Terrorism: March 21, 2002

Archives

Before September 11, 2001, al Qaeda was known to exist, was seen as a dangerous organization, but thought of as one that the FBI and CIA could keep an eye on and eventually round up. After September 11, 2001, al Qaeda suddenly became a bunch of Islamic super spies and assassins. In the past six months, as the world's intelligence and police agencies have gone after al Qaeda in a big way, a different picture has emerged. 

While over 20,000 Islamic terrorists flocked to Afghanistan (and other countries where training camps existed), most of them were, trained as infantry, used as ground troops to fight the Northern Alliance for the Taliban and, if they survived that, sent home to "do what they could" to strike a blow for Islam. Most of these lads restricted their militant activities to a lot of lively talk at the local coffee shop or mosque. 

How do we know this? It seems that among the subjects taught as the al Qaeda terrorist schools, operational security was not the big favorite. OPSEC (operational security) is doing what is needed to keep the enemy from finding out what you're up to. The al Qaeda trainees understood the need for OPSEC, but many did not understand how much OPSEC had to be applied to remain undetected. The biggest weakness among al Qaeda was careless use of telephones (especially cell phones) and email. These two items are very popular with young folks everywhere, and the younger al Qaeda zealots are no exception. It turns out that the ease of use that makes cell phones and email so popular also creates many situations where al Qaeda business is conducted without proper OPSEC safeguards. Even though most email systems make available strong encryption, al Qaeda members have been caught using the weak old 40 bit encryption. Organizations like the U.S. NSA can easily crack 40 bit encryption. Worse yet, much al Qaeda email gets sent with no encryption at all. 

And then it gets worse. Al Qaeda members are picked up carrying address books and computer files that use no encryption at all. If these lads expected Allah to see to their encryption needs, perhaps they should be told they are undergoing a religious a crises. No point in having faith in encryption unless you use it. One could understand this sloppiness in Afghanistan, where a lot of unencrypted material (hard disk drives, paper documents) was found in al Qaeda strongholds. The collapse of the Taliban was so swift, that one would expect a lot of stuff to be left behind as everyone rushed for the exit. Religion may also have something to do with it. When you believe you have God on your side, you tend to believe the Lord will provide (security for your data, or whatever.) But the al Qaeda outside of Afghanistan should have been better trained. They weren't. The "terrorist training" provided in Afghanistan was often haphazard and concentrated more on military, religious and anti-West indoctrination than about the details of running secret operations. 

Al Qaeda was probably unaware that there are a relatively small number of Internet (IP) addresses in Pakistan, a favorite place for al Qaeda to take care of their email. If the U.S. was not checking every item coming out of Pakistani Internet connections before September, 2001, they probably have been since. Actually, there apparently was a lot of surveillance of al Qaeda email and Internet operations before September 11, 2001, but this was unable to catch the elite al Qaeda agents. Although some 20,000 recruits went through the al Qaeda training camps between 1996 and 2001, only a few hundred were selected as elite agents. These guys did pay attention to OPSEC, or at least did so a lot more than lesser agents. It is these elite agents that are being sought all over the world. Some were killed in the Afghanistan fighting, some are still loose in Afghanistan. Others are captives in Afghanistan and Guantanamo Bay. 

The remaining agents, perhaps 100-200, are on the loose outside of Afghanistan. Without the al Qaeda organization back in Afghanistan, these agents are largely on their own. Apparently they are contacting the less capable graduates of the al Qaeda camps, and this is where some of them are getting caught because of careless use of email. Adding to their problems are the thousands of documents being collected in abandoned houses, apartments, camps and caves. These identify many who have been through the camps and are now elsewhere. While the al Qaeda agents on the loose are extremely dangerous, they are also vulnerable. And we owe a lot of that to the Internet. 

 

Article Archive

Terrorism: Current 2007 2006 2005 2004 2003 2002 2001 2000 1999

X

ad

Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contribute. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   contribute   Close