''e-jihad''

Published: 7 February 2001 y., Wednesday
Osama bin Laden and other Muslim extremists are posting encrypted, or scrambled, photographs and messages on popular Web sites and using them to plan terrorist activities against the United States and its allies, U.S. officials say. The officials say bin Laden and his associates are using the Internet to conduct what some are calling ''e-jihad,'' or holy war. Bin Laden, a dissident Saudi businessman, has been indicted for the bombing in 1998 of two U.S. embassies in East Africa and is believed to be behind the bombing of the USS Cole in Yemen on Oct. 12. Four alleged bin Laden associates went on trial Monday in New York for the embassy bombings. ''To a greater and greater degree, terrorist groups, including Hezbollah, Hamas and bin Laden's al Qaida group, are using computerized files, e-mail and encryption to support their operations,'' CIA Director George Tenet wrote last March to the Senate Foreign Relations Committee. The testimony, given at a closed-door hearing, was later made public. Officials and experts say the messages are scrambled using free encryption programs set up by groups that advocate privacy on the Internet. Those same programs also can hide maps and photographs in an existing image on selected Web sites. The e-mails and images can only be decrypted using a ''private key,'' or code, selected by the recipient. Through weeks of interviews with U.S. law-enforcement officials and experts, USA TODAY has learned details of how extremists hide maps and photographs of terrorist targets -- and post instructions for terrorist activities -- in sports chat rooms, on pornographic bulletin boards and other popular Web sites. The officials, who declined to name the sites, say it is extremely difficult to intercept the coded messages.
Šaltinis: usatoday.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Web sites prey on rivals' stores

A growing number of online companies are ambushing competitors through software that puts ads where marketers want them most--in front of customers visiting rival Web sites. more »

IE 6 to launch on 15 August

Internet Explorer 6 is due to go gold next week and will be released on August 15 as a standalone program, according to software development sites. more »

Microsoft Unveils Content Management Server 2001

Another .NET enabled product has left the stables at Redmond. more »

Ex-hacker knows how worm turns

The worm has kept Josef Chamberlin busy at the keyboard, operating on only snippets of sleep, many recent days and nights. more »

The (Instant) Message is Clear

If you need to reach someone at his or her office, the phone--we now know--is not the best way to do it. E-mail is easier and more popular, as evidenced by the deluge of messages with which cube dwellers are greeted each morning as they log onto their com more »

Europeans warm to buying cars online

Over a third of European Internet users are ready to buy a car on the Internet, according to a new study. more »

Telia will not appeal UMTS license decision

Sweden must maintain the pace of its UMTS network rollout more »

Turning the CodeRedWorm into Profits

While the Federal Bureau of Investigation and network security advocates are busy mobilizing IT managers around the country for the upcoming outbreak of the Code Red Worm, one resourceful Web site operator from the Utrecht in the Netherlands stands to mak more »

'Code Red' worm may re-emerge on Internet Tuesday

The fast-spreading ``Code Red'' Internet worm, which disrupted U.S. government Web sites last week, is likely to start multiplying again on Tuesday and could slow down the Internet, officials said on Monday. more »

search.lt news

search.lt presents newest links more »