Вы находитесь на странице: 1из 3

www.thejournalofcounterterrorism.

org

Al Qaeda’s
Exploitation
Of The Internet
For Terrorist Command, Control, And Communications 

By Mike Perelman, Aaron Richman, Saleh Kafora

A l Q a e d a ’s
deputy leader
Ayman al-Zawahri
speaks in an image taken
from video footage released on
April 29, 2006. Zawahri said hundreds
of suicide bombers had “broken America’s
back” in three years of war in Iraq, according to
a video posted on the Internet. The release of the video
came just days after the broadcast of an audio tape from Al
Qaeda leader Osama bin Laden and a rare video from Abu Musab
12 al-Zarqawi, the group’s leader in Iraq. REUTERS

Vol.16, No.1
Journal of Counterterrorism & Homeland Security International
Communication is critical. A message must movement that needs to motivate lone wolves by the Aum Shinrikyo sect. To be successful,
and small homegrown cells, the terror network it concluded, the terrorist had to be more af-
be relayed to the intended audience in an must be able to communicate in a bi-directional fective in atomizing the nerve agent.
fashion, while protecting its own infrastructure  
effective and clear manner…. from security forces. Finally, the SME advised the jihadist who had
asked the question how to improve his safety in
Many people have seen downloaded tapes on the production and transportation phases of us-
Every Western organization that hopes the techniques of making a suicide bombing ing sarin. The answer dealt with the production
vest – from the mixing of the chemicals for the of two compounds that can be more easily and
to succeed faces the issue of effective production of an explosive to the placement of safely transported. The binary compound would
employee development. Seminars are BBs to maximize the affects of shrapnel. While be safer to transport, but would turn into sarin
these training videos will never “go out of style,” when mixed. Now, all the aspiring jihadist would
conducted; trainers are contracted and the terrorists are always reaching for new ways have to do is buy or steal a bug sprayer and pump
to perfect their deadly craft.   the compound into the ventilation system of an
hold day-long training sessions; and the office building.
intranet is used for cost effective employee International terrorists adapt to the failures and
successes of themselves as well as other terror Other training examples include:
skills development. All of this time and elements. Hezbollah tactics are improved by the • Preparation of toxic materials.
Taliban, and Hamas suicide bombers are studied • Preparing explosives including tutorials
expense is aimed at improving employee by the Al Qaeda movement all with a goal of and detailed instructions.
– and thus organizational – morale, constantly sharing lessons learned and tactics • Preparation of missiles.
and techniques to outdo the security forces and • Organizing cells and recruiting members.
motivation, and performance.  countermeasures in place. • Terrorism / hackers.
• Methods and tactics.

A
Various portals for information delivery are • All books and movies are accompanied
l Qaeda and Al Qaeda-linked organi- used by the adversary to effectively assure clear by very detailed explanations.
zations face exactly the same issues. instructions and guidance to specific parties in
How do you provide training for a particular regions – intended to efficiently guide On-Line Courses
decentralized organization? How do their mission objective without getting caught or
you teach a person who has never been inside a being identified. Although the student of Al Qaeda’s On-Line
modern classroom to use the appropriate house- University will never attend a graduation cer-
hold chemicals to create explosive compounds? Enter The SMEs emony for his education, the subject matter
How do you teach the person wearing the suicide experts ensure that the sincere student can gain
vest where to stand on a crowded bus to maxi- In most terror-related training sites today, jihad a full appreciation of what to use and how to
mize civilian casualties?  blogs are titled “Preparation and Planning Divi- use it to destroy the property and lives of the
sion.” Within these training and education
What’s more, Al Qaeda must constantly be wings, there is the capability for members
concerned with its own security and Western to ask any question and get any questions
intelligence interdiction of their activities. All of answered directly from the web-
this while at the same time maintaining a high site or email.
level of quality assurance, communications,
control, and delegation of global responsibilities A recent posting to a jihadist
to assure mission success. website was identified by the
A recent posting to a jihadist website was
Institute of Terrorism Re- identified by the Institute of Terrorism
These terror organizations use the internet for search and Response’s Arabic
conveying information, instructions, and com- language researchers. It was Research and Response’s Arabic
mands to relevant members of the organization, written by an individual who
other organizations, potential new members as wanted to kill Westerners, but
language researchers. It was written
well as to its adversary itself, the West. For ter- wasn’t motivated enough to by an individual who wanted to kill
rorist organizations, the internet has become the die in the process. He posed
most effective tool for transferring and receiving the “How do I do it?” question Westerners, but wasn’t motivated
information at a global and local level. to the website. Within hours a
Subject Matter Expert (SME)
enough to die in the process. He posed
Al Qaeda-linked organizations have mastered had posted a multi-page re- the “How do I do it?” question to the
the management of training and education at sponse to his question. Poison
both a global and local level. This has enabled gas was the answer.  website. Within hours a Subject Matter
customized and site specific communications
with better information and data transfer. What followed was a dis-
Expert (SME) had posted a multi-page
course on the chemicals response to his question. Poison gas
Al Qaeda’s On-Line University needed to make sarin gas
– the proportions and the was the answer. 
The response to human resource development is- dangers to the person pro-
sues by Al Qaeda-linked organizations is exactly ducing the nerve agent. The
the same as the response by major international posting also included “lessons
corporations – training and teaching through the learned” from the 1995 Tokyo sarin
internet.  As a decentralized organization and a gas subway terror attack carried out
www.thejournalofcounterterrorism.org

kefir. Examples of recent material from the tial recruit included points of contact, meeting is particularly significant because many West-
SMEs included the use of phosphorous as a locations, exploitable border crossings, and erners spend the December holiday season at
chemical to be used in incendiary attacks and the periodic situational reports. resorts in the Sinai.  Previously intercepted
appropriate targeting of Americans through the communications clearly indicate the intent to
use of small arms:  Examples of this communications can be taken destabilize the Egyptian government by going
from TAM-C Alerts issued in 2009 by the Institute after the Mubarak regime. 
“…if you have access to a weapon the best thing of Terrorism Research and Response:
to do is to go to crowded places that have little Even though the terror organization or the indi-
security like the Halloween  parties (this is an Recent activity intercepted by Arabic language vidual perpetrated such propaganda may be in
opportunity that our brothers can exploit next researchers of the Targeted Actionable Monitor- another location on the globe, the web enabled
year) which provide good cover for movement and ing Center (TAM-C) identified communications global planning, training, and attack execution
presence of many heretics from all ages but not indicating the desire to place pressure on Israel at a local level.
children. You should choose the time and place and Egypt to force them to reduce the pressure on
that Muslims or children are not there (before you Hamas controlled Gaza.  Another example of the use of the web for terror
attack). And remember what happened in the club activity that showed the 2009 broadening of target
in Russia that 100 people were killed in it…”  selection in the area of the Arabian Peninsula. 

The “how to” question of creating a bomb On 28 December 2009 Arabic language
that can be carried onto an airliner was researchers of the Targeted Actionable
answered and available (and identified by Monitoring Center (TAM-C) identified
communications that caused the TAM-C
Mid-East Desk to raise the threat level of
The “how to” question of creating a bomb terror activity to SEVERE. 

that can be carried onto an airliner was On 29 December 2009 TAM-C Arabic
language researchers identified commu-
answered and available (and identified nications from Al Qaeda of the Arabian
Peninsula (AQAP) indicating the intent
by analysts of the Targeted Actionable to spread terror operations through the
Monitoring Center) to jihadists months recruitment of Muslims who are not cur-
rently aligned with terror elements. 
ago. The West finally saw the weapon
TAM-C analysts note that a portion of the
used in the Christmas Day attempted communication was especially aimed at the
recruitment of Muslim security personnel who
bombing of Flight 253.  guard locations that AQAP want targeted. 

TAM-C analysts note that the AQAP commu-


nications includes the intent to target Iranian
assets in addition to Western assets. 

TAM-C analysts note that the AQAP


has previously used “creative” methods
Al Qaeda leader Osama bin Laden is seen of carrying out terror operations including
speaking in this video grab provided to Reuters
the insertion of a bomb in the body cavity of a
on September 11, 2007. Bin Laden eulogizes a
suicide bomber. 
September 11 hijacker as a rare and magnificent
man in a tape released to mark the sixth
anniversary of the attacks on the United States.
TAM-C analysts believe that future AQAP terror
REUTERS/Internet activity may threaten Western maritime assets.   
Obviously the terrorists’ command, control,
and communications is not without risks, as is
analysts of the Targeted Actionable Monitoring Although the recent anti-tunneling fence has been indicated by the TAM-C’s intercepts. However,
Center) to jihadists months ago. The West finally built on Egyptian soil, the communication identifies it is sufficiently effective that the risk of terror
saw the weapon used in the Christmas Day at- Egypt as an enemy and demands of jihadists “to stand activity is ever present.
tempted bombing of Flight 253.  up alongside your brothers in Gaza, that surrounded
them with fences and especially the steel wall that has Those involved in the world of counter terror
Transmitting Orders been erected by the enemies of Islam.”  find ourselves reacting to jihadists moving at cy-
ber speed. The West has much to learn about the
The dispatch of operational orders to lone- Such a statement is a call for action as a result of successful exploitation of the Internet for a terror
wolves and local cells through calls for action specific actions on the part of the adversary (Egypt) movement. Hopefully, we will learn it in time. 
via various sources for communications or the and then directives are given for elements that align
recruitment of personnel at local levels for the themselves with the terror group to target specific About the Author
execution of various missions is done through assets. The communication further states, “Kidnap
various means: from password protected and Zionist soldiers, or American soldiers in Iraq, and Mike Perelman, Co-Director, Institute of Terrorism
encrypted websites to easier tools including release them only on condition that the closure be Research and Response. Aaron Richman, Co-
blogs and chats. There have been instances removed from Gaza.”  Director, Institute of Terrorism Research
where lone-wolves sought out assistance in and Response. Saleh Kafora, Director,
joining up with larger, better organized groups. The potential for terror activity in Egypt, es- International Research and Analysis, Institute
The inductions into these groups for the poten- pecially in the Sinai, remains high. The danger of Terrorism Research and Response

14
Vol.16, No.1
Journal of Counterterrorism & Homeland Security International

Вам также может понравиться