''e-jihad''

Published: 7 February 2001 y., Wednesday
Osama bin Laden and other Muslim extremists are posting encrypted, or scrambled, photographs and messages on popular Web sites and using them to plan terrorist activities against the United States and its allies, U.S. officials say. The officials say bin Laden and his associates are using the Internet to conduct what some are calling ''e-jihad,'' or holy war. Bin Laden, a dissident Saudi businessman, has been indicted for the bombing in 1998 of two U.S. embassies in East Africa and is believed to be behind the bombing of the USS Cole in Yemen on Oct. 12. Four alleged bin Laden associates went on trial Monday in New York for the embassy bombings. ''To a greater and greater degree, terrorist groups, including Hezbollah, Hamas and bin Laden's al Qaida group, are using computerized files, e-mail and encryption to support their operations,'' CIA Director George Tenet wrote last March to the Senate Foreign Relations Committee. The testimony, given at a closed-door hearing, was later made public. Officials and experts say the messages are scrambled using free encryption programs set up by groups that advocate privacy on the Internet. Those same programs also can hide maps and photographs in an existing image on selected Web sites. The e-mails and images can only be decrypted using a ''private key,'' or code, selected by the recipient. Through weeks of interviews with U.S. law-enforcement officials and experts, USA TODAY has learned details of how extremists hide maps and photographs of terrorist targets -- and post instructions for terrorist activities -- in sports chat rooms, on pornographic bulletin boards and other popular Web sites. The officials, who declined to name the sites, say it is extremely difficult to intercept the coded messages.
Šaltinis: usatoday.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Lawmakers Call for Cybersecurity Enhancements

As the 108th Congress scrambles in its final days to address homeland security issues, U.S. Reps. Mac Thornberry and Zoe Lofgren are focusing on the state of U.S. cybersecurity more »

New Worms Sniff For Passwords

Security firms are warning of a new series of Sdbot worms that install a "sniffer" component to steal passwords from unsuspecting users more »

Sender ID in Limbo

Microsoft's undeclared patent claims on Sender ID technology is holding up adoption of the e-mail authentication specification more »

search.lt news

search.lt presents newest links more »

Microsoft Wins 'Tabbed Browsing' Patent

Microsoft has been granted a patent from the U.S. Patent and Trademark Office on a process known as tabbing through a Web page in order to find links more »

search.lt news

search.lt presents newest links more »

UzJilSberBank Introduces Plastic Cards at AGMK

UzJilSberBank (Uzbek housing construction bank) completed a project of introduction of plastic cards at Almalyk Mining and Smelting Combine more »

Copyright Law and Data Extraction

Recent decisions suggest that U.S. courts are more likely to protect an online database if the work involved was tilted towards the compilation of data itself as opposed to the technology used to gather it more »

Florida Says E-Vote Primary A-OK

Touch-screen machines brought in to replace the punch-card ballots at the center of the 2000 presidential fiasco appeared to work smoothly in primary voting Tuesday more »

Hackers continue to experiment with 64-bit viruses

Shruggle virus could be 'a taste of things to come', warn experts more »