PDA

View Full Version : U.S. Web site said to offer strengthened encryption tool for al-Qaeda backers



OMEN
01-24-2008, 11:17 AM
Update of year-old software available on password-protected site, researchers say
An Arabic-language Web site hosted on a server located in Tampa, Fla., is apparently offering a new version of software that was designed to help al-Qaeda supporters encrypt their Internet communications.

The new encryption tool is called Mujahideen Secrets 2 and appears to be an updated version of easier-to-crack software that was released early last year, said Paul Henry, vice president of technology evangelism at Secure Computing Corp. in San Jose.

The tool is being distributed free of charge on a password-protected Web site that belongs to an Islamic forum known as al-Ekhlaas, according to Henry and a blog posting by the Middle East Media Research Institute. MEMRI is a Washington-based organization that monitors what it describes as jihadist Web sites and publishes translations of online content originally posted in Arabic, Persian or Turkish.

Henry said that he contacted the FBI about the al-Ekhlaas site and its contents last weekend. But as of this afternoon, the site was still up and running. Prior to being hosted on the server in Tampa, the site appears to have been run off of a system in Minnesota, Henry said.

MEMRI identified the Web hosting firm that owns the server on which the al-Ekhlaas site is running as Tampa-based Noc4hosts Inc. Officials from the hosting firm didn't immediately return calls to a general toll-free number listed on its Web site.

Because of the password protection, Henry hasn't been able to download the new tool and therefore can't say what level of encryption it supports. But he said that a banner ad on the site claims that the software offers the highest level of encryption now available. That means it likely uses at least 1024-bit encryption, whereas the first version of Mujahideen Secrets used 256-bit AES encryption, he said.

A Reuters story posted Jan. 18 and datelined Dubai quoted the al-Ekhlaas Web site as saying that the new release was a "special edition" of the encryption tool created "in order to support the mujahideen in general and the Islamic State in Iraq in particular." That organization was described by Reuters as being linked to al-Qaeda.Efforts by groups that support al-Qaeda to develop their own encryption tools appear to be driven by concerns about possible back doors being built into publicly available encryption software, Henry said. He added that the upgraded Mujahideen Secrets tool could cause problems for law enforcement and antiterrorism agencies that are tracking the activities of such groups.

"Up to this point in time, we have been able to discount al-Qaeda's use of the Internet as an attack vehicle because of their use of outdated and easily thwarted technologies," Henry said. But, he warned, that could begin to change if al-Qaeda backers start adopting more up-to-date tools.

MEMRI posted a notice last January about the release of the original version of Mujahideen Secrets. The initial release was announced by the Global Islamic Media Front on Jan. 1, 2007, according to MEMRI. It noted that the GIMF advertised the tool as "the first Islamic computer program for secure exchange [of information] on the Internet" and went on to say that the software provided users with "the five best encryption algorithms, and with symmetrical encryption keys (256 bit), asymmetrical encryption keys (2048 bit) and data compression."

Last February, MEMRI also posted an analysis of so-called electronic jihad activities. According to the institute, radical Islamic groups have been trying over the past few years to carry out coordinated attacks against Web sites belonging to organizations that they consider to be their enemies. "As evident from numerous postings on the Islamist Web sites, many of these coordinated attacks are organized by groups devoted to electronic jihad," MEMRI wrote in its analysis.

Six prominent electronic jihad groups have emerged on the Internet, according to MEMRI, which said that four of them had their own Web sites "through which they recruit volunteers to take part in electronic attacks, maintain contacts with others who engage in electronic jihad, coordinate their attacks and enable their members to chat with one another anonymously."

Among the content available on one of the sites was a document explaining how to carry out electronic jihad attacks, along with technical information about the software needed to do so and descriptions of previous attacks and their results, MEMRI said.

[I]Compworld