08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

With no filter or censor, the Internet can advance the most bizarre<br />

insurgent principles with little chance of being caught. The net can energize<br />

sympathy for a cause, operate as a psychological weapon that can enter a home<br />

anonymously, and can even invite guests to an insurgent gift shop to purchase<br />

or download emblems and slogans. Web postings are used to vindicate<br />

insurgent actions based on the logic of “no other choice than to act” or to<br />

“delegitimize the enemy” and can offer nonviolent solutions. In other words,<br />

the Internet can offer a kinder face for the insurgent, or it can offer harsh reality<br />

(beheading of an individual) for those who choose to support the “infidels.”<br />

Potential and Actual Insurgent Tactics on the Internet<br />

Insurgent techniques have evolved and now include Cyber Age<br />

adaptations from their Industrial Age counterparts. This applies to both tactics<br />

and planning for an insurgency operation.<br />

An example of a Cyber Age adaptation is the “dead drop.” A dead drop<br />

is a method used to exchange secrets between two groups or among people who<br />

do not actually meet. In the past, an insurgent dead drop may have been a huge<br />

rock under which they placed the message or code. Another insurgent, aware of<br />

the rock’s location, would then retrieve the message. In the Cyber Age, an<br />

insurgent can visit a cybercafé, write a draft message, put it in a file, sign off,<br />

and depart the premises. Because the draft was never sent, the Internet service<br />

provider (ISP) does not retain a copy. Later, even from another location<br />

thousands of miles away, another insurgent with knowledge of the same<br />

prearranged password and username can obtain access to the file, read the draft<br />

letter, and then erase it. 102 Thus the message is exchanged via a high-tech dead<br />

drop.<br />

Al Qaeda computer expert Mohammad Naeem Noor Khan, arrested in<br />

Pakistan on 12 July 2004, had been creating websites and secret email codes to<br />

enable al Qaeda operatives to communicate with one another. He was arrested<br />

in a remote area of Pakistan far from the other al Qaeda hideouts. 103 Khan<br />

allegedly told interrogators that al Qaeda used websites and email addresses in<br />

Turkey, Nigeria, and tribal areas of Pakistan—that is, in the country of a NATO<br />

member, on another continent, and in a region where computer connections<br />

should be sparse, thus demonstrating the reach of an insurgent’s net. Files were<br />

deleted after being read, and email addresses were used only two or three<br />

102 “Cyberspace Gives Al Qaeda Refuge,” Jihad Watch, 16 August 2004 at<br />

http://www.jihadwatch.org.<br />

103 “Al Qaeda Computer Whiz Was Top Terror Planner: Security Official,”<br />

Channelnewsasia.com, 4 August 2004.<br />

53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!