejournalofcounterterrorism.org
kefir. Examples of recent material from the tial recruit included points of contact, meeting is particularly significant because many West-
SMEs included the use of phosphorous as a locations, exploitable border crossings, and erners spend the December holiday season at
chemical to be used in incendiary attacks and the periodic situational reports. resorts in the Sinai. Previously intercepted
appropriate targeting of Americans through the communications clearly indicate the intent to
use of small arms: Examples of this communications can be taken destabilize the Egyptian government by going
from TAM-C Alerts issued in 2009 by the Institute after the Mubarak regime.
“…if you have access to a weapon the best thing of Terrorism Research and Response:
to do is to go to crowded places that have little Even though the terror organization or the indi-
security like the Halloween parties (this is an Recent activity intercepted by Arabic language vidual perpetrated such propaganda may be in
opportunity that our brothers can exploit next researchers of the Targeted Actionable Monitor- another location on the globe, the web enabled
year) which provide good cover for movement and ing Center (TAM-C) identified communications global planning, training, and attack execution
presence of many heretics from all ages but not indicating the desire to place pressure on Israel at a local level.
children. You should choose the time and place and Egypt to force them to reduce the pressure on
that Muslims or children are not there (before you Hamas controlled Gaza. Another example of the use of the web for terror
attack). And remember what happened in the club activity that showed the 2009 broadening of target
in Russia that 100 people were killed in it…” selection in the area of the Arabian Peninsula.
The “how to” question of creating a bomb On 28 December 2009 Arabic language
that can be carried onto an airliner was researchers of the Targeted Actionable
answered and available (and identified by Monitoring Center (TAM-C) identified
communications that caused the TAM-C
Mid-East Desk to raise the threat level of
The “how to” question of creating a bomb terror activity to SEVERE.
that can be carried onto an airliner was On 29 December 2009 TAM-C Arabic
language researchers identified commu-
answered and available (and identified nications from Al Qaeda of the Arabian
Peninsula (AQAP) indicating the intent
by analysts of the Targeted Actionable to spread terror operations through the
Monitoring Center) to jihadists months recruitment of Muslims who are not cur-
rently aligned with terror elements.
ago. The West finally saw the weapon
TAM-C analysts note that a portion of the
used in the Christmas Day attempted communication was especially aimed at the
recruitment of Muslim security personnel who
bombing of Flight 253. guard locations that AQAP want targeted.
14
Vol.16, No.1
Journal of Counterterrorism & Homeland Security International