Excellent article -- one correction:
-
assam.com, believed to be linked to al Qaeda (originally hosted by the Scranton company BurstNET Technologies, Inc.), served as a mouthpiece for jihad in Afghanistan, Chechnya, and Palestine. [Note from JohnathanRGalt: misspelled, should be Azzam.com -- now called Waaiqiah.com (site currently offline -- but currently provides news feeds to Mosques and pro-jehad websites). ]
To: *JIHAD IN AMERICA; abner; riri; eastsider; akash; Angelus Errare; ex-Texan; Bobibutu; Bad~Rodeo; ...
Jehadi website ping: (let me know if you want on or off)
2 posted on
02/27/2003 8:08:55 PM PST by
JohnathanRGalt
(---- Fight Islamist CyberTerror at: http://haganah.org.il/haganah/index.php ----)
To: JohnathanRGalt
Damn...that is a long one. Ok...Let's see what I can fill in:
>>The Internet can be used anonymously, or as a shell game to hide identities
At the cyber cafes or where ever the computer has more than one user. Notes are kept with multi log on names. It isn't always the same person using the profiles created. But the same contact list is shared.
>>The Internet can be used to spread disinformation
No comment needed. Obvious to us.
>> The Internet can help a poorly funded group to raise money
We have seen this...no comment needed.
>>The fighters in the Russian breakaway republic of Chechnya have used the Internet to publicize banks and bank account numbers to which sympathizers can contribute.
NOT just the Russians. The Jihaders use Western Union...Band transfers only with International banks. Small amounts are never looked out twice.
>> The Internet is an outstanding command and control mechanism.
Talk to Saudi through C.U-See.Me They prefer this method for some reason.
>> The Internet is a recruiting tool.
We see that with the sympathizers. To gain access to USA...now using profiles to marry women...search out multi level marketers...sponsoring through this means gains sponsoring access.
>> The Internet is used to gather information on potential targets.
Target material is distributed during weekly meetings the Jihaders have at their homes once a week.
>> The Internet can be used to send hidden messages.
Obviously. New Muslim ecards are used now for short messages.
>> The Internet can be used to disrupt business.
Some IT techs overseas developed software that breaks firewalls. I don't understand it enough to explain. Has to do with a MS NT code. Not affective in Linux/Unix though.
>> The Internet can mobilize a group or diaspora, or other hackers to action.
Code threads for hacking that are started are stored on some sites...when one hacker goes offline...the script is picked up by the next that goes online.
ok. I think I covered what I know here.
4 posted on
02/27/2003 8:37:58 PM PST by
Calpernia
To: LakerCJL
bump for later
6 posted on
02/27/2003 11:45:52 PM PST by
LakerCJL
To: JohnathanRGalt
Excellent article, and good catch. I urge you to forward your correction to
Parameters if you have not done so already.
Duty. Honor. Country.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson