Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: JohnathanRGalt
Damn...that is a long one. Ok...Let's see what I can fill in:

>>The Internet can be used anonymously, or as a shell game to hide identities

At the cyber cafes or where ever the computer has more than one user. Notes are kept with multi log on names. It isn't always the same person using the profiles created. But the same contact list is shared.

>>The Internet can be used to spread disinformation

No comment needed. Obvious to us.

>>• The Internet can help a poorly funded group to raise money

We have seen this...no comment needed.

>>The fighters in the Russian breakaway republic of Chechnya have used the Internet to publicize banks and bank account numbers to which sympathizers can contribute.

NOT just the Russians. The Jihaders use Western Union...Band transfers only with International banks. Small amounts are never looked out twice.

>>• The Internet is an outstanding command and control mechanism.

Talk to Saudi through C.U-See.Me They prefer this method for some reason.

>>• The Internet is a recruiting tool.

We see that with the sympathizers. To gain access to USA...now using profiles to marry women...search out multi level marketers...sponsoring through this means gains sponsoring access.

>>• The Internet is used to gather information on potential targets.

Target material is distributed during weekly meetings the Jihaders have at their homes once a week.

>>• The Internet can be used to send hidden messages.

Obviously. New Muslim ecards are used now for short messages.

>>• The Internet can be used to disrupt business.

Some IT techs overseas developed software that breaks firewalls. I don't understand it enough to explain. Has to do with a MS NT code. Not affective in Linux/Unix though.

>>• The Internet can mobilize a group or diaspora, or other hackers to action.

Code threads for hacking that are started are stored on some sites...when one hacker goes offline...the script is picked up by the next that goes online.

ok. I think I covered what I know here.
4 posted on 02/27/2003 8:37:58 PM PST by Calpernia
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Calpernia
>>• The Internet can be used to send hidden messages.
Obviously. New Muslim ecards are used now for short messages.

An ecard cannot be traced back to the sender -- it would have the IP address of the ecard website. I wonder if they are using steganography in the ecards.

5 posted on 02/27/2003 9:34:53 PM PST by JohnathanRGalt (---- Fight Islamist CyberTerror at: http://haganah.org.il/haganah/index.php ----)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: Calpernia; JohnathanRGalt
Talk to Saudi through C.U-See.Me They prefer this method for some reason

You probably already know all this, but what you're doing sounds so important I'll add my 2 cents just in case.

CU-SeeMe is video-messaging. They can verify visually 100% exactly who is on the other end. No risk that they could be talking to a Fed agent who got their hands on password/encryption key/computer of the other bad guy. Not only peer-to-peer, but developed by Cornell University, fortress of free speech. Less possibility of snooping or or cooperating with U.S. Govt than there could be with NetMeeting, for example. Don't know if any of this is new to you, probably not ;-)

May I be on your ping list please? (I used to do some Internet investigative work and lecturing, I'd be very interested in this in articles about this issue.)

10 posted on 02/28/2003 5:48:29 AM PST by Tamzee (There are 10 types of people... those who read binary, and those who don't.)
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson