Research Activities - University of Hull
Download
Report
Transcript Research Activities - University of Hull
Raphael Cohen-Almagor
IN INTERNET’S WAY:
RADICAL, TERRORIST
ISLAMISTS ON THE
FREE HIGHWAY
18.07.2015
1
Internet Contains Worse of Humanity
The Internet contains the best products of
humanity.
Unfortunately, the Internet also contains the worse
products of humanity:
Child Pornography, Pedophilia
Terror
Racism, Hate speech and Holocaust denial
Crime-facilitating speech
Cyber-bullying
18.07.2015
2
The Internet as Facilitator
The Internet is a great socialization tool.
The anonymity factor plays a significant role.
The Internet helps people who conspire to
carry out vile actions to explore and try
violent activities.
It brings together like-minded people and
creates a forum for them to discuss and
exchange ideas.
18.07.2015
3
Relevant Factors
History
Culture
Law
Morality
18.07.2015
4
Methodology
Literature review;
Analysis of terrorist websites;
Interviews designed to gather information on
how terrorists are using the Internet and what
is done to counter their activities.
Semi-structured, in English and Hebrew, in
the US, the UK and Israel
18.07.2015
5
Younes Tsouli
Arrived in London in 2001;
Studied information technology;
Irhabi (terrorist) 007;
Published manuals, home videos,
propaganda;
Became the main distributor of al Qaeda in
Iraq;
Stole more than 2.5 million Euros until his
arrest in October 2005.
18.07.2015
6
18.07.2015
7
September 11, 2001
September 11 and other terrorist operations
were facilitated by the Internet.
18.07.2015
8
September 11, 2001- M.G.
Interview
Al Qaeda gathered information from the Internet
about the US, learned the methods US dealt
with terrorism, its soft spots, targets.
Al Qaeda adjusted their operations accordingly.
Its activists refrained from using cell phones, as
they knew cell phones could be traced.
Instead, they used prepaid phone cards.
18.07.2015
9
September 11, 2001
Al Qaeda used email to transmit messages between the
terrorists.
AL Qaeda activists were looking for American flight
schools on the Internet, while they were in Germany.
They made some of the flight reservations via the
Internet.
The terrorists used public libraries terminals for
communications and data.
In addition, they used phone cards, and face-to-face
meetings in Spain.
18.07.2015
10
September 11, 2001
The operation was scheduled for the Fall of 2001.
Mohammad Atta wanted it to be after Labor Day, as one
of the targets was the Congress which resumes its
session after Labor Day.
They were looking for transatlantic flights, as they
wanted the airplanes to be with maximal oil load.
They preferred Boeing airplanes over Airbus, as Atta
believed they were easier to operate.
18.07.2015
11
September 11, 2001
They were looking for First Class seats for
20 passengers.
At that time, Tuesday was the relatively
less busy day.
Thus, September 11 became the day.
It was a logistic decision, not symbolic.
18.07.2015
12
Charity
Charity organizations in the USA were in the service of
the Hezbollah until they were closed down.
Hezbollah is known for using charity organizations in the
USA.
Al Qaeda did not use charity organizations for its
funding.
No connections were found between NGOs and Al
Qaeda for the planning and execution of 9/11.
18.07.2015
13
18.07.2015
14
E-jihad
The term E-jihad refers to the way
information technology is applied by groups
such as al-Qaeda in order to organize
logistics for their campaigns, through the
application of email and encrypted files, as
well as a means for developing their own
strategic intelligence.
18.07.2015
15
Al Qaeda
Members of Al Qaeda are sending each other
thousands of messages in a password-protected
section of agreed-upon websites
Sometimes they simply take over legitimate sites
In the wake of September 11, Internet providers
shut down several sites associated with Dr.
Sheikh Abdullah Azzam, mentor of bin Laden
18.07.2015
16
Terror Videos
18.07.2015
17
Haganah (Defence)
Haganah, http://haganah.org/, a US-based
pro-Zionist website run by Aaron Weisburd,
tracks down jihadi sites and informs their
ISPs that they are hosting a terrorist site,
which usually ensures it is closed down
immediately.
Haganah has shut down more than 700
jihadi sites
18.07.2015
18
Jihadi Net – P.M. Interview
Young students talk in chat rooms about
jihadi issues.
Many of them are Muslims.
Their knowledge of Islam is limited.
Those young people are emotionally-driven
by images from Iraq and Palestine.
They become motivated and wish to
retaliate.
18.07.2015
19
Jihadi Net
Generally speaking, they do not have
theological training.
In the chat rooms, they converse about
Islam, jihad, Iraq, Israel-Palestine.
The scope of this phenomenon is broad.
18.07.2015
20
jihadi websites
Most jihadi websites have several sections.
The most important and largest is usually the
religion section, which contains fatwas
explaining who can be targeted legitimately.
Quranic references to jihad, the different ways
jihad can be expressed, aspects of martyrdom,
and online doctrinal consultations with religious
sages.
18.07.2015
21
jihadi websites
18.07.2015
22
jihadi websites
In the jihad section, would-be recruits are
encouraged to join the battle.
Some general advice is given, e.g., the best
routes into Iraq, names and locations of
sympathetic mosques in neighbouring countries.
Galleries of martyr portraits are accompanied by
their last wills and testaments, often in the form
of a video
18.07.2015
23
jihadi websites
Most sites have IT section where contributors
are urged to share their knowledge and develop
new ways of using cyberspace to further the
cause of jihad.
The bulletin boards or chat rooms are by far the
most popular forums on jihadi websites.
Visitors can add comments or reply to ongoing
conversations and debates.
18.07.2015
24
jihadi websites
Many jihadi sites have a women’s section.
Wives and mothers are urged to support
their men in jihad and help them in the
psychological battle against what one site
described as that disease –
the weakness which loves life and hates
death.
18.07.2015
25
Use of Internet by
Terrorists
Providing Information (English, Arabic, other
languages, according to the audience);
Facilitation – like us, terrorists use the Internet to
organize their travel, to communicate, to find
information;
Seeking Legitimacy and support;
Propaganda and Indoctrination – use of cameras,
chat rooms;
Psychological warfare – videos to evoke fear;
violence;
18.07.2015
26
Use of Internet by
Terrorists
Socialization, networking and motivation - use
chatrooms to create virtual community, and
motivate people to take violent actions against
the West;
Spreading tactics – the first beheading in Iraq
showed on the Internet motivated copy-cat
actions in other countries. Beheading is not part
of the culture and tradition in Thailand. The
Internet facilitated this knowledge and idea.
Instructions and online manuals; spreading
tactics;
18.07.2015
27
Use of Internet by
Terrorists
Planning of activities and
coordination;
Training how to build bombs –
significant but not as the uses of
propaganda and motivation.
Fund raising and Money laundering;
Jihadists are involved in fraud,
forgery, theft and drug trafficking.
18.07.2015
28
Use of Internet by
Terrorists
Recruitment – a growing phenomenon;
Cyber-terrorism
18.07.2015
29
On March 23, 1996, the Terrorist's Handbook
was posted on the Web, including instructions
on how to make a powerful bomb.
The same bomb was used in the Oklahoma
City bombing.
Deputy Assistant Attorney General Robert
Litt, of the U.S. Justice Department's Criminal
Division, observed that only hours after the
Oklahoma City bombing, someone posted on
the Internet directions -- including a diagram -explaining how to construct a bomb of the type
that was used in that tragic act of terrorism.
18.07.2015
30
No doubt that some of the bomb cases were
inspired by the Internet.
The criminals and terrorists took the recipes
from the Internet.
But the US is willing to pay this price. It is a
free speech issue.
“The government should not tell us what to do.
We cherish freedom in this country and wish to
retain it to the maximum”.
18.07.2015
31
Pipe bombs are fairly easy to make, but you can also
make them out of cars, trucks, stink bombs, mail, fuelair, laser guided, fertilizer, molotov, dust, flour, pipe,
M-80, you name it. You can make bombs out of all sorts
of things, but I'm not going to tell you how. In fact, I
haven't got a clue how, but that doesn't stop people
from stopping by to ask. I used to have "bomb making
instructions" as the title of my home page (even though
I have no idea how to make bombs and never
distributed such information). I just love salting search
engines with titilating drivel. It was always interesting
to crawl through the web log files looking for how
many people followed links from search engines
looking for bomb making information. There are
sometimes a few government and news sites in the
logs. More recently, I found entries for people from the
following
Source: http://www.swcp.com/~mccurley/bomb_making.html
18.07.2015
32
ABORTIONISTS: the baby butchers
Lawson Akpalonu (CA)
Ben Graber (FL)
Norman M. Neches (DC)
Edward Allred (CA)
William Graham (LA)
James Newhall (OR)
Kevin W. Alexander (DC)
Marshall Grandy (TX)
Richard S. Newman (DC)
Eduardo Aquino (TX)
Richard P. Green (DC)
Mark Nichols (OR)
Gostal Arcelin (FL)
Thomas H. Gresinger (VA) Mario Ochoa (TX)
(SEND US MORE NAMES!) David A. Grimes
(SEND US MORE NAMES!)
Carl L. Armstrong (OH)
Jay M. Grodin (MD, VA)
Soo-Young Oh (MD)
Ali Azima (FL)
David Gunn (Fl)
Tati I. Okereke (NY)
(SEND US MORE NAMES!) R.V. Guggemheim (OR)
(SEND US MORE NAMES!)
Fritz Bailey (CA)
Tom Gunter (CA)
Kathleen A. Olson
Carlos Baldocedas (IL)
Moshe Hacamovitch (TX) G.W. Orr (NE)
18.07.2015
33
Shutting Down Websites
18.07.2015
34
Arguments for and against
Shutting Down Websites
Against Shutting Down:
Free expression
Futility – mirror sites, different servers
Source of information for security officers
Difficult to track down sites, hence there is
interest to keep them viable
For Shutting Sites:
facilitate criminal activity;
18.07.2015
35
Shutting Down Websites
From discussions with security experts I gather
this is not the preferred option.
They would like to keep an eye open on such
sites
“We shut down a website on an American server
and they might reopen the same site on a
Chinese server. Then it might be more difficult
for us to track it.
I want to watch certain people, how they use the
Internet”.
18.07.2015
36
FBI Strategy
“Our general approach is to look at people.
We receive information about individuals who
might risk security and follow their actions,
including on the Internet.
We examine the sites they surf. Typically we
do not monitor the Net.
We go after people who we suspect, not
websites. If the bad people go to sites, we
follow them”.
18.07.2015
37
The official American stance is: “We do not monitor”.
The problem of monitoring is perhaps less daunting
than it might first appear.
Weisburd’s latest count of members of jihadi forums:
50,000 members
about 10% are the "active minority" who are of
concern, that's 5,000.
It is possible to identify these people.
18.07.2015
38
US Strategy
Internet providers are -- generally speaking --
helpful and cooperative.
They don’t want to have terrorist contents on
their servers.
But they do not see it as their responsibility to
monitor their server for such content.
The communication between US security
agencies and them is sensitive.
18.07.2015
39
US Strategy
The security agency’s recommendation might
be perceived as pressure.
They had some issues over the interpretation
of their requests.
They said “Think it over” and the providers
were alarmed by the fact that the security
agency approached them and considered
such approach as “pressure”.
“It is a delicate issue.”
18.07.2015
40
Internet providers should have integrity
teams, instructing providers to take off
inappropriate content.
There should be, for example, internal
mechanisms against posting bomb recipes,
against vile video clips like beheadings.
The US government is unlikely to impose
liability on them.
There should be awareness, and discussions
about moral responsibility.
18.07.2015
41
The careful terrorists use encryption
when they exchange images;
Al Qaeda developed its own advanced
encryption program called Mujahadeen
Secrets;
Without the key, it is very difficult to
decode the image;
Encryption is the best friend of all
people involved in illegal activities:
Child-pornographers, terrorists and
criminals.
18.07.2015
42
There is no form of encryption that
cannot be cracked by someone,
somewhere, given enough time and
hardware
However, decrypting what you need
to decrypt, when you need to decrypt
it, may not be possible.
18.07.2015
43
Remedies
Education;
Denying Legitimacy;
ISPs Responsibility – adopting codes
of conduct and enforcing them;
Readers’ awareness and responsibility;
Non-governmental Hotlines –
cooperation between government and
NGOs;
18.07.2015
44
Remedies
We need to better understand the Internet’s
social networking.
My Space, Facebook, Yahoo! Groups,
Geocities.
What are the implications of these tools on
terrorism?
People tend to say on the Internet things they
do not usually say or write via other
communication means in public.
18.07.2015
45
Remedies
Understanding cultural differences;
Ability to assess threats in accordance with
terrorists’ eyes, using their concepts and
systems of belief;
Knowledge of languages that terrorist
speak;
Follow the money;
Zero tolerance to incitement both offline
and online;
18.07.2015
46
Remedies
Cooperation between public and private
sectors: International cooperation
between governments as well as between
governments and ISPs;
International cooperation: Cracking terrorcrime networks
Legislation and Precedents
Monitoring Websites
18.07.2015
47
Remedies
Removing illegal Content – what is
illegal offline is also illegal online;
CleaNet
Introducing a different rationale:
Instead of free highway, social
responsibility
18.07.2015
48
The Threats of the Internet
Global solution
for
global problem
Terror & Crime
Monitoring sites, Finance
Intelligence
18.07.2015
49
Thank you
Blog: http://almagor.blogspot.com
Subscribe by sending me an
email: [email protected]
Follow me: almagor35@
18.07.2015
50