Skip to comments.Terrorist 007, Exposed
Posted on 03/26/2006 5:13:04 AM PST by LesbianThespianGymnasticMidgetEdited on 03/26/2006 6:10:41 AM PST by Admin Moderator. [history]
For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. The savvy, English-speaking, presumably young webmaster taunted his pursuers, calling himself Irhabi -- Terrorist -- 007. He hacked into American university computers, propagandized for the Iraq insurgents led by Abu Musab al-Zarqawi and taught other online jihadists how to wield their computers for the cause.
(Excerpt) Read more at washingtonpost.com ...
picture of 007 here...
Yes, that was his booking photo.
Clarificiation, that apparently is his photo at the time of booking.
NOTE: The following post is a quote:
Terrorists’ suicide attack on British embassy plot foiled
Daily Mail ^
Posted on 09/09/2007 9:06:50 AM PDT by UKrepublican
Terrorists’ suicide attack on British embassy plot foiled
By JASON LEWIS - More by this author » Last updated at 23:32pm on 8th September 2007
Terrorists plotting a suicide attack against the British Embassy in Denmark were rounded up last week as they put the finishing touches to a devastating bomb.
The men are believed to be the remnants of the so-called “007” terror network, co-ordinated by London based Islamic militants using a series of secret internet sites.
Senior intelligence sources say the group planned to target Western embassies in Copenhagen with the British and American missions at the top of their list.
The arrests came one day before police in Frankfurt arrested three men on suspicion of planning a “massive” attack on US facilities in Germany.
The planned attacks in Denmark were apparently designed to mark the anniversary-of the September 11 attacks in New York and Washington.
Eight suspects were arrested after a surveillance team learned they were mixing unstable chemicals to make deadly TATP inside a block of flats in Copenhagen.
The men, who are aged between 19 and 29 and from Afghanistan, Pakistan, Somalia and Turkey, are believed to be part of an Al Qaeda network that had received orders from a group of British-based cyber terrorists.
The British group’s activities were stopped by an MI5 investigation earlier this year when three men were jailed for encouraging suicide missions using online forums and websites.
Their websites were also used as a secure communications centre by several senior Al Qaeda operatives, including two Bosnian-based terror chiefs known as “Maximus” and “Danish Turk”.
The pair were jailed over a plot to mount a suicide attack against a Western embassy in Sarajevo.
And The Mail on Sunday understands that two of those arrested in Copenhagen had been in regular telephone contact with them and under longterm surveillance by Danish intelligence.
It was also the Bosnian pair’s arrest that led to MI5’s exposure of the British internet gang.
The group - led by an IT expert using the online name Irhabi007, Arabic for Terrorist007 - set up websites from their bedrooms in London and Kent.
Three men, Tariq Al-Daour, 21, Younis Tsouli, 23, and Waseem Mughal, 24, were jailed in London in July after pleading guilty to inciting terrorist murder and conspiracy to defraud.
After the Copenhagen arrests Jakob Scharf, head of the Danish intelligence service PET, said: “With the arrests we have prevented a terror attack. They also have been producing an unstable explosive in a densely populated area.”
He said Danish investigators had worked with “several foreign co-operation partners”.
Thanks to Oorang for pointing to this article.
London Internet whiz was vital militant link: FBI
Fri Sep 28, 2007
NEW YORK - A London student known online as “Irhabi 007” served as a vital communications link in three militant plots that had once appeared unrelated, FBI Director Robert Mueller said on Friday.
Mueller disclosed details of the student’s role as a way, he said, of illustrating the importance of the Internet as a communications channel in modern terrorism and the challenges authorities face in tracking down militants. “The threat exists not only in the mountains of Pakistan, but also in the shadows of the Internet,” Mueller told the Council on Foreign Relations in a speech.
2,228 posted on 09/28/2007 6:24:13 PM PDT by Oorang (Tyranny thrives best where government ne
“AL QAEDA TODAY
The Evolving Terrorist Landscape”
Note: The following text is a quote:
Major Executive Speeches
Robert S. Mueller, III
Federal Bureau of Investigation
Council on Foreign Relations
New York City, New York
September 28, 2007
Two weeks ago, not far from here, bells tolled at Ground Zero. We commemorated the sixth anniversary of the September 11 attacks. And we marked the passage of another year without a terrorist attack on American soil.
It is important to pause and reflect on how we reached this milestone, so that we can better understand what we must do to reach another one. This task grows more complicated with every passing year.
In the wake of the September 11 attacks, the focus of the nation was crystallized. Our objective was clear: We knew who, and where, our enemies were, and we had to go after themfrom their training camps to their finances to their leaders. In many ways, the solution was straightforward. This is no longer the case.
Six years later, the fight against terrorism has evolved in ways both subtle and dramatic. It is far from over. The terrorist threats we face have changed, but they have not diminished.
And so today, Id like to re-crystallize our understanding of those threats by giving you my perspective on where we are now and where the FBI needs to go in order to defeat them.
In the past, it was said that al Qaedas sanctuary in Afghanistan had been largely disrupted, its finances damaged, its communications diminished, and its hierarchy diffused.
Today, the horizon looks somewhat different. Al Qaeda is not an organization that will go quietly into the night. Just as the FBI has changed and developed new tactics to confront al Qaedas asymmetrical warfare, al Qaeda has also adapted. We now confront a three-tiered threat.
At the top is the traditional al Qaeda organization. As reported in the National Intelligence Estimate, al Qaeda has found new sanctuaries in the ungoverned spaces, tribal areas, and frontier provinces of Pakistan. As a result, al Qaeda is regenerating its capability to attack.
From al Qaedas perspective, the destruction of their camps in Afghanistan, the freezing of their finances, and the elimination of many top leaders were setbacks, but not death blows. Theirs is a lifetime mission, and they will continue to make every attempt to regain strength.
The middle layer is perhaps the most complex. We are finding small groups who have some ties to an established terrorist organization. They may even receive some amount of training or funding from it, but they are largely self-directed. Think of them as al Qaeda franchises.
Such groups are a hybrid of homegrown radicals and more sophisticated plotters, and are harder to track. And this trend continues. The arrests earlier this month of small groups in Denmark and Germany are good examples.
The third layer of the threat comes from self-radicalized, homegrown extremists. They have no formal affiliation with al Qaeda, but they are inspired by its message of violence.
The information age means you dont need training camps to become a terrorist; all you need is an Internet connection. The web is terrorisms new frontier, offering both persuasive inspiration and practical instruction.
We are not focused on just one of those threats, but all three simultaneously. When Americas hammer fell on al Qaeda, al Qaeda broke into a hundred pieces. Some of our adversaries were stopped, but others spread. The network is now diffuse. We have persistent links to places such as East Africa. And we now also have links in areas such as North Africa and the Sahel. These extremists are attracted to the al Qaeda brand-name and ideology and openly affiliate themselves with al Qaeda. Al Qaeda in the Islamic Maghreb is a recent example.
Our adversaries are evolving, and so are their tactics. We must anticipate that terrorists will try to obtain weapons of mass destruction, but also that they will turn cars into bombs and drive them into airports. We must prevent extremists from building suicide vests, but must also stop them from gunning down soldiers at Fort Dix or blowing up a pipeline at JFK.
Our current landscape remains treacherous. So what do we do? There is no simple answer. Dozens of papers and books have been written about potential solutionsmany of them by you.
One critical aspect of our response is intelligence, especially intelligence that we gather from sources and wires. Our primary goal is the same as it has always been: to find out what terrorists are planning by intercepting their communications and working with human sources.
This has become more difficult due to advances in technology, from untraceable cell phones to undetectable online communications. We need our laws to be as modern as our technology so that we can do our jobs, while always respecting the civil liberties we are sworn to protect.
We have dramatically improved our recruitment and use of human sources since 2001. Human sources have provided us with valuable information, and the need for these assets continues to grow. But we are witnessing the evolution of terrorist cells that are increasingly immune to traditional intelligence collection. We need stronger weapons to find and neutralize them.
We in the FBI believe the most effective of these weapons is our partnerships. Not just here within the United States, but partnerships that stretch across the globe, from a Joint Terrorism Task Force in Albany to a battlefield in Afghanistan.
Combating terrorism is not a matter of applying either military strength or intelligence assets or law enforcement tools. The old dichotomies between law enforcement and intelligence, and between law enforcement and the military, no longer apply. Combating terrorism requires a combination of all these resources, and not just within our borders. Threats can originate from anywhere on the map. And they often overlap the jurisdictions of militaries, intelligence services, and law enforcement agencies.
Let me give you a real-life example of how our interestsand our casesare intertwined.
In April 2005, two college students from Atlanta allegedly traveled to Washington, D.C., to record videos of potential targets, including the Capitol and the World Bank headquarters. One of them subsequently traveled to Pakistan to seek terrorist training.
The other traveled to Bangladesh to continue his terrorism-related activities. They have since been arrested and indicted on charges of conspiracy to provide material support to terrorists. Thats one thread.
Six months later, a Swedish national and a Danish man were arrested in Bosnia. They were found with plastic explosives and were preparing to bomb targets in Europe. Thats our second thread.
And in June 2006, Canadian officials arrested 17 individuals, who were part of a homegrown cell known as the Toronto 17. This group had acquired bomb-making materials and planned to attack a number of targets in Canada. Thats the final thread.
Three different cases, spanning at least seven countries. These individuals seemed unrelatedbut they were not. At the center of this web was a figure that seemed to exist only in cyberspace. He called himself Irhabi 007. Translated, this means Terrorist 007.
This individual facilitated communications among the groups. He then posted thousands of files online, from videotaped beheadings to detailed manuals for constructing car bombs and suicide vests. He taught not just the ideology, but the technology of terrorism.
Who was this terrorist facilitator? One might think he was a veteran of the Afghan training camps, or a lieutenant to Osama bin Laden. Instead, a phone number found in the safe house used by the Bosnian terrorists led to a basement apartment in London. There, British authorities found Irhabi 007. His real name was Younis Tsouli. He was then a 22-year-old student. He is now a guest of Belmarsh Prison in the U.K.
While examining his computer, authorities discovered the surveillance videos of the Washington targets that had been filmed by the two subjects from Atlanta. Investigators also found that Tsouli had been in steady communication with the plotters in Canada, Denmark, Bosnia, and the United States.
He used his computer skills to develop a global virtual network for terrorists and their supporters. And it took a global network of law enforcement and intelligence agencies to unravel these disparate plots and bring those responsible to justice.
Officials from the United States to Britain, from Denmark to Canada, and from Bosnia to Bangladesh all coordinated our respective investigations. We made joint decisions as to when to move in and disrupt the plots, so as to protect the integrity of each others operations.
This is the future of counterterrorism. We are seeking terrorist leaders in foreign bases, and also lone actors in suburban basements, and also small but sophisticated groups who want to carry out terrorist attacks. The threat exists not only in the mountains of Pakistan, but also in the shadows of the Internet.
No one agency or country can do it alone. And this is where the FBI can play a critical role. Our responsibilities place us at the intersection of the military, intelligence, and law enforcement communities.
For example, the FBI has many employees currently stationed in Iraq and Afghanistan. They work side-by-side with the military on the front lines. They work as a team to interview detainees, search safe houses, collect biometric evidence, analyze explosive devices, and trace terrorist financing.
We are also fully integrated in the intelligence community, under the Director of National Intelligence. We work shoulder-to-shoulder with the CIA and the Department of Homeland Security.
And just as important, we share information on a daily basis with our intelligence counterparts on every continent, from MI5 in Britain to the Mabahith in Saudi Arabia. The Saudis have been particularly strong partners in addressing terrorism and terrorism financing in the Kingdom and around the world.
We have 56 field offices throughout the United States, and we work closely with our 800,000 state and local law enforcement partners. But we also have 60 offices in cities around the world. Our agents and analysts in these Legal Attaché offices work closely with their foreign counterparts, acting as liaisons, sharing intelligence, and providing investigative support.
The intelligence we need to prevent a terrorist attack here in New York might well come from a source in the Netherlands or a fragment of a note found in Najaf. The FBIs operational responsibilities span the realms of Americas law enforcement, intelligence, and military operationsand extend across the globe. And so our goal is to be an effective bridge. Our mission is to serve all our partners, so that together, we may protect all our citizens.
As members of the Council on Foreign Relations, you have long understood that the answers to Americas most pressing concerns would lie in great part outside our borders. The incorporating charter of the Council describes your mission this way: to afford a continuous conference on international questions affecting the United States.
For more than 85 years, the Council has done just that. It has laid the groundwork for critical public discourse. And it has provided a forum for the best minds to come together and discuss the most important foreign policy issues facing America. When the Council was established back in 1921, the FBI had only been in existence for 13 years. No one could have imagined the changes that lay ahead or the grave threats that we would face in the next century.
Today, those threats emanate from both inside and outside our borders. And combating them defies traditional metrics of war. We like to measure progress: How many terrorists have we caught? How many plots have we disrupted? How much money have we frozen?
But it is difficult to measure progress in counterterrorism. We cannot quantify freedoms protected and lives saved. We cannot gauge the absence of fear. We cannot measure the lack of damageother than saying, None of our cities was attacked; none of our citizens was harmed; none of our security was penetrated today.
Yet this is our definition of success, however imperfect. Over the past six years, we have made substantial progress against our enemies. But we cannot allow ourselves to become complacent. While we guard against terrorism every day, we must recognize that we may be attacked again. Terrorists have attacked other nations. And they still want to attack us.
We are safer. But we are still not safe. And yet our path is clear.
President Woodrow Wilson once said, The history of liberty is a history of resistance.
We are on the side of liberty. And so we will continue to resist oppression, and guarantee safety. We will continue to resist tyranny, and secure justice. We will continue to resist terrorism, and defend liberty.
The struggle against terrorism will not end in a single, decisive battle. It may persist for generations, and we may have setbacks along the way. It will demand more than technology and intelligence and even partnerships. It will demand the continued resolve and resistance of the American people and the FBI.
This struggle will be hard fought and hard wonbut it will be won. And we in the FBI will do everything in our power to continue to write the history of liberty.
# # # #
Executive Speeches | Press Room Home
28 September 2007
“Oussama Kassir reflux”
Note: See graphics at link above.
ARTICLE SNIPPET: “Shortly after these graphics were released, individuals were arrested in Bosnia and Denmark in connection to a plot to launch a terrorist attack in Europe. This was the same round of arrests that put Irhabi007 and Co. behind bars.”
El Ekhlass terrorist forum is leading the way on this “Internet Jihadi Attack”; they already have many thread on it in the last few weeks with hundred of posts. They are very serious about it. Under this attack plan they have one opeation named after “Irhabi007” (Terrorist 007), the infamous internet terrorist whose real name is Younis Al Tsouli.
97 posted on 10/30/2007 4:24:11 PM PDT by jveritas (God bless our brave troops and President Bush)
Three men helped to distribute films of beheadings and bomb-making instructions to be used for attacks on non-Muslims, a court has heard.
One of the young al-Qaeda followers was told to think about the suicide bombers in Iraq his online terrorist propaganda was inspiring, the court heard.
Younes Tsouli, 23, is one of three accused of distributing the films.
Mr Tsouli told co-defendant Mr Mughal that he wanted to “stand in the trenches” in Iraq, Woolwich Crown Court heard.
Mr Ellison said that Mr Mughal added: “A lot of the funding that the brothers are getting is coming because of the videos. Imagine how many have gone (to Iraq) after seeing the videos. Imagine how many have become shahid (martyrs).”
The court also heard two men arrested in Bosnia for possessing a video thought to be a blueprint for attacks on “non-believers” in countries which had sent troops to Iraq may have been in contact with the men.
messages obtained from Mr Tsouli’s computer related to the design of a “mujahideen badge” needed before the anniversary of the 11 September attacks.
Authorities in London say Tsouli had a Microsoft PowerPoint file entitled carbombzip and a file containing six video clips of Washington, D.C. Additional material carried details of chemical, biological, nuclear and radiological equipment, according to prosecutors.
Mughal allegedly kept notes on chemicals and instructions for preparing a suicide belt, AP reported. Prosecutors say al-Daour had computer files with information on making explosives and use of rocket-propelled grenades, along with books and recipes for poisons and explosives.
“HOW AWARE ARE YOU?
Of the Dangers of the ‘Net”
ARTICLE SNIPPET: “ The growing intersection of terror and the web. Take the case of Younis Tsouli, the self-styled Terrorist 007 who not only served as an al Qaeda webmaster but also hacked into servers to get additional bandwidth, used phishing schemes to steal credit card accounts and buy $3 million worth of terrorist equipment, and created a website that he hoped would become the YouTube for terrorists called You bomb it. Could you fall for a scam or run a server that could end up helping terrorists?”
22 December 2007
“IRHABI007 & CO. TO REMAIN ON HOLIDAY IN BELMARSH FOR AN EXTENDED PERIOD OF TIME”
Last Updated: Tuesday, 18 December 2007, 17:39 GMT
“Longer sentences for al-Qaeda men”
ARTICLE SNIPPET: “Three men linked to al-Qaeda, who admitted inciting terrorist attacks against non-Muslims via the internet, have had their sentences increased.
Younes Tsouli, 24, had a 10-year jail term raised to 16 years, while Waseem Mughal, 24, had seven-and-a-half-years lengthened to 12.
And Tariq Al-Daour, 22, originally jailed for six-and-a-half years, had his term increased to 10 years.
The Court of Appeal agreed the original terms were “unduly lenient”.
The decision was taken after being referred under the Unduly Lenient sentence scheme by Vera Baird, the Solicitor General.”
ARTICLE SNIPPET: “Computers, notebooks and digital storage media were seized when police raided the homes of the three men.
They were originally sentenced in July.”
To: nwctwx; Cindy
The following download links to a document in either PDF or DOC format were posted to the Yahoo! Group mujahidat_group today.
MS Word .doc
162 posted on 01/05/2008 5:02:55 PM PST by LayoutGuru2 (Know the difference between honoring diversity and honoring perversity? No? You must be a liberal!)
[ Post Reply | Private Reply | To 2 | View Replies | Report Abuse ]
Thank you for the links LayoutGuru2.
163 posted on 01/05/2008 5:15:27 PM PST by Cindy
[ Post Reply | Private Reply | To 162 | View Replies | Report Abuse ]
stepping back in time...
04 February 2005
IRHABI007S BIG LIST O YAHOO GROUPS
164 posted on 01/05/2008 5:25:19 PM PST by Cindy
[ Post Reply | Private Reply | To 163 | View Replies | Report Abuse ]
stepping back in time...
11 January 2005
MESHAWIRS FAVORITE EGROUPS
165 posted on 01/05/2008 5:29:12 PM PST by Cindy
January 09, 2008
DARN THOSE WACKY MUSLIM BOYZ
Irhabi007 and friends are having entirely too much fun in Belmarsh.
Al-Qaeda plot to kill prison warder foiled
Posted on 09 January 2008 @ 22:55 GMT
“Al-Qaeda plot to kill prison warder foiled
EXCLUSIVE: ‘Muslim Boys’ jail gang planned attack”
By Stephen Moyes 08/01/2008
Thanks to Calpernia for the ping to this thread:
“FBI: Atlanta, Canada terror suspects met”
By HARRY R. WEBER, Associated Press Writer
Mon Jan 14, 5:40 PM ET
ARTICLE SNIPPET: ATLANTA - Two U.S. citizens accused of plotting to attack civilian and government targets shot “casing videos” of Washington landmarks that were found on a terrorism suspect’s computer in Britain and met with suspects in a Canadian terrorism case, an FBI agent testified Monday.
Agent Mark Richards testified that the videos of the U.S. Capitol and other Washington landmarks taken by Syed Ahmed and Ehsanul Sadequee were found on a computer belonging to Younis Tsouli, a Moroccan-born man who pleaded guilty in Britain in July to inciting others to commit acts of terrorism.
Richards also said Ahmed and Sadequee, during a trip to Toronto in March 2005, met with several of the 17 people charged in a June 2006 Canadian terrorism sweep. Charges against the suspects in the Canadian case include participating in a terrorist group, importing weapons and planning a bombing.”
URL goes to article above in post no. 96:
U.S. Thwarts 19 Terrorist Attacks Against America Since 9/11
Smiling at you...and probably more threats we don’t even know about have been resolved.
That’s a very good feeling.
Note: The following text is a quote:
16 January 2008
“IF YOURE A TERRORIST AND YOURE DEPENDENT ON THE INTERNET, I HAVE BAD NEWS”
Posted on 16 January 2008 @ 03:30
From The Times
January 16, 2008
“The extraordinary story of the solitary computer geek in a Shepherds Bush bedsit who became the worlds most wanted cyber-jihadist”
ARTICLE SNIPPET: “Once you get on to one guy whos important in a network, because the structure of a network is flat . . . you get everyone hes connected to, Aaron Weisburd explains. In the old days a terrorist organisation would have a much more hierarchical structure, you would have tight little cells and one guy would know maybe one person one step up and maybe one person one step down, but thats it. In a network structure, if you get the right guy the whole thing goes down.
Thats exactly what happened with Tsouli. His arrest has been linked to a series of others around the world, including the arrest of 17 men in Canada in June 2006 and the two Americans who travelled to Washington. There have also been arrests and convictions here in the UK of individuals who visited Tsoulis web forums.
Others have tried to take Irhabi 007s place, even paying homage to him and using similar names. But no one has been able to fill his shoes and al-Qaeda has been forced to use teams of people to replicate what that one young man did from his bedroom in Shepherds Bush. No one has matched his influence on the web: they have learnt to keep a lower profile than the celebrity-conscious Tsouli. Keep in mind, those were some pretty big shoes and his name is still being talked about on the internet now like hes a god, Evan Kohlmann says.
The cat-and-mouse game continues: one in which the teenage and twentysomething supporters of al-Qaeda often have the upper hand over law enforcement and intelligence officers, who often come from a different, less computer-savvy generation. But for other wannabe internet terrorists, the cyber-trackers are still out there. As Aaron Weisburd puts it: If youre a terrorist and youre dependent on the internet, I have bad news.
Terrorist 007 is on Newsnight on BBC Two tonight at 10.30pm, and on Our World on BBC News24 on Saturday (2.30 and 9.30pm) and Sunday (2.30pm)”
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.