Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Al-Qaeda hid coded messages on porn websites
The Times (U.K.) ^ | 10/06/2001 | DANIEL MCGRORY

Posted on 10/05/2001 5:02:12 PM PDT by Pokey78

A SCRIBBLED notebook belonging to a suspected master bomber is thought to contain secret codes that could help intelligence agencies to decipher messages sent by Osama bin Laden’s al-Qaeda network.

FBI and French computer experts are studying the Arabic script found hidden in the Paris apartment of Kamel Daoudi, a gifted computer student who was allegedly plotting suicide bomb attacks on the US Embassy in the city and Nato headquarters.

A security expert said that if it proved to be an al-Qaeda codebook then its value could be compared with the discovery of the Germans’ Enigma code in the Second World War. FBI chiefs think terrorists cells have been using codes to disguise their electronic mail and to hide maps and instructions on sports chat rooms, pornographic websites and photographs sent over the Internet.

Intelligence agencies have no doubt that al-Qaeda uses electronic camouflage to keep in touch with its network of agents.

Pornographic websites were used to send messages because there are so many and that is the last place Islamic fundamentalists would visit. Al-Qaeda uses what is known as steganography to bury secret information inside other messages.

Several of the September 11 hijackers were frequent visitors to libraries and Internet cafés in Florida where it is believed they were sent their coded final orders.

They bought tickets online for the aircraft they seized, used the Internet to study whether crop-dusting aircraft could be used to deliver a chemical attack and sent hundreds of e-mails.

One woman remembers Mohammed Atta, the hijack leader, spending a long time at a computer terminal in a public library downloading what looked like holiday photographs but which are now suspected of containing hidden messages.

Alexis Debat, a former French Defence Ministry official who disclosed the book’s discovery yesterday, said that intelligence teams “may be able to go back to the messages that they may have intercepted already but couldn’t do anything with”.

British security agencies are understood to be investigating whether Mr Daoudi had access to computers while he was in hiding in Leicester for a week. He fled there from Paris hours after the US attacks when he was tipped off that he faced imminent arrest.

The electronic traffic used by terrorists was already troubling the FBI in the months leading up to September 11. Militant groups have been using websites for recruitment and fundraising.

More worrying is the suspicion that they are using message-scrambling techniques to plan and communicate in relative anonymity.

Subpoenas and search warrants have been handed to major Internet companies such as AOL, Microsoft, Earthlink, Yahoo!, Google, NetZero, Travelocity and many smaller providers.

Dan Greenfield, vice-president of Earthlink, said a warrant issued under the Foreign Intelligence Surveillance Act allowed authorities to monitor e-mail, chatrooms and websites of one of their users.

The most solid evidence may lie buried in the Internet providers’ log files. These can be used to track the dates and times of log-ins for each account and may be able to help the FBI to locate the computers used.

So many “digital clues” have been sent to the FBI that its computer forensic team working on the 11th floor of their headquarters on Pennsylvania Avenue have had to draft in an extra 50 experts from other government agencies.

Their role is to uncover on-line clues as to how al-Qaeda operates and who its remaining “sleepers” might be in the West, but also to guard against electronic mail being used to launch another suicide attack.

Al-Qaeda’s agents are believed to use encrypted e-mails where the person receiving the message alone has the electronic key to open it. That agent would pass on that electronic key only to those he wanted to contact through encrypted e-mail.

During the past three weeks federal officials have visited libraries from Florida to Virginia, culling log-in sheets and seizing computer equipment on which the hijackers and their associates logged time.

Mr Daoudi, 27, who has been deported to France from England, is thought to have spent time in training camps in Afghanistan before returning to France this summer.

Police searching his apartment where the codebook was hidden are said to have found the frames of cellular phones and dismantled alarm clocks, leading them to believe that someone there was working on a detonation mechanism.

His apartment in Essonne was previously occupied by Djamel Beghal, a suspect arrested in Dubai, whom French investigators say revealed the names of Mr Daoudi and other accomplices.


TOPICS: Foreign Affairs; News/Current Events
KEYWORDS:

1 posted on 10/05/2001 5:02:12 PM PDT by Pokey78
[ Post Reply | Private Reply | View Replies]

To: Pokey78
Big Bang Bump.
2 posted on 10/05/2001 5:04:46 PM PDT by Howlin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pokey78
As I recall from my vast research of many many hours of the history channel, the great benefit from breaking the Enigma code came from the fact that the Germans thought Enigma was still secure, so they continued to transmit with it. Surely we wouldn't tell the press we had broken the code.
3 posted on 10/05/2001 5:07:56 PM PDT by TN4Liberty
[ Post Reply | Private Reply | To 1 | View Replies]

To: TN4Liberty
bttt
4 posted on 10/05/2001 5:12:28 PM PDT by vbmoneyspender
[ Post Reply | Private Reply | To 3 | View Replies]

To: TN4Liberty
Yeah. This is really slick. Interesting info on the one hand, but whoever let this out should be bitch-slapped.

On a lighter note, I'll never view porn in the same way again...

5 posted on 10/05/2001 5:14:04 PM PDT by billsux
[ Post Reply | Private Reply | To 3 | View Replies]

To: Pokey78
Ever get the feeling that these guys have a thing for western women? I suppose it's a backlash thing from self imposed woman hating that they unleash on their own kind
6 posted on 10/05/2001 5:49:56 PM PDT by TADSLOS
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pokey78
These can be used to track the dates and times of log-ins for each account and may be able to help the FBI to locate the computers used

This may scare people more then a potential biological attack!

7 posted on 10/05/2001 6:14:05 PM PDT by Sir_Humphrey
[ Post Reply | Private Reply | To 1 | View Replies]

To: TADSLOS
Pornographic websites were used to send messages because there are so many and that is the last place Islamic fundamentalists would visit.

Actually, they really don't avoid 'em at all. The odd thing, to me, has always been the sexual hypocracy of fundamentalist types. I remeber in college that "religious" Islamists and others--like "morally conscious"--Chinese in my college days would always be chiding about the the "moral decadence" of the west. But, I'd often discover that these very people would spend a lot of time whackin' off to western-style porn on the sly. Often, they preferred the weirder stuff that's out there. They just can't bring themselves to honestly admit that they're just human. In the end, they try to blame women for their own urges.
8 posted on 10/05/2001 6:19:56 PM PDT by ProbableCause
[ Post Reply | Private Reply | To 6 | View Replies]

To: ProbableCause
Remeber the news reports about how Atta and some of his cohorts went to a strip club the night before the attacks? I wonder what Allah had to say about that one!
9 posted on 10/05/2001 6:23:00 PM PDT by ProbableCause
[ Post Reply | Private Reply | To 8 | View Replies]

To: Pokey78
A security expert said that if it proved to be an al-Qaeda codebook then its value could be compared with the discovery of the Germans’ Enigma code in the Second World War.

This is a hot, steaming load of bovine excrement.

Sorry, but the value of the Enigma code came not only from being able to break it, but also from them NOT KNOWING we were able to break their code.

10 posted on 10/05/2001 6:23:00 PM PDT by xm177e2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pokey78
What,no examples? Darn.
11 posted on 10/05/2001 6:25:06 PM PDT by lds23
[ Post Reply | Private Reply | To 1 | View Replies]

To: lds23
Its probably in the bit patterns like a 2-D bar code....take a look at a UPS or Fed-Ex bar code to see what I mean...

Now I can tell my spouse I am scanning the (porno) for codes...if we all hooked up using our computers on the network (rather like we do now searching for the ultimate porno image) we can crack the code....

Like the SETI program....

12 posted on 10/05/2001 7:03:45 PM PDT by spokeshave
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson