ARSTRAT IO Newsletter

advertisement
Information Operations
Newsletter
Compiled by: Mr. Jeff Harley
US Army Strategic Command
G39, Information Operations Branch
The articles and information appearing herein are intended for educational and non-commercial purposes to promote discussion of research in
the public interest. The views, opinions, and/or findings and recommendations contained in this summary are those of the original authors and
should not be construed as an official position, policy, or Table
decision of
of the
United States Government, U.S. Department of the Army, or U.S.
Contents
Army Strategic Command.
ARSTRAT IO Page on Intelink-U
Table of Contents
Vol. 8, no. 02 (10 – 22 October 2007)
1.
Al-Qaeda: Beginning of the End, or Grasping at Straws?
2.
Mysterious Transmissions Assaulting Israeli Satellite TV Broadcasts
3.
US Army Medics Win Some Hearts and Minds
4.
Information Unit Activated At Norwich Campus
5.
Secret Tech Unit at McChord AFB Guards against Cyber Attack
6.
An Internet Jihad Sells Extremism to Viewers in the U.S.
7.
Sex, Lies and DVDs: Propaganda in the Palestinian Territories
8.
Countering the Art of Information Warfare
9.
Iraqi Insurgent Media Campaign Targets American Audiences
10. Jihadi Forum Users Look for Codes in Bin Laden's September Video
11. U.S.-Financed Radio Stations Try To Reach Listeners in North Korea
12. US Army Enlists Anthropologists
13. New WEP Attack: Caffe Latte Hits Client, Not Access Point
14. Cyber Security Command for India Recommended
15. Countering Information Warfare
16. Congress: Power Grid Defense Is Weak
ARSTRAT IO Page on Intelink-U
Page ii
Al-Qaeda: Beginning of the End, or Grasping at Straws?
By Michael Scheuer, Jamestown Foundation, 10 October 2007
Since early September, there has been a flurry of media reports and commentaries suggesting that
the Saudi religious establishment has turned against Osama bin Laden and al-Qaeda; that a split
has occurred among the Taliban, Ayman al-Zawahiri and bin Laden; and that al-Zawahiri has
pushed bin Laden aside, sidelined him, and seized control of al-Qaeda. Hopefully this troika of alQaeda disasters is deadly accurate, but each merits consumption with a large grain of salt.
The issue meriting the least belief and most suspicion in the West is the reported development of
anti-bin Laden and anti-jihad doctrines among the government-supported Islamist clerics, jurists
and scholars in Saudi Arabia. On September 14, for example, the Saudi Salafi scholar Sheikh
Salman al-Awda published a personal letter to Osama bin Laden—addressing him as "Brother
Osama"—that is critical of the burdens placed on Muslims by al-Qaeda's actions. Sheikh al-Awda
enumerates virtually every problem currently faced by Muslims around the world and appears to
place them at the feet of bin Laden and al-Qaeda. Indeed, it only appears that he is placing them
at bin Laden's feet because Sheikh al-Awda's criticism is not of the fire-breathing variety and he
carefully avoids making any attempt to denigrate bin Laden's character or even gingerly question
his status as a good Muslim. "We are all humans," Sheikh Awda said in reference to bin Laden. "No
matter how much we disagree with any person regardless of his approach, we cannot remove him
from the circle of Islam, unless he commits a sin of unbelief." On this basis, it must be assumed
that al-Awda has concluded that Osama bin Laden is continuing to act within the "circle of Islam,"
which clearly dulls the sharp edge of al-Awda's letter [1].
In addition, al-Awda delineates a version of Islamic theology in condemning al-Qaeda's martial
activities that not only decries war, but makes Islam and its Prophet appear to be pacifist in
orientation. In rewriting Islamic history, for example, the sheikh comes up with the following claim:
"The Prophet, God's prayer and peace be upon him, conquered and subjugated the entire peninsula
without any massacres. In fact, the number of those killed when the Prophet, God's prayer and
peace be upon him, was alive performing his mission—23 years [in length]—was approximately
200 or less, and the number of Muslims among them could be many times as much as their
enemies" [2]. This is simply not true, and one needs only to skim Martin Lings' extraordinary
biography of the prophet—Muhammad, His Life Based on the Earliest Sources—to see the far
greater casualties and deliberate executions resulting from the Prophet's military campaigns [3].
There is every possibility that Sheikh al-Awda's condemnation of bin Laden and al-Qaeda is part of
the Saudi regime's effort to disinform Western governments and publics, and to disguise the fading
domestic authority of the country's religious establishment. Saudi authorities clearly are engaged in
a campaign to create a public record of anti-al-Qaedaism before al-Qaeda's next attack in the
United States. Coming as it does from a man who had been bin Laden's theological role model,
Sheikh al-Awda's letter is meant to convince the West's gullible political leaders and media that
Saudi clerics have changed and now are effectively supporting the West's anti-terrorism campaign.
"Do we not hear the voices of the ulema," al-Awda asks bin Laden in his letter, "the sincere, the
believers, and the worshippers who always remember God shouting and saying the same as the
Prophet, God's prayer and peace be upon him, said when Khalid Bin-al-Walid, the supreme
commander of the Muslim army, made a mistake, 'O God, I dissociate myself from what Khalid
did?...Many of these people, in fact most of them, now say: 'O God, we dissociate ourselves from
what Osama does, and from the deeds of those who work in his name or under his command" [4].
This, of course, is not true on three levels. First, bin Laden and al-Zawahiri have long been waging
an incrementally successful campaign to denigrate the honesty and integrity of what they refer to
as "the scholars of the king," those clerics who will condone anything the Saudi king wants whether
or not it accords with the Quran. Al-Awda, once a pro-Islamist cleric, is now preeminently a
"scholar of the king" and is regarded as such by both the Islamists and many of his own
countrymen. Al-Awda served time after 1994 in Saudi prisons and thereafter emerged much more
Page 1
amenable to the wishes and policies of the al-Sauds, an affect that seems a common post-prison
reality in much of the Muslim world. "My brother Osama," al-Awda wrote in his letter, "brothers of
yours in Egypt, Algeria and other Muslim countries have realized the consequences and dangers of
this road [or jihad], and have found the courage to announce through books, programs, and
internet websites that this road is wrong, and does not leave to the aim, and to ask God Almighty
to forgive them. They have announced their repentance of what has happened" [5]. Sheikh alAwda does not mention that all of these repenters did so after emerging from long residence in
Egyptian, Moroccan and Algerian prisons, and offers no ideas about what caused—perhaps
persuaded is a better word—these men to repent.
Next, the repentant words of Sheikh al-Awda and his now right-thinking clerical colleagues have
little impact on either the Islamists or their supporters, and not much more on the general Muslim
public. This is not because al-Awda and the others are not smart, distinguished and respected men.
It is because they are under the control of the security services of such police states as Saudi
Arabia, Egypt, Algeria, Morocco and Jordan. Islamic law, history and tradition clearly show that
clerics or leaders who repent previously strongly held theological positions while in or after leaving
prison are regarded as having been coerced to do so. They are, therefore, not regarded as credible
and authoritative leaders. Likewise, penitent statements by men living under the control of Islamic
police states are also suspect. In short, al-Awda's letter serves the al-Sauds' disinformation
purposes, but has very little impact on al-Qaeda, its Islamist allies and their supporters [6].
The second issue—a split among the Taliban and al-Qaeda factions led by bin Laden and alZawahiri—also stretches credulity. Stories to this effect have appeared in the London Sunday
Telegraph and Newsweek, and are attributed to Omar Farooqi—who is identified as "a Taliban
liaison officer with al-Qaeda"—and unnamed U.S. and UK intelligence officials [7]. Farooqi's
motivation for providing this information to Western reporters is not described, nor is his rationale
for intentionally trying to damage his Taliban masters and their interests by disclosing the
Islamists' disunity to the West. While there currently is no way to evaluate the accuracy of
Farooqi's claims, realities on the ground in Afghanistan seem to belie them. In just the past month,
for example, President Hamid Karzai's hard-pressed regime has offered to negotiate with the
Taliban; the Taliban and al-Qaeda felt secure enough to hold a conference in Tora Bora, near
NATO's strongest military positions; and Taliban attacks have accelerated in and around Kabul,
including three suicide car bombings in the capital between September 28 and October 6. These
on-the-ground facts do not suggest the Taliban and al-Qaeda are suffering from a debilitating
three-way split [8].
The third issue—al-Zawahiri's pushing aside bin Laden—was broached in the September 9
Washington Post article by Dr. Bruce Hoffman, probably America's most incisive terrorism analyst.
In his essay, Dr. Hoffman argued that "we need to drop our preoccupation with Osama bin Laden"
and understand that America's "most formidable nemesis is not the Saudi terrorist leader but his
nominal deputy, Ayman al-Zawahiri" [9]. Dr. Hoffman claimed that "mounting evidence" shows that
bin Laden had been shoved by al-Zawahiri into "premature forced retirement," and that al-Zawahiri
is now al-Qaeda's main leader, operational strategist and "new public face." As "evidence," Dr.
Hoffman cites the undeniable fact that al-Zawahiri has appeared with much greater frequency than
bin laden in al-Qaeda audio and video tapes, and "Asian intelligence sources" who claim "it has
been two years since bin Laden reportedly chaired a meeting of al-Qaeda's Majlis al-Shura—the
movement's most senior deliberative body."
As an initial response, one could argue that if the foregoing is accurate, the July National
Intelligence Estimate (NIE) was either troublingly ill-informed or disingenuous when it concluded
that al-Qaeda is rebuilt, internationally potent, and operating with bin Laden at the helm. There is
no basis for the NIE to have been as dire as it was if an al-Zawahiri-led coup had just taken place
in al-Qaeda. Counting videos, moreover, hardly seems a sound basis for assessing the status of alQaeda leaders. If it was a reliable tool, then neither bin Laden nor al-Zawahiri would be in the
running for al-Qaeda's leadership because Sheikh Abu Yahya al-Libi has been seen in more videos
in 2007 than either man. As the always precise IntelCenter noted in mid-September, "Abu Yahya al-
Page 2
Libi is now the most visible face of al-Qaeda" [10]. In addition, bin Laden for more than a decade
has demonstrated that he knows something we in the West forgot long ago—the power of silence.
The fact that his recent tapes dominated the media for most of a week shows that bin Laden
remains a master at capitalizing fully on his long periods of silence.
Dr. Hoffman's reference to "Asian intelligence" certainly is interesting, but one must, with respect,
suggest one of four conclusions about its viability: (A) If it is true, U.S. and NATO forces should
have been able to wipe out the Majlis al-Shura and much of al-Qaeda—though not bin Laden—
based on Asian information about the timing and deliberations of the Shura's meetings over two
years; (B) If it is true, and the Majlis has not been destroyed, one of America's Asian allies
apparently did not share highly actionable data with Washington; (C) If it is true, and the Majlis
has not been destroyed, Western authorities must have decided not to attack, perhaps because the
Shura meets in Pakistan; and, (D) The information is not true.
Without the pertinent classified information, we cannot make a definitive evaluation of the "Asian
intelligence" reporting. In addition to the NIE's failure to mention what would inevitably be the
damaging and perhaps fatal impact of al-Zawahiri's takeover, we also have failed to see any
comments from the many al-Qaeda members who have sworn personal allegiance to bin Laden and
have intense personal affection for him. It is nearly inconceivable that such comments would not
have surfaced if al-Zawahiri had forced bin Laden into "retirement." In addition, al-Zawahiri is a
sharp-edged and avuncular personality who is known more for his alienating intellectual inflexibility
and arrogance, Egypt-centrism and imperiousness, rather than such attractive qualities of bin
Laden as his combat experience and war wounds; his personal humility and inclusiveness; and his
soaring almost poetic eloquence in the Arabic language. Al-Zawahiri's personal prickliness was
damagingly divisive when he was the chief of the all-Egyptian group known as the Egyptian Islamic
Jihad—his unilateral decision to join al-Qaeda in February 1998 is only one of many examples—and
these characteristics probably would cause a near-fatal fracturing of the multi-ethnic and
multinational al-Qaeda faster than any other single factor.
Yet, as the saying goes, we should never say never and hope that Dr. Hoffman's sources are
correct. Al-Zawahiri's ascendance from theologian-in-chief—which, as DNI Director Mike McConnell,
said, he has long been—to al-Qaeda's overall leadership potentially would be a major step toward
its final destruction as an effective organization [11]. Aside from the intense animosities that alZawahiri's harsh treatment of bin Laden would earn from the Saudi's loyalists, his arrogance and
Egypt-first orientation would decrease al-Qaeda's focus on the far enemy, the United States.
On this point, it is difficult to find evidence to support Dr. Hoffman's contention that it was alZawahiri who "more than a decade ago, defined al-Qaeda's strategy in terms of 'far' and 'near'
enemies. The United States is the 'far' enemy whose defeat…was an essential prerequisite to the
elimination of the 'near' enemy," the Muslim world's police states [12]. Al-Zawahiri's position
always was that the 'near' enemy—in his case Hosni Mubarak's Egypt—comes first; the EIJ's motto,
in fact, amounted to something akin to "the road to Jerusalem must first pass through Cairo." In
the contest between giving priority to the "near" or the "far" enemy, it was bin Laden who changed
al-Zawahiri's mind, not vice versa [13]. In this light, al-Zawahiri as leader—and the likelihood that
he would favor al-Qaeda's Egyptians for senior positions—would weaken al-Qaeda's U.S. focus and
reawaken the nationalist orientations of al-Qaeda's constituent groups that bin Laden had never
been completely successful in suppressing. This scenario would be undiluted good news for the
United States and it should be ardently desired. There is no evidence at the moment, however, that
we are seeing this delightful scenario play itself out, and we ought to keep in mind what Patrick
Henry once warned against as "the phantom delusions of hope."
Michael Scheuer served as the Chief of the bin Laden Unit at the CIA's Counterterrorist Center from 1996 to 1999 .
Notes
1. Sheikh Salman al-Awda, "Letter to Osama bin Laden," September 14, 2007, www.islamtoday.net, and Turki al-Saheil,
"Reaction to Salman al-Ouda's Bin Laden Letter," Asharq al-Awsat, September 18, 2007.
2. Al-Awda, "Letter to Osama bin Laden," September 14, 2007, op. cit.
Page 3
3. Martin Lings, Muhammad, His Life Nased on the Earliest Sources, Rochester, Vermont: Inner Traditions International,
1983.
4. Al-Awda, "Letter to Osama bin Laden," September 14, 2007, op. cit.
5. Ibid.
6. The recent warning by the Saudi Grand Mufti, Sheikh Abdel-Aziz Al al-Sheikh, against allowing young Saudis to go to Iraq
to fight the U.S.-led coalition and the Shiites is a case in point of the Saudis saying what the West wants to hear. If the
Grand Mufti's strictures were efficiently implemented by the Saudi regime, he and it would be regarded as anti-Islamic by
the bulk of the population, and the country's already numerous anti-al-Saud militants would multiply. A more accurate
gauge of the Saudis' kid-glove handling of jihadis is their recent decision to give $2,600 to each of the 55 Saudis who were
returned by the U.S. from Guantanamo Bay and "temporarily release" them from custody so they could celebrate the endof-Ramadan holiday with their families. See, "Saudi cleric issues warning over Saudi militants," Reuters, October 1, 2007,
and "Saudi to temporarily release 55 former Guantanamo detainees, give them money," Associated Press, October 6, 2007.
7. Sami Yousafzai and Ron Moreau, "Bin Laden losing control of al-Qaeda," reprinted from Newsweek in Pakistan's Daily
Times, September 25, 2007, and "Zawahiri Replaces Bin Laden as al-Qaeda Chief, London Sunday Telegraph, September
16, 2007, reprinted in Ibid., September 17, 2007.
8. Matthew Fisher, "Afghanistan foes ready to tango?" National Post, October 1 2007, and John Ward Anderson, "Attacks by
Taliban increase, approach Afghanistan capital," Boston Globe, September 28, 2007.
9. Bruce Hoffman, "Zawahiri: The man who brought al-Qaeda back," Washington Post, September 9, 2007.
10. Sheikh Abu Yahya al-Libi, "Dots on the Letters," IntelCenter, 12 September 2007.
11. "Zawahiri, not bin Laden, is al-Qaeda 'intellectual leader': intel chief," Agence-France Presse, September 11, 2007.
12. Bruce Hoffman, "Zawahiri: The man who brought al-Qaeda back," op. cit.
13. For a more complete discussion of who influenced who, see Through Our Enemies' Eyes. Osama bin Laden, Radical
Islam, and the Future of America. Revised Edition, Dulles, VA: Potomac Books, 2006, pp. 182-186, and Abdel Bari Atwan,
The Secret History of al Qaeda, Berkeley, CA: University of California Press, 2006, pp. 75-80.
Table of Contents
Mysterious Transmissions Assaulting Israeli Satellite TV Broadcasts
By The Associated Press, International Herald Tribune, 10 October 2007
JERUSALEM: Israeli satellite TV viewers have for the past month had their favorite programs
disrupted by electronic snowstorms, variously said to be caused by the radar of U.N. patrol boats,
Russian spy ships or Israel's military. On Wednesday the satellite TV company was said to be near
collapse.
The interference began on Sept. 6, the day Israeli warplanes slipped past Syria's Russian-made air
defense systems, attacked a military target deep inside the country and escaped unchallenged.
Israeli has maintained an almost total official silence over the strike, which Syria said hit an unused
military installation.
Since then, desperate viewers of "Desperate Housewives," frustrated followers of "The Bold and the
Beautiful" and other TV lovers have been bombarding the switchboard of Israeli satellite
broadcaster "Yes" and have launched a 122 million shekel ($30 million, €21.37 million) class action
suit against the company, for failing to deliver the goods.
The interruptions have led to canceled subscriptions and forced Yes to seek to pacify its half-million
subscribers with free movies. The competing commercial TV distributor, "Hot," uses cables and has
not been affected.
The Haaretz newspaper on Wednesday quoted an unnamed Yes executive as saying the Yes
company would collapse if the interference continues another month. The paper said Yes has
enlisted the Israeli military to trace the source of the problem. The army had no immediate
comment, and the Yes spokeswoman could not be reached.
The prime suspect at the moment appears to be the United Nations peacekeeping force in Lebanon,
UNIFIL, which has ships at sea, just north of Israel.
Israeli Foreign Ministry spokesman Mark Regev said technical experts from the ministry and the
U.N. were in contact over the possibility that UNIFIL was the source of the transmissions, and the
United Nations was ready to cooperate if it was proven responsible.
Page 4
In Lebanon, senior UNIFIL official Milos Strugar said both Lebanese and Israeli authorities had told
the force of electronic problems and the reports were being investigated.
"At the moment it is not clear what is causing the interference," he said.
The Israeli daily Yediot Ahronot on Tuesday pointed to Moscow as another possible culprit, quoting
an unnamed Israeli security official as saying Moscow was suspected of beaming signals at Israel to
try to probe its military electronic capability in the wake of the Sept. 6 raid on Syria and as an
expression of its anger at Israel for making Syria's Russian radar appear impotent.
"I believe that they sent ships to the region equipped with electronic warfare systems...to try and
examine Israel's capabilities in electronic warfare and also to give trouble to those who gave them
trouble," the official said, according to the paper. "The Russians have an entire fleet of electronic
warfare ships that are disguised as merchant ships."
The Russian defense ministry refused to comment on the allegations.
Another Yediot Ahronot story, by the paper's diplomatic correspondent, quoted an unnamed
government official as saying that the answer to the riddle could lie in Israel itself, with the
emissions coming from military radar.
Table of Contents
US Army Medics Win Some Hearts and Minds
By Fawzia Sheikh, Inter Press Service News Agency, 10 October 2007
KANDAHAR, Oct 10 (IPS) - Colourfully-clad Afghan villagers with dirty, barefoot children sit outside
a makeshift coalition clinic in a tiny village in Kandahar province, impatiently awaiting their turn to
see the medics.
Today, the common ailment medical staff report is children infected with worms, their distended
stomachs and diarrhoea are tell-tale signs of a life lacking proper hygiene. Running water is scarce
in this impoverished part of the country, which has seen the brunt of fighting in the six-year war.
By the end of the day, Capt. Maureen Sevilla of the South Carolina National Guard and her
colleagues have dispensed several boxes of multivitamins to help alleviate the problem, often
handing the supplements to children only slightly older than their sick siblings. Sometimes their
parents are nowhere to be found.
United States and coalition efforts to win the Afghan people's trust by offering free medical
assistance and undertaking reconstruction projects like roads and schools have prompted locals to
be more cooperative, revealing roadside bombs and Taliban members, U.S. commanders say. But
these attempts have failed to stem some Afghans' views that little progress is being made six years
following the country's invasion.
Nonetheless, coalition forces are pleased with their efforts.
Following one medical outreach operation villagers quickly changed their mind about American
troops, whom the Taliban had described as "bad", said Maj. Charles Blankman, a U.S. army
physician's assistant located at a forward-operating base outside of Kandahar airfield, a small
facility of military personnel located beyond the main military base.
"It does a lot of good ... for counterinsurgency operations," Blankman said of the medical services
offered to Afghans. "People are very thankful to you". The medical outreach programmes, though
limited, convey to civilian Afghans that their government wants to help them, he added.
In all cases, the coalition tries to "put an Afghan face" on the clinics by soliciting the help of Afghan
doctors and nurses, he continued. The coalition usually travels with 30 to 40 Afghan police officers
who undertake security, searches and hand out humanitarian assistance supplies such as food and
even coloring books, while Western troops try to remain in the background, said Blankman.
Blankman's forward-operating base carries out two such medical clinics each month depending on
the security situation of a particular area, but is reluctant to publicise events for fear the Taliban
might find out.
Page 5
It is at these types of community outreaches that U.S. army Col. Thomas McGrath, commander of
the Afghan Regional Security Integration Command- South based at Kandahar airfield, hopes to
obtain information about the insurgency from local Afghans.
"When people feel they have security, they're more likely to give up intelligence," McGrath said in
an interview with IPS, echoing a well recognised principle of counterinsurgency.
Coalition forces recently distributed leaflets in an eastern town urging people to identify Taliban and
set up a hotline that received 200 or 300 calls in a couple of days, he said. Three or four tips
typically become successful leads, he explained, adding the sheer number of calls indicates locals
want economic viability, schools and hospitals.
"The funny thing (is) the Taliban were calling too and they were pissed," he said. He said the next
day the Taliban, thousands of who have been killed over the last six months, planted an explosive
device close to the U.S. military base in an effort to reassert themselves.
In certain southern Afghan towns, however, villagers have refused to share information with
coalition forces, telling them that, "'I can't, because you're going to leave here and they'll cut my
head off,'" McGrath explained. Afghans live in constant fear of the Taliban, who recently executed
police officers in a nearby town square "just to spread terror," he said.
In some cases Afghans have paid mob protection money to the Taliban, who have also demanded
food and shelter from villagers and disperse when the coalition arrives, according to a U.S. air force
intelligence officer. He spoke on condition of anonymity.
In an effort to separate the insurgents from the general population -- and thereby gain more
intelligence from civilians who feel more secure -- the U.S. military is also investing in biometrics
programmes allowing forces to take a census of towns and villages, McGrath added. This initiative
includes obtaining electronic fingerprints, photos, addresses and phone numbers, making it more
difficult for Taliban to slip undetected into an area, he said.
Coalition forces entering a new area need to win over the village elder controlling the town before
the other residents will follow suit, the intelligence officer told IPS.
One way to curry favor is through rebuilding initiatives financed by the Commanders Emergency
Response Programme fund, a military programme providing funds for U.S. troops to assist Iraqis
and Afghans with critical reconstruction and assistance projects. Commanders on the ground are
able to provide assistance in a streamlined fashion, which means money is immediately available to
respond to needs.
CERP projects, undertaken by Afghans, have included building roads, schools, mosques, wells,
clinics, among other things. Western military efforts to establish the Afghan government's
legitimacy by helping it to focus on the needs of its people and impose security has received mixed
appraisals across the country.
Isa Mohammed, an 18-year-old farmer with a wife in southern Afghanistan's Zabul province, said
he believes life is better now than under the Taliban regime of the 1990s, pointing to the
construction of roads and hospitals over the years. Prior to the election of President Hamid Karzai,
the country had no economy but now farmers may export grapes, almonds, wheat and other
commodities, he said.
Other Afghans, however, are disenchanted by the state of the country several years after the hated
Taliban regime was toppled in 2001. This is particularly so following a spate of bomb attacks over
the last few weeks in the capital Kabul, known for being much quieter than the volatile south.
Yet, busy downtown thoroughfares indicate the inherent danger of life in Afghanistan -- a heavily
armed society where restaurant patrons check their weapons at the door and criminal gangs
abduct victims for money -- has still not deterred them from going about their normal business.
"I prefer the Taliban for peace," declared Dr. Razia Kamal, a 28-old-year-old gynaecologist shopping
at the Faryad Trading Center on Flower Road with her younger sister Raihana, 20, in the middle of
Ramadan (Ramzan). Her parents escaped to Pakistan years ago and only recently returned, but she
is unsure whether she will remain in the country of her birth if violence persists.
Page 6
When reminded that the Taliban would severely curtail educational and job opportunities for her if
it resumed power, Kamal responded: "When women are not living, what education is there for
them? Life is more important than education."
Sabghat Ullah, a 28-year-old clothing store owner, lamented the fact that Americans and other
foreigners came here to stabilise Afghanistan but peace from Taliban terror was still elusive. "Two
days, two explosions," he grumbled. "No country is stopping them."
Table of Contents
Information Unit Activated At Norwich Campus
By Wilson Ring, Associated Press, October 14, 2007
NORTHFIELD -- The Vermont National Guard formally activated a new unit Saturday whose mission
will be to train Air Force personnel to fight wars in cyberspace.
The 229th Information Operations Squadron will be based at the National Guard armory on the
campus of Norwich University.
"If you don't know what information operations is, it's the future”, Maj. Gen. Michael Dubie, the
adjutant general of the Vermont National Guard, said at Saturday's ceremony.
The Vermont Air National Guard's role in training military came after the Sept. 11, 2001, attacks on
the United States, Dubie said.
"Within about, I would say, two, 2 1/2 years (of being given the mission), the Air Force told us they
couldn't operate without us," said Dubie.
As an example of the power of cyber warfare, Dubie pointed to a cyber attack on the computer
systems of the government of the European nation of Estonia.
Estonian government officials said more than 1 million computers from around the world were used
to attack the country's computers. The attacks targeted government offices and corporations,
including the Baltic country's six major banks.
"There are attacks every day on our government infrastructure; there are attacks every day on our
government Web sites”, Dubie said. "We can't operate without the systems of our cyber network."
The 229th will train airmen from around the world via the Internet, said Vermont Air National
Guard Master Sgt. Bill Cunningham.
Before the creation of the squadron, the people involved with the information technology training
were on loan from other guard units, Cunningham said.
"Information operations is the way of the future," Cunningham said. "It's a way we can leverage
information and put some non-kinetic options on the table in the war fight."
Kinetic options refers to traditional warfare using bombs and bullets. Information operations are
more than just working with computer networks.
"Instead of bombing a target maybe we will talk to the populace, win some hearts and minds, tell
them how best to surrender," Cunningham said.
Table of Contents
Secret Tech Unit at McChord AFB Guards against Cyber Attack
By The Associated Press, Seattle Times, 15 October 2007
TACOMA, Wash. — The Air Force is recruiting for a [] Reserve unit at McChord Air Force Base for
cyberspace warfare.
The job of the 262nd Information Warfare Aggressor Squadron is to protect military computer
networks from online attacks.
The unit was commissioned in 2002 and has about 100 members. Their day jobs are mostly as
computer techies. Like other reservists they put in one weekend a month and two weeks a year on
duty at McChord.
Page 7
A spokesman for the Natural Guard base at Camp Murray, Major Philip Osterli, says the unit is
defensive in nature and does not have a charter to conduct computer attacks.
This year, at the urging of Congressman Adam Smith, the defense budget includes $800,000 to
design a new operations facility for the 262nd at McChord.
Table of Contents
An Internet Jihad Sells Extremism to Viewers in the U.S.
By Michael Moss And Souad Mekhennet, New York Times, 15 October 2007
When Osama bin Laden issued his videotaped message to the American people last month, a
young jihad enthusiast went online to help spread the word.
“America needs to listen to Shaykh Usaamah very carefully and take his message with great
seriousness,” he wrote on his blog. “America is known to be a people of arrogance.”
Unlike Mr. bin Laden, the blogger was not operating from a remote location. It turns out he is a 21year-old American named Samir Khan who produces his blog from his parents’ home in North
Carolina, where he serves as a kind of Western relay station for the multimedia productions of
violent Islamic groups.
In recent days, he has featured “glad tidings” from a North African militant leader whose group
killed 31 Algerian troops. He posted a scholarly treatise arguing for violent jihad, translated into
English. He listed hundreds of links to secret sites from which his readers could obtain the latest
blood-drenched insurgent videos from Iraq.
His neatly organized site also includes a file called “United States of Losers,” which showcased a
recent news broadcast about a firefight in Afghanistan with this added commentary from Mr. Khan:
“You can even see an American soldier hiding during the ambush like a baby!! AllahuAkbar!
AllahuAkbar!”
Mr. Khan, who was born in Saudi Arabia and grew up in Queens, is an unlikely foot soldier in what
Al Qaeda calls the “Islamic jihadi media.” He has grown up in middle-class America and wrestles
with his worried parents about his religious fervor. Yet he is stubborn. “I will do my best to speak
the truth, and even if it annoys the disbelievers, the truth must be preached,” Mr. Khan said in an
interview.
While there is nothing to suggest that Mr. Khan is operating in concert with militant leaders, or
breaking any laws, he is part of a growing constellation of apparently independent media operators
who are broadcasting the message of Al Qaeda and other groups, a message that is increasingly
devised, translated and aimed for a Western audience.
Terrorism experts at West Point say there are as many as 100 English language sites offering
militant Islamic views, with Mr. Khan’s — which claims 500 regular readers — among the more
active. While their reach is difficult to assess, it is clear from a review of extremist material and
interviews that militants are seeking to appeal to young American and European Muslims by
playing on their anger over the war in Iraq and the image of Islam under attack.
Tedious Arabic screeds are reworked into flashy English productions. Recruitment tracts are issued
in multiple languages, like a 39-page, electronic, English version of a booklet urging women to join
the fight against the West.
There are even online novellas like “Rakan bin Williams,” about a band of Christian European
converts who embraced Al Qaeda and “promised God that they will carry the flag of their distant
brothers and seek vengeance on the evil doers.”
Militant Islamists are turning grainy car-bombing tapes into slick hip-hop videos and montage
movies, all readily available on Western sites like YouTube, the online video smorgasbord.
“It is as if you would watch a Hollywood movie,” said Abu Saleh, a 21-year-old German devotee of
Al Qaeda videos who visits Internet cafes in Berlin twice a week to get the latest releases. “The
Internet has totally changed my view on things.”
Page 8
An Internet Strategy
Al Qaeda and its followers have used the Internet to communicate and rally support for years, but
in the past several months the Western tilt of the message and the sophistication of the media
have accelerated. So has the output. Since the beginning of the year, Al Qaeda’s media operation,
Al Sahab, has issued new videotapes as often as every three days. Even more come from Iraq,
where insurgents are pumping them out daily.
That production line is the legacy of one man: Abu Musab al-Zarqawi, the former leader of Al
Qaeda in Mesopotamia who was killed in June 2006 by American bombs.
Mr. Zarqawi learned the power of the Internet in prison, according to a former associate who was
imprisoned with him in Jordan a decade ago. Mr. Zarqawi’s jailhouse group of 32 Islamists sought
to recruit other prisoners by handwriting a newsletter, Al Tawheed, when it discovered a larger
audience.
“We sent them outside, to brothers in Europe and England,” who posted the newsletters on militant
Web sites, the associate said, asking not be identified because he said he is involved with Islamist
activities.
In Iraq, Mr. Zarqawi embraced the video camera as a weapon of war. “He made the decision that
every group should have a video camera with them, and every operation should be taped,” said a
Palestinian militant who went to Iraq in 2005 to teach foreign fighters from Morocco and parts of
Europe how to build bombs and stage roadside attacks.
Two Lebanese intelligence officials confirmed that the Palestinian, who goes by the nom de guerre
Abu Omar, had worked with Mr. Zarqawi in Iraq, and he played a video of foreign fighters in Iraq for
reporters of The New York Times.
Abu Omar, 37, a muscular man who carried a Glock 21 pistol tucked into the belt of his camouflage
pants during an interview at his home in Lebanon, said Mr. Zarqawi also had him tape his
bombmaking classes so his expertise would not be lost if he were killed.
“We had two cameramen, people who learned how to do this before they came to Iraq,” Abu Omar
said. “And after filming, we had different houses in the area where we made the videos.”
Dahia al-Maqdassi, 26, a Palestinian who said he produced insurgent videos in Iraq two years ago,
said, “In every city in Iraq they had a little office where someone did film operations.” He described
his “media section” as a house near Falluja where 6 to 10 people worked. “We finished the film and
then sent it to jihadi Web sites,” Mr. Maqdassi said.
Propaganda Rap Video
One of the most influential sites is Tajdeed, which is based in London and run by Dr. Muhammad
Massari, a Saudi physicist and dissident. Over lunch at a McDonald’s near his home, Dr. Massari
said Mr. Zarqawi’s insurgent videos from Iraq inspired local productions like “Dirty Kuffar,” the
Arabic word for nonbeliever. The 2004 rap music video mixed images of Western leaders with
others purporting to show American troops cheer as they shot injured Iraqi civilians.
Dr. Massari, who helped promote the video, said similar crossover productions soon followed and
made their way to his Web site.
“I never touch the videos that are on my forums,” said Dr. Massari, who wears a long white Arabic
robe. “Someone with Al Qaeda uploads them, probably at Internet cafes, to password-protected
sites. Then they call a friend, say, in Australia or Brasília, and say, ‘Hi Johnny, your mom is
traveling today.’ That is the code to download the video. It goes up and down like that a few times,
with no trace, until someone posts a link on my site.”
Last spring, Al Qaeda made what analysts say was a bold attempt to tap potential supporters in the
United States. In a videotaped interview, Ayman al-Zawahri, a bin Laden lieutenant, praised
Malcolm X and urged American blacks and other minorities to see that “we are waging jihad to lift
oppression from all of mankind.”
Page 9
The tape quickly found an audience. Mr. Zawahri “cares about black people,” wrote a blogger with
Vibe, the American hip-hop and urban culture magazine, which claims 1.6 million visits a month.
“At least, I think that’s why he’s quoting Malcolm X in his latest mix tape, which dropped last
weekend.”
Umar Lee, a 32-year-old Muslim convert from St. Louis, offered a stinging critique of Mr. Zawahri
on his blog for Muslim Americans, criticizing “the second-class status many blacks live in right in
the Arab World.” Soon, Mr. Lee’s blog churned with commentary on the parallels between Arab and
black American radicals.
A four-minute version of the hourlong Qaeda video, entitled “To Black Americans,” has logged more
than 1,800 views on YouTube in the four months since it was posted.
Among those who posted a link to the YouTube version was Mr. Khan, the North Carolina blogger
who said he was struck by the simplicity in the messages of both Al Qaeda and Malcolm X. “They
are geniuses for having the ability to mold their ideology into simple yet influential messages that
can reach the grass-roots level,” he said.
Mr. Khan produces his blog anonymously, but was identified by The Times through the e-mail
account he used in previous online discussions. (Pictures he had posted online helped The Times
distinguish him from another, unrelated North Carolina resident, about 10 years older, who has the
same name.)
In an interview at a local mosque, where he sat on a prayer rug wearing a traditional Arabic robe,
Mr. Khan traced his increasing militancy.
His blog has attracted enough notoriety that vigilante groups opposed to jihadi sites have gotten
him shut down a few times in recent months. He said he was somewhat surprised he had not been
confronted by government authorities, although, he said, “I’ve never told anybody to build bombs.”
His early postings, beginning in 2003, promoted strengthening Islam in North America through
nonviolent confrontations. But with the escalating war in Iraq, bloodshed became a recurrent
theme.
He described his favorite video from Iraq: a fiery suicide-bomber attack on an American outpost.
“It was something that brought great happiness to me,” he said. “Because this is something
America would never want to admit, that they are being crushed.”
Asked how he felt living among people who had sent soldiers to Iraq, Mr. Khan said: “Whatever
happens to their sons and daughters is none of my concern. They are people of hellfire and I have
no concern for them.”
A Teenage Transformation
Born in Riyadh, the capital of Saudi Arabia, Mr. Khan was 7 when his family moved to New York City
and settled into the Queens neighborhood of Maspeth.
He mirrored his teenage peers, from their slang to their baggy pants, until August 2001 when, at
age 15, he said, he attended a weeklong summer camp at a mosque in Queens, which was
sponsored by a fundamentalist but nonviolent group now known as the Islamic Organization of
North America (IONA).
“They were teaching things about religion and brotherhood that captivated me,” Mr. Khan said. He
said he went back to school knowing “what I wanted to do with my life: be a firm Muslim, a strong
Muslim, a practicing Muslim.”
He prayed more regularly. He dressed more modestly. He stopped listening to music except for
Soldiers of Allah, a Los Angeles hip-hop group, now defunct, whose tunes like “Bring Islam Back”
continue to have worldwide appeal among militant youths.
He also befriended members of the Islamic Thinkers Society, a tiny group that promotes radical,
nonviolent Islam by leafleting in Times Square and Jackson Heights, Queens.
After moving with his family to North Carolina in 2004, Mr. Khan said, he attended a community
college for three years and earned money selling various products, including kitchen knives.
Page 10
But he began spending chunks of his days on the blog he created in late 2005, “Inshallahshaheed,”
which translates as “a martyr soon if God wills.” The Internet traffic counter Alexa.com, which
rarely is able to measure the popularity of blogs because they do not have enough readers, ranked
his among the top one percent of one hundred million Internet sites in the world.
If Mr. Khan’s extreme rhetoric has won him a wider audience, it has caused him problems at home.
Last year, his father tried to pull him back to the family’s more moderate views by asking an imam
to intervene.
“I tried to bring arguments from the Koran and scholars, and said, ‘Whatever you are thinking it is
not true,’” said Mustapha Elturk, a family friend and the leader of IONA, the Islamic organization
that first inspired Mr. Khan. But Mr. Khan did not budge, he said.
Mr. Khan said he separated from IONA over one matter: the organization would not support violent
jihad without the endorsement of a Muslim nation’s leader, which Mr. Khan argues is unnecessary.
Mr. Elturk said, “His father and family are really scared that he might do something.”
Attempts to Shut Down Blog
From time to time, Mr. Khan said, his father also cut off his Internet access and, to placate him, Mr.
Khan recently added a disclaimer to his blog disavowing responsibility for the views expressed on
the site.
He has also been fending off citizen watchdogs who are working to knock sites likes his off the
Internet. Twice in September his blog went dark when his service provider shut him down, citing
complaints about the nature of his postings.
Mr. Khan has now moved his blog to a site called Muslimpad, whose American operators recently
moved from Texas to Amman, Jordan. Their larger forum, Islamic Network, is the host of
discussions among English-speaking Muslims. One of their former employees, Daniel Maldonado,
was convicted this year in federal court of associating with terrorists at their training camps in
Somalia.
Mr. Khan said that he had dreams about meeting Mr. bin Laden and that he would not rule out
picking up a weapon himself one day. In a recent essay, he argued that jihad was mandatory for all
Muslims, and he cited three ways to fulfill this obligation: join fighters in Iraq, Afghanistan or
Algeria; send them money; or promote militant videos as part of the jihad media.
For now, he said, he is fulfilling his obligations by helping other Muslims understand their religion.
Recently he posted a video of a news report from Somalia showing a grenade-wielding American
who had joined the Islamists.
“He is an example of a Muslim who follows the Religion of Islaam,” Mr. Khan wrote.
Table of Contents
Sex, Lies and DVDs: Propaganda in the Palestinian Territories
By Frida Ghitis, World Politics Review, 10 Oct 2007
JERUSALEM -- Ever since this June's open warfare between rival Palestinians of Fatah and Hamas in
the Gaza Strip, the accusations, recriminations, smears and hoaxes have been flying wildly in the
Palestinian Territories. In addition to the violence that still pits supporters of the Islamic Resistance
Movement, Hamas, against followers of the more secular Fatah, the parties have launched
elaborate publicity campaigns to bolster their own side and discredit the other in the eyes of fellow
Palestinians and the rest of the world.
One of the hoaxes, designed to make Fatah look more reliable to the West and to Israel, even
made its way into the pages of the Washington Post. Others, targeting Palestinian audiences, play
on that society's conservative social values and the already-tarnished reputations of long-standing
political and paramilitary leaders. But perhaps the most dramatic of these efforts, a hoax that was
uncovered before it got very far, sought to heighten fears that Hamas will turn Gaza, where it has
ruled since overpowering Fatah last June, into a Taliban-style enclave of religious extremism.
Page 11
Since Hamas took over Gaza, it is true that more women are wearing the Hijab, or Islamic veil. It is
also true that there have been some attacks on Christian Palestinians, and that Internet cafes have
been burned.
Not content with the existing facts, however, Fatah supporters concocted an elaborate scheme to
dramatize -- complete with horrifying video footage -- what life under Hamas has become. They
invited the Palestinian affairs reporter from the Jerusalem Post to Fatah's General Intelligence
Headquarters in Ramallah to screen the gruesome footage of the lynching of a 16-year-old in Gaza,
killed for dishonoring her family. The reporter, Khaled Abu Toameh, viewed the pictures and
contacted the "witnesses" in Gaza whose number he was given by Fatah. He was horrified. "After
more than 20 years in the business, and just when you think you've seen it all," he wrote in an
article that appeared online, "there's always something that shocks you more than ever."
The online article, however, was suddenly pulled. The story was a hoax. A girl was stoned to death
for falling in love with the wrong boy, but it happened last April in Iraq, not in Gaza.
Fatah is not the only group smearing its rivals. In Gaza, Hamas is circulating a DVD it says comes
from video found in old Fatah offices they overran in Gaza, showing pictures of Fatah officials
having sex with men and boys. Hamas is also showing documents it says it seized from the
Palestinian Preventive Security Offices, including one entitled, "A Large Number of Homosexuals."
The documents and the images were reportedly part of a blackmailing scheme.
Fatah is not taking the charges lying down, so to speak. They claim to have found, among other
displays of sin and corruption, a Hamas religious cleric, an imam, having sex with a boy in the
basement of a mosque, no less.
Not all the campaigns involve sex, lies and videotapes -- or DVDs. The one common element is an
effort to show the other side as corrupt and dangerous, while showing one's own side as
upstanding and preferable by comparison. The other common thread is the effort to weave a
deception into already existing fears -- or hopes.
That's where the Washington Post comes in.
As the date for a November meeting of Middle East players in Annapolis approaches, the West -and many in Israel -- have pinned their hopes on Fatah and its leader, Palestinian Authority
President Mahmoud Abbas. For the dream of peace to become a reality, two things will have to
happen. First, Israel will have to withdraw and hand over territory it now controls to the
Palestinians. Secondly, the Palestinians will have to prevent those territories from being used as
launching pads for attacks against Israel, which is the reason Israel holds the territories to begin
with.
In order to show his willingness and ability to keep the peace, Abbas participated in a hoax that
was uncovered in Israel and reported without correction in the United States. In a Sept. 30
interview, the Washington Post asked Abbas how Israel could compromise, given the continuous
attacks on its cities. His response: "Last night (our security forces) seized two rockets. We handed
them over to the Israelis. We are very worried about these deeds and I think we can put an end to
all this. Our security apparatus is ready to stop all kinds of violence."
The trouble is that Abbas was reporting something that did not happen. Or rather, a lie that grew
out of a tiny grain of truth.
The original report said the PA had seized rockets ready to be launched into Jerusalem. In fact,
there were no rockets. PA officials found some metal pipes that children had been playing with and
handed those over to Israel forces. No real weapons or even potential weapons changed hands,
according to Israeli officials.
Perhaps Abbas was fed the misinformation by his people. But his effort to show his organization as
a muscular force for peace fell short. Either he knew he was telling something that wasn't true, or
he was deceived by his own people. Either way, this is not a sign of strength.
In the flurry of PR campaigns and counter-campaigns by Hamas and Fatah, this instance had its
intended effect in the West.
Page 12
The non-rocket non-story was an effort to show the West and Israel that Fatah is preferable to
Hamas. That hardly required any effort. It was also an attempt to portray Fatah as a true partner
for peace. That may not be all that far from the truth. In fact, the PA, governed by Abbas in the
West Bank, has on occasion prevented attacks on Israelis who strayed into their territory.
But this particular publicity campaign to portray Fatah as a reliable partner for peace was so
warmly received because there is such a longing among those who want peace for Fatah to be
exactly that.
Table of Contents
Countering the Art of Information Warfare
By Peter Brooks, Family Security Matters, 16 October 2007
While France, Germany, the UK and the US do not see eye to eye on everything, there is one thing
they probably can agree on: the growing problem of Beijing's intrusions into their government
computer systems.
Indeed, in the last few weeks, all four capitals have pointed an accusatory finger at Beijing for
attempting to infiltrate - or having succeeded in penetrating - their diplomatic or defence
establishment computer networks.
While snooping by the People's Liberation Army's (PLA) cyber-soldiers on unclassified government
websites and e-mail might be expected, the recent rash of incidents shines a spotlight on a
burgeoning game of Internet cat and mouse.
In the case of China, Beijing's increasing aggressiveness (indeed, ham-handedness) and capability
to infiltrate the computer networks of key countries is setting off alarms across the security
establishment - and rightfully so. Take the US: while modern warfare is increasingly dependent on
advanced computers, no country's armed forces are more reliant in the Digital Age than those of
the US. This is both a great strength and a damning weakness.
Today, the US Department of Defense uses more than 5 million computers on 100,000 networks at
1,500 sites in 65 countries worldwide. Not surprisingly, potential adversaries have taken note of the
US's slavish dependence on bits and bytes.
In an average year, the Pentagon suffers upwards of 80,000 attempted computer network attacks,
including some that have reduced the US military's operational capabilities.
Also, in the last few years, the US Army's elite 101st and 82nd Airborne Divisions and 4th Infantry
Division have been "hacked".
While it is difficult to determine the source, according to the Pentagon, most attacks on the US
digital Achilles' heel originate in China, making Beijing's information warfare (IW) operations an
issue we had better pay close attention to.
IW, including network attacks, exploitation and defence, is not a new national security challenge.
Cyberwarfare was the rage in the late 1990s, but has faded since 9/11 in comparison to the
mammoth matters of Islamic terrorism, Iraq and Afghanistan.
IW appeals to both state and non-state actors, including terrorists, because it is low-cost, can be
highly effective and can provide plausible deniability of responsibility due to the ability to route
strikes through any number of surrogate servers along the way.
An IW attack can launch degrading viruses, crash networks, corrupt data, collect intelligence and
spread misinformation, effectively interfering with command, control, communications, intelligence,
navigation, logistics and operations.
Not surprisingly, rising power China is serious about cyberwarfare, making the development of a
robust IW capability a top national-security priority. China's military planners recognise US - and
others' - dependence on computers as a significant vulnerability.
Page 13
The PLA has invested heavily in developing its cyberwarfare capabilities, including openly
expressing a desire to develop information warfare expertise - and boasting of its growing
sophistication in the field.
The PLA has incorporated cyberwarfare tactics into military exercises and created schools that
specialise in IW. It is also hiring top computer-science graduates to develop its cyberwarfare
capabilities and, literally, creating an 'army of hackers'.
Despite its unprecedented military buildup, the Chinese realise, for the moment, they still cannot
win a conventional war against the US and are, naturally, seeking unorthodox - or asymmetric ways to defeat the US in a conflict over Taiwan or elsewhere.
China is developing weapons, including the so-called 'assassin's mace' that will allow China to
balance the US's military superiority by attacking 'soft spots' such as its high-value computer
networks.
The idea that a less-capable foe can take on a militarily superior opponent also aligns with the
thoughts of the ancient Chinese general, Sun Tzu. In his Art of War, he advocates stealth, deception
and indirect attack to overcome a stronger opponent. Overlaying the still-influential Sun Tzu onto
modern Chinese military thought could lead one to conclude the PLA believes a Chinese 'David'
could, in fact, slay a US 'Goliath' using an asymmetrical military option such as cyberwarfare.
The PLA's US target list is expansive, including command, control, communications, computers and
intelligence nodes, airbases and even aircraft carrier strike groups - China's bête noir in a Taiwan
contingency.
Industrial espionage against government and private defence research, development and
production concerns is also a priority for Chinese cyber-spies, cutting costs and time in support of
Beijing's massive effort to develop a world-class defence industry.
Even more troubling, however, is the assertion among analysts that potential Chinese cyber-strikes
are not limiting themselves to just diplomatic and security-related targets. Private-sector financial
and economic institutions may also be on the PLA's hit list.
Nor is China limiting itself to the US, France, Germany and the UK. Beijing is looking for cyberdominance over other key potential regional rivals such as Delhi, Moscow, Seoul, Tokyo and Taipei.
Wellington also recently reported an incident.
China's IW efforts and activities provide a cautionary tale to US and other policymakers.
Fortunately, many governments have devoted significant resources to cyber-security, including
measures against terrorists and amateur hackers.
The recent Chinese intrusions, however, clearly demonstrate remaining vulnerabilities and IW is
here and now, making it increasingly important - and complementary - to the broad spectrum of
modern warfare.
A 'digital Pearl Harbor' for any country is by no means a certainty, but then again, no one believed
that terrorists would fly aircraft into buildings. The time to take heed of the cyber threat - Chinese
or otherwise - is now.
Table of Contents
Iraqi Insurgent Media Campaign Targets American Audiences
By Chris Zambelis, Jamestown Foundation, 16 Oct 07
Since the September 11 attacks, the internet has emerged as a pillar of radical Islamist
propaganda efforts against the United States by al-Qaeda and other groups. Extremist websites
and chat forums provide radicals and sympathizers with moral and theological justification for acts
of violence and terrorism, acts framed as legitimate self-defense against what is widely perceived
as a U.S.-led campaign against Islam. The internet is also a platform for disseminating tactical,
operational and strategic expertise, to include instructions on constructing explosives, analyses of
battlefield lessons learned and discussions on targeting selection. Perhaps most importantly, the
Page 14
internet enables like-minded militants to associate and communicate anonymously in cyber social
networks. This process reinforces their sense of purpose and duty and encourages solidarity with
the greater cause. Up until recently, however, the overwhelming majority of extremist websites
catered to Arabs and the Arabic-speaking Muslim community, with only a limited number of
websites providing modest sections in English and other languages. This is no longer the case.
Led by the Islamic Army in Iraq, a host of English-language websites linked to Iraqi Sunni insurgent
groups are on the forefront of efforts by militants to reach beyond their traditional support base
and target foreign audiences, namely the American public, by providing English mirrors of their
Arabic websites. The Islamic Army in Iraq is joined in this campaign by the Mujahideen Army, Ansar
al-Sunnah, the al-Fataheen Army, the Islamic Front for Iraqi Resistance and the Islamic Resistance
Movement in Iraq (HAMAS). These groups operate under the auspices of the Reformation and Jihad
Front, an insurgent umbrella group that has been critical of al-Qaeda-linked militants in Iraq,
especially the Islamic State in Iraq (http://iaisite-eng.org; http://www.reformandjihadfront.org).
Websites and chat forums linked to al-Qaeda tend to focus on radical ideological and theological
discourse aimed at attracting recruits to their global cause. In contrast, Iraqi insurgents affiliated
with the Reformation and Jihad Front use Islamist rhetoric combined with Iraqi nationalist discourse
to relay regularly updated reports in English from the battlefield to American audiences. For
example, a section titled "Military Operations" provides a virtual play-by-play account of alleged
insurgent attacks against U.S. and other forces. These reports include the mode and scope of a
given attack, as well as its exact time and location. They also include detailed assessments of U.S.
casualties. A section titled "Filmed Operations" allows users to peruse a list of videos of insurgent
strikes available for download, while the "Media Releases" section allows users to download
propaganda videos and other materials in English. The website also includes regularly updated
sections providing English translations of political statements and other reports. The quality of its
graphics and presentation, as well as the amount of information presented, reflect the group's
Arabic website (http://www.iaisite.org).
The al-Boraq Media Organization—another website linked to the Islamic Army in Iraq—also includes
an extensive English section (http://www.alboraq.info). The website of what is alleged to be a
prolific sniper linked to the Islamic Army in Iraq—nicknamed "Juba" by U.S. forces—also includes
English commentary, including claims of responsibility for the deaths of 668 U.S. soldiers and
videos of sniping operations for download (http://www.baghdadsniper.net). The Islamic Army in
Iraq's website also contains a link titled "Lee's Life for Lies," named after PFC Lee Kendall Tucker, a
U.S. soldier whose USB flash drive was found by insurgents in January 2007. Insurgents used
authentic data available on the flash drive, such as PFC Tucker's social security number, along with
false information to create a phony letter that was presented as having been authored by the
soldier. The letter, which is read aloud in a video available for download using voiceover narration in
American-accented English, describes a hopeless situation for U.S. forces in Iraq amid scenes of
insurgent attacks and other chaos (http://d3130.servadmin.com/~leeflash/; http://www.leeflash.blogspot.com).
The proliferation of sleek English-language websites targeting American audiences reflects a
greater awareness on the part of Iraqi insurgents of the value of influencing domestic American
public opinion. Certainly, one aim of these websites is to reach out to American Muslims and others
who neither speak nor read Arabic. However, the websites linked to the Islamic Army in Iraq
appear primarily concerned with tapping growing domestic popular opposition to the war in Iraq in
the United States by depicting the situation on the ground as hopelessly dire for U.S. forces. The
updated play-by-play accounts in English of alleged insurgent attacks and U.S. casualties, coupled
with sleek presentation and video, allows the insurgents to speak directly to American audiences.
By claiming responsibility for specific attacks resulting in U.S. casualties, the insurgents are also
able to portray themselves as driving the tempo of the conflict, regardless of what the reality is on
the ground. Given recent trends, militant groups in Iraq and elsewhere are increasingly likely to
expand their propaganda efforts online through the use of English-language websites.
Table of Contents
Page 15
Jihadi Forum Users Look for Codes in Bin Laden's September Video
By Abdul Hameed Bakier, Jamestown Foundation, 16 Oct 07
After a relatively long video absence since October 2004, Osama bin Laden resurfaced on
September 8. In the wake of his speech, jihadi forum users continue to discuss his statement and
are eagerly analyzing whether the speech contained codes about a possible upcoming large-scale
terrorist attack.
The responses to bin Laden's speech on the forums are ranging from prayers for his ultimate
triumph over the "Jews and Crusaders," to various translations of his text in order to reach as
many audiences as possible. Two users, however, posted some interesting interpretations of his
speech on the http://muslm.net forum. A user by the name of "al-Asadi" claimed that, for the first
time, al-Sahab productions incorporated a code into bin Laden's video, which contained a special
encryption sequence only available to a few al-Qaeda operatives. Al-Asadi further stated that since
bin Laden only mentioned once that his speech was the last ultimatum to the United States and its
allies means that a new terrorist strike is imminent. Al-Asadi then boasted that his own posting
also contains codes, and claimed that "the signs of the raging storm that precedes the calm are
materializing." He then mocks the director of the CIA and warns that "we will see you in 2008," and
signed his name as "Asadi, the Amir of Washington."
In addition to al-Asadi's postings, another user by the general nickname "Windows XP" attempted
to "break" bin Laden's supposedly coded speech. XP makes note that after 2:08 minutes into the
speech, bin Laden says, "The effects and signs of that are not hidden. Since the 11th…" Then the
video-feed pauses until 2:15, while the audio feed continues. XP claims that these numbers are
significant and must be a signal to mujahideen in the United States. The user makes a number of
similar claims throughout his posting, while ending on a final point that refers to 14:00 minutes
into the tape, when the picture goes stagnant and bin Laden mentions the Kyoto Protocol for global
warming. XP claims that the letters in "Kyoto" and the timing refer to some sort of coded
instructions. While some forum users agreed with his analysis, others found the hypothesis of a
"coded speech" ridiculous.
In response, some users reacted angrily at the discussion of the possible codes, and argued that
revealing jihadi secrets in public forums would damage the jihad. Instead, they encouraged all
users to disseminate bin Laden's speech to the American people through English-language forums
in order to bypass "American censorship." A number of users acquired the English version of bin
Laden's speech and posted it on the forum boards so that it could be distributed. On the
http://muslm.net forum, users posted the English version and then posted various responses from
Americans from English-language forums. They then capitalized on instances where some people in
the English-language forums appeared to agree with some points in bin Laden's speech, and they
included the following posting: "As for what Osama says in this latest speech, I agree with a couple
of things: mainly concerning the fact that we haven't held any of our leaders accountable for
atrocities they have committed or allowed, that the American people ignored intelligence and
allowed the Bush administration to take hold as it has, and that the American people stupidly
elected this man into office twice, pretty much sealing our fate and the fates of our soldiers."
In conclusion, although the analysis of bin Laden's speech by various jihadi users is probably
baseless, it portrays their strong desire to see mass terrorist attacks against the United States. On
the other hand, the attempts to circulate bin Laden's ideas in American forums is a new trend and,
if sustained, could mount to a form of psychological warfare against U.S. citizens.
Table of Contents
U.S.-Financed Radio Stations Try To Reach Listeners in North Korea
By Tim Johnson, McClatchy Newspapers , 15 Oct 07
SEOUL, South Korea | In isolated North Korea, the only legal transistor radios have dials
permanently set to government stations.
Page 16
But smugglers and itinerant traders bring an increasing number of radios into North Korea,
according to anecdotal reports, and that is gratifying news for three tiny broadcasters that beam
information north of the border.
Each night, the three U.S.-financed radio stations crackle onto the air, trying to reach North
Koreans who are brave — or reckless — enough to tune into foreign newscasts in defiance of the
North’s Stalinist regime.
“Greetings from the voice of hope,” began one recent newscast from Open Radio for North Korea.
“We are trying to reach you to provide you with information.”
The three Seoul-based broadcasters — Open Radio for North Korea, Free North Korea Radio and
Radio Free Chosun — each receive about $200,000 annually from the National Endowment for
Democracy, a nonprofit body financed by Congress to promote democracy worldwide.
The broadcasters have different styles and offer different programming.
North Korean defectors operate Free North Korea Radio, which takes a combative line against the
Kim Jong Il regime. Radio Free Chosun broadcasts educational and news programs, and Open
Radio for North Korea offers discussions about democracy and civic affairs.
In some ways, the stations broadcast to a black hole.
They don’t know how many people tune in, and feedback from listeners is extremely limited. All
three broadcast only an hour or two a day. But all think that those who tune in include disaffected
citizens, and maybe some high-level cadres in Pyongyang who are worried about what may be in
store for the world’s last totalitarian regime.
“They know there is no future for their government. So they have to be ready for the change,” said
Young Howard, executive director of Open Radio for North Korea.
For decades, radios have been treated as potentially subversive instruments in North Korea. By
state fiat, all radios are fixed to the frequencies of government propaganda broadcasts. Those who
tinker with radios to get foreign broadcasts face punishment. In the past, that punishment could
include being sent to a labor camp.
Change is in the air, though. Prices of radios in China have fallen to $5, and customs officials
appear to be easing up on the flow of traders across the northern border with China, earning bribes
on the increased trade.
On rare occasions, refugees contact the stations once they flee North Korea, expressing gratitude
for the broadcasts and saying they lifted their spirits.
Kim Seong-min pulled out a handwritten letter that read in part: “Thank you. I got information
from your broadcasts. You are very brave and smart.”
Table of Contents
US Army Enlists Anthropologists
By Kambiz Fattahi, BBC Persian Service, 16 Oct 07
The Pentagon is pulling out all the stops in Iraq and Afghanistan.
It is sending "mine-resistant, ambush-protected" vehicles into the battlefield. It is also using
cutting-edge biometric technologies to identify insurgents.
But that is not all. The US military has developed a new programme known as the Human Terrain
System (HTS) to study social groups in Iraq and Afghanistan.
The HTS depends heavily on the co-operation of anthropologists, with their expertise in the study
of human beings and their societies.
Steve Fondacaro, a retired special operations colonel overseeing the HTS, is keen to recruit cultural
anthropologists.
Page 17
"Cultural anthropologists are focused on understanding how societies make decisions and how
attitudes are formed. They give us the best vision to see the problems through the eyes of the
target population," he said.
But very few anthropologists in the US are willing to wear a uniform and receive the mandatory
weapons training.
In fact, a group known as the Network of Concerned Anthropologists has already circulated a
pledge of non-participation in the Pentagon's counter-insurgency efforts.
'Collective genius'
The Human Terrain System currently includes six teams embedded in military units at the brigade
and division levels in Iraq and Afghanistan.
Each team is composed of at least one social scientist, usually an anthropologist, a language
specialist, and retired army personnel or reservists from special operations, intelligence, and civil
affairs backgrounds.
"You have social scientists to understand the deep complexity of the problems on the ground in the
society and the military personnel who then take that information and help apply it to the military
decision-making process," says Col Fondacaro.
"Together they bring collective genius to the problems," he adds.
The cost of this "collective genius" is about $400,000 (£200,000) annually for each civilian member
of the team, including the soaring cost of kidnapping insurance.
As with many programmes, the Pentagon has partially outsourced the HTS, and defence contractor
BAe Systems hires the social scientists.
'Weaponised anthropology'
Winning the trust of the indigenous populations "is at the heart of the struggle between coalition
forces and the insurgents", BAe's job advertisement for field anthropologists emphasises.
But it has not convinced many anthropologists in the US.
Last year, their largest professional organisation, the American Anthropological Association (AAA),
called for an end to the Iraq war.
Since then, AAA has set up a national commission to review the involvement of anthropologists in
national security work.
Many anthropologists in the US consider it unethical to work with the HTS teams. They are worried
about the potential risks to the human subjects of their studies.
"I feel the need to protect the safety, well-being and interests of those who shared with me their
knowledge and histories. My ultimate responsibility is to protect them," says a social anthropologist
specialising in the Middle East.
A vocal critic, Roberto Gonzalez, professor of anthropology at San Jose State University, accuses
the Pentagon of trying to, as he puts it, "weaponise" anthropology.
He believes that HTS units are likely to operate "as full-blown counterinsurgency teams akin to
what the British employed in the colonies over a half-century ago".
'Alienation'
But Col Fondacaro dismisses such criticism, insisting that the programme is misunderstood.
"This is different from anything we have faced before. It is a new doctrine, new organisation, new
task, and new purpose. People are uncomfortable with new things," he says.
Col Fondacaro believes that since the Vietnam War, many social scientists in the US have been
alienated from government service.
He acknowledges that recruiting a qualified social scientist is a significant challenge.
"There is a very brave and very courageous group of young anthropologists helping. They are
taking significant risks professionally and physically," he says.
Page 18
One of these is Dr Marcus B Griffin, professor of anthropology and sociology at Christopher
Newport University in Virginia, who blogs actively from Iraq.
"I am working out regularly. I cut my hair in a high and tight style and look like a drill sergeant... I
shot very well with the M9 and M4 last week at the range," writes Dr Griffin.
Dr Griffin is not a Middle East Expert. He says on his blog that he specialises in human populations,
the environment, and food.
For Dr Montgomery McFate, a main architect of the HTS, anthropologists' "unique set of skills,
methodologies and perspectives" are key.
"If the lead social scientist in the team does not have a background in the Middle East, other
members must have a strong background in the region to make up for that person. It is a team
effort," says Dr McFate, a cultural anthropologist.
She rejects the criticism that she is trying to "militarise" anthropology but rather "anthropologise"
the Pentagon.
Rapid expansion
US Defense Secretary Robert Gates has authorised $40m (£20m) to expand the Human Terrain
System.
The US Central Command (Centcom) is looking to increase the programme's number of teams in
Iraq and Afghanistan from six to 28.
According to Col Fondacaro, the new teams will be larger; they will have nine members, including
two social scientists.
He also says that officials at the new US Africa Command (Africom) and the US Pacific Command
(Pacom) have also indicated interest in the Human Terrain teams.
The programme, which was being tested on a small scale, is now set to be expanded very quickly
despite the strong objections of many anthropologists.
Table of Contents
New WEP Attack: Caffe Latte Hits Client, Not Access Point
By Glenn Fleishman, Wi-Fi Networking News, 17 October 2007
InfoWorld has a write-up on an upcoming Toorcon presentation by Vivek Ramachandran and Md
Sohail Ahmad: The AirTight Networks researchers have developed an attack they call Caffe Latte; it
uses a laptop’s attempts to connect to WEP-protected networks as the jimmy that lets the cracker
into a position to force the laptop to issue tens of thousands of WEP-encrypted ARP requests, which
are used to crack the network key. Caffe Latte lets the attacker then act as a man in the middle,
providing Internet access from another network while examining the victim’s computer or installing
payloads. This attack can be used anywhere: while whiling away your time at a cafe, you could be
cracked, hence the fancy name.
The application of this attack is interesting, because although the article and
Ramachandran/Ahmad’s Toorcon description talk about business use of WEP, actual WEP use by
corporations is pretty limited. Most companies of any scale are using some form of 802.1X or other
credential-based logins which can’t be subverted by this attack. Companies in retail and logistics
are apparently the most vulnerable, because early Wi-Fi built into retail point-of-sale systems and
scanners used in warehouses are still in wide use, and can only support WEP. If a cracker can
associate the cracked key with a company by scanning the victim’s hard drive or using other
intrusion tools, then they can go to that company and enter their network at will, too. That’s what
led to the TJ Maxx/Marshall’s parent company break in.
The broader implications are that if you ever attached to a WEP-protected network and stored the
key, your laptop is now vulnerable to this attack. This may lead people to turn their Wi-Fi radio off
when not actively attached to a network when out in public. (It’s a good idea for reducing battery
drain, too, of course.) The researchers are using an older form of WEP attack, it seems like, as they
Page 19
suggest it could take up to 30 minutes to break the WEP key in this manner; other researchers
revealed a method that works in as little as under two minutes back in April.
The vulnerabilities exposed by this attack arise because the IP ranges associated with Wi-Fi
networks are often considered trusted networks by firewall software. Most firewall software
requires that you agree or disagree that a particular network range represented by a Wi-Fi network
that you connect to is trusted or untrusted. I suspect most users add the network to their trusted
category when they connect to a network, assuming it to be safe—maybe the case when it’s a
home network. Which means that popular private addressing ranges starting with 10.0 or 192.168
are already approved in your firewall. With the attacker managing to appear to your computer like
a WEP network it’s already joined, they may not be blocked from probing for the many weaknesses
typically found on most Windows computers through outdated software and drivers.
Table of Contents
Cyber Security Command for India Recommended
By Naavi, Blogger News Network October 17th, 2007
India is celebrating 60 years of Independence. At this point of time it is natural for us to focus on
the security of the nation. In the current Digital era where “Governance” as well as “Business” is
increasingly being led by ICT, the discussion on security of the nation is not complete without a
discussion of the Cyber Space in which e-Governance and e-Commerce take place.
Our attention is usually drawn on “Cyber Security” when we hear about “Cyber Crimes”. Our first
thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling
“Cyber Crimes”.
In the corporate sector, the focus of “Cyber Security” is more on “Information Security” and
prevention of unauthorized access to the Corporate Information systems or denial of access to the
systems by authorized persons.
The e-Governance and e-Commerce sector as well as the Individuals who use Computers and
Mobiles are also concerned about Cyber Crimes and how it affects them.
A question arises whether there is any role for the Corporate sector or the common Netizens in
“National Cyber Security”. After all, the civilians normally are not required to go to fight at our
physical borders and therefore are not very much involved in the national security process.
Similarly, private sector companies also have only a peripheral role in the national security in the
physical space.
The situation in the Cyber Space is however different. While we normally say that Cyber Space has
no boundary, it also means that beyond the cyber space of every individual, there lies an
international cyber space. Every time a Netizen sends and receives a data packet on the Internet,
he is going out of the National Cyber Space and wandering in International Cyber space. There is
therefore a far bigger role for individual civilians and Corporate sector in the national Cyber Space
security. Consequently, the strategy for National Cyber Space has to be different from that for the
physical cyber space.
Some Recent Incidents
If we reflect on some of the recent incidents of Cyber Security breaches, we can get an idea about
how the security threats arise.
Recently, a Swedish security professional by name Dan Egested created a sensation by finding out
e-mail passwords of about 100 senior Indian Government officials including several embassy
officials and DRDO officials and posting them on the Internet. The e-mail passwords gave access to
confidential correspondence between the Government and the officials and could have some
repercussions on national security. A matter of greater concern was the realization that any person
with a reasonable security knowledge could have accessed similar information earlier and some of
them could be terrorists who are trying to destroy our country.
Page 20
Another incident which was of significance was the report that the website of one of major Banks
had been hacked and infested with malicious codes that downloaded about 22 Trojans to any
individual who visited the home page of the Bank. Some of these Trojans could be “Key Logger”
Trojans and the security of thousands of Bank customers were compromised due to the breach at
the Bank’s server level.
A third incident of importance to occur recently was the dramatic demonstration of the power of
SMS/Phone spoofing through websites. In a well published TV programme, a Chartered Accountant
from Ahmedabad showed how he could put through a call in the name of the home minister of the
country to another minister.
A fourth incident of significance was the fact that the web server of National Police Academy,
Hyderabad was found to have been penetrated and a phishing website had been hosted there on.
Close on the heels of this incident, on the International scenario, it was reported that one ISP in
Russia was making a business of hosting facilities for Cyber Criminals and over 50% of the global
phishing sites had been hosted by the network. It was interesting to note that to use the services
of this ISP, the privileged clients had to demonstrate a track record of “Identity Theft”. A question
arises if in the interest of the Indian Netizens, can the Indian State take any action to stop this
service provider from facilitating attacks on Indian Netizens. Their activity is nothing different from
our neighboring countries hosting terrorist camps and training for which we do discuss if we have a
“Right of Hot Pursuit”.
These incidents indicate the high levels of risks that Indian Cyber Space is encountering today.
They also highlight the fact that the security professionals in the various organizations that have
been attacked have failed in securing their networks and exposed the country to grave risks.
How Do We Respond?
Having observed such incidents, the next question that arises is what is our response to them?. Are
we now wiser and have we identified what remedial measures we need to take to prevent such
incidents in future?
While the Government is expected to have its own resources to take protective measures, the
common man when affected would run to the Cyber Crime Police stations for relief. Unfortunately,
our Cyber Crime police stations have not been able to come up to the expectations of the public.
Many times, the Police have refused to register cases and often made the complainant run from
pillar to post to even lodge a complaint. The confusion arises since some Cyber Crime Police
stations do not recognize any crime coming under IPC as Cyber Crimes even if they have been
committed with the use of Cyber tools. They are under the false impression that they exist only to
take care of offences under Information technology act alone. Public are therefore losing faith in
the Law enforcement’s ability to protect Cyber space.
Lack of Coordination between Security agencies
In the few cases where Cyber Crime cases have been initiated, lack of coordination between
different Police stations have frustrated the investigation. In some cases when the investigation
trail goes abroad, CBI is not coming forth with its own support and the investigations reach a dead
trail.
When Cyber Crimes are committed with mobile network, it is often difficult to convince the mobile
service providers that they are responsible for assisting the Police in the investigation. Many of
them do not even recognize mobile crimes as Cyber Crimes and therefore fail to appreciate their
legal obligations.
In the private sector, whenever crimes are reported, companies are more concerned about their
own reputation than public good and they do everything within their powers not to register a
complaint nor enable a proper investigation. This is particularly true of Bankers who hide any
frauds that occur in their network for the fear of losing public confidence.
Page 21
The software developers in the country contribute in their own measure to the insecurity in the
Cyber space by supplying software that has many security weaknesses and leave it to future
security patches to correct the bugs which they should have corrected at the beta level.
Some software developers hide under the IPR claims to shield their source codes and prevent the
user from making a proper security assessment. Many security professionals believe that major
software vendors deliberately keep a backdoor entry to the software for apparently legitimate
purpose but with dangerous possibilities.
Threat in the Critical IT Infrastructure Security
Apart from the security threats that are visible in the above incidents, there is another lurking
danger where our critical IT infrastructures such as the missile launching stations, the defense
support IT systems etc could be under threat of an Electronic warfare. There are serious reports
about China specializing in such Cyber Space warfare which could be a potential threat to the
Indian security.
This realization that there is a security threat to the country’s armed forces has already been
recognized by many other countries. USA has been one of the first to set up a Cyber Space
Command to assist its defense forces in defending against an external cyber threat and also enable
USA to launch a cyber war on another country. Perhaps the US Cyber Command would now be
thinking about neutralizing the Russian Business Network which appears to be a global cyber crime
node.
A recent seminar in Vietnam attended by many countries such as Australia, Malaysia, Singapore etc
explored the need for National Cyber Security and some of these countries are already in the
process of developing a national cyber space security strategy.
In India efforts in the direction of a national cyber security strategy are not so far visible. The
Government of India has set up CERT-In as a division of the Ministry of Information Technology
which is being nurtured as the nodal security agency in India. NIC which has been involved in many
e-Governance projects and should be a natural choice for ensuring cyber security in e-Governance
project does not seem to have made much progress. CDAC has been involved in certain research
projects and is not in the forefront of strategizing a national cyber security plan. Private sector is
concerned only in its needs to get ISO certified. Nasscom is focusing on building a security
organization for BPOs which is in the early stages of planning.
There was one serious attempt to develop a national cyber security agency five years back when Dr
Abdul Kalam before being elected as President of India initiated the formation of the Society for
Electronic Transaction Security which later paled into the background.
A serious adverse consequence of an inadequate state response to perceived national security
threat is the emergence of private tech savvy individual hacker groups who try to counter hack
foreign websites known to be inimical to the national interests. This “hactivist” tendency however
presents the danger of degenerating into Cyber Naxalism and needs to be regulated.
Components of the Security Plan
When we look at the National Cyber Space we need to look at the following different components of
Cyber space since the security requirements of each of these segments may be different.

Security of the Critical IT Infrastructure of the Government

Security of e-Governance infrastructure

Security against Cyber Crimes

Security of Information in the industry infrastructure

Security of Individual desktops/electronic devices
Analyzing all these efforts, it appears that the biggest challenge ahead of us is to develop a
synergistic cooperation between different security organizations in such a manner that the national
cyber space remains secured. If such a collaborative structure is to be built up then there is also
the issue of whether it is feasible for the Government sector to join hands with the private sector
Page 22
with a common objective of securing the common cyber space. Effective Public-Private sector
cooperation is therefore one of the key challenges to be faced in building the national cyber
security infrastructure.
Towards Finding a Solution
In order to find a solution to the need for developing a national cyber security infrastructure, the
following structure is suggested.
The National Cyber Security Infrastructure may be headed by a “National Cyber Army Command”
as a Unified apex authority responsible for Cyber Space Security of India.
This may have one direct command called “Critical Infrastructure Defense Force” which will
supervise the Cyber space risks of the National Defense forces.
Additionally there may be four other sub divisions which will guide and supervise the Cyber space
security requirements in four other segments through different cooridnating agencies.
These subdivisions may be
1. Non critical Government Cyber Asset defense force
2. Indian Cyber Crime Police Service
3. All India Federation of IS Managers
4. All India Federation of Information Insurance Agencies
The “National Cyber Army Command”would be equivalent to the fourth division of the defense
forces consisting of the Army, Navy and Air force. It would however be different in the sense that it
would also provide leadership to the other security agencies in the Cyber space. To draw an
anomaly, it is like the Army being also in charge of the Police outfits in the country. The concept
would be a “Unified Command” for all Cyber Security requirements.
The “Critical Infrastructure Security Force” would cover the security requirements of the armed
forces as well as select installations of national importance such as the nuclear power stations,
rocket launching station, AIR and Doordarshan etc. This subdivision will be the equivalent of the
Cyber Command which USA has envisaged and will mainly have the military objectives.
All other assets of the Government such as the e-Governance support infrastructure will come
under “Non Critical Government Infrastructure” and its security may be handled by Cert-In. NIC
may limit its role to provision of IT services.
In order to make the Cyber Crime Policing more effective, an Indian Cyber Crime Police (ICCP)
Cadre should be created and all state Cyber Crime police stations should be merged in this all India
police force. The officials in this cadre should have a separate career plan and should be
professionally managed outside the political control of the state units. The CBI’s Cyber Crime unit
should also be merged with the ICCP service which should have its own police stations wherever
required. Local police force and the ICCP should exchange support and help each other whenever
required.
The above three sub divisions will operate in the public sector.
In the private sector, two self regulating bodies may be encouraged to be formed one for the
industry infrastructure security and the other for the individual security. The industry level
Information Security Managers should coordinate their efforts through an All India Federation of IS
Managers. This should be a self regulating body such as the CII.
The individual desktop security should be driven by the initiatives of the private sector security
product companies . Preferably the Information Insurance industry should be developed in India
and a consortium of Information Insurers should drive the desk top security initiatives through
appropriate incentivisation of security implementation.
Individual programmes to be undertaken by each of these sub divisions would include Education,
Product development, Standardization and Certification, Regulatory measures, etc.
Page 23
In order to continue the debate further, it is suggested that a “Think Tank” be formed out of the
expert participants of the Cyber Security Seminar who may develop a recommendatory note to be
submitted to the Central Government within an appropriate time frame.
Table of Contents
Countering Information Warfare
By Peter Brookes, The China Post, October 18, 2007
While France, Germany, the UK and the U.S. do not see eye to eye on everything, there is one
thing they probably can agree on: the growing problem of Beijing's intrusions into their
government computer systems.
Indeed, in the last few weeks, all four capitals have pointed an accusatory finger at Beijing for
attempting to infiltrate -- or having succeeded in penetrating -- their diplomatic or defense
establishment computer networks.
While snooping by the People's Liberation Army's (PLA) cyber-soldiers on unclassified government
Web sites and e-mail might be expected, the recent rash of incidents shines a spotlight on a
burgeoning game of Internet cat and mouse.
In the case of China, Beijing's increasing aggressiveness (indeed, ham-handedness) and capability
to infiltrate the computer networks of key countries is setting off alarms across the security
establishment -- and rightfully so. Take the U.S.: while modern warfare is increasingly dependent
on advanced computers, no country's armed forces are more reliant in the Digital Age than those
of the U.S. This is both a great strength and a damning weakness.
Today, the U.S. Department of Defense uses more than 5 million computers on 100,000 networks
at 1,500 sites in 65 countries worldwide. Not surprisingly, potential adversaries have taken note of
the U.S.' slavish dependence on bits and bytes.
In an average year, the Pentagon suffers upwards of 80,000 attempted computer network attacks,
including some that have reduced the U.S. military's operational capabilities.
Also, in the last few years, the U.S. Army's elite 101st and 82nd Airborne Divisions and 4th
Infantry Division have been "hacked."
While it is difficult to determine the source, according to the Pentagon, most attacks on the U.S.
digital Achilles' heel originate in China, making Beijing's information warfare (IW) operations an
issue we had better pay close attention to.
IW, including network attacks, exploitation and defense, is not a new national security challenge.
Cyberwarfare was the rage in the late 1990s, but has faded since 9/11 in comparison to the
mammoth matters of Islamic terrorism, Iraq and Afghanistan.
IW appeals to both state and non-state actors, including terrorists, because it is low-cost, can be
highly effective and can provide plausible deniability of responsibility due to the ability to route
strikes through any number of surrogate servers along the way.
An IW attack can launch degrading viruses, crash networks, corrupt data, collect intelligence and
spread misinformation, effectively interfering with command, control, communications, intelligence,
navigation, logistics and operations.
Not surprisingly, rising power China is serious about cyberwarfare, making the development of a
robust IW capability a top national-security priority. China's military planners recognize U.S. -- and
others' -- dependence on computers as a significant vulnerability.
Table of Contents
Congress: Power Grid Defense Is Weak
By Lisa Vaas, eWeek, October 19, 2007
In the wake of the Idaho National Laboratory test that blew up an electrical generator with a
simulated cyber-attack and revealed the fragility of the nation's electrical infrastructure, a
Page 24
congressional panel on cyber-security is calling for an investigation into how well electric sector
owners and operators have implemented security mitigations developed by the U.S. Department of
Homeland Security and Department of Energy.
The danger is growing, many say, given the increasing number of touch points between the United
States' power infrastructure and the wild and dangerous world of the Internet.
"Once largely proprietary closed systems, control systems are becoming increasingly connected to
open networks, such as corporate intranets and the Internet. As such, the cyber-risk to these
systems is increasing," said Rep. Jim Langevin, D-R.I., chairman of a House of Representatives
cyber-security panel, in an opening statement for an Oct. 17 hearing devoted to the cyber-threat to
utility control systems and the stronger regulations that are necessary to secure the electric grid.
According to Langevin, what's at stake is a power system worth more than $1 trillion, comprising
more than 200,000 miles of transmission lines and more than 800,000 megawatts of generating
capability that serves over 300 million people through the United States and Canada. The effective
functioning of this infrastructure is highly dependent on control systems, which are computer-based
systems used to monitor and control sensitive processes and physical functions.
"Intentional and unintentional control system failures on the bulk power system could have a
significant and potentially devastating impact on the economy, public health and national security
of the U.S.," Langevin said in his opening statement, which is posted here.
"For a society whose every function depends on reliable power, the disruption of electricity to
chemical plants, banks, refineries, hospitals, water systems and military installations presents a
terrifying scenario. We will not accidentally stumble upon a solution to these problems. Instead, we
must dedicate a lot of hard work and resources to secure our systems," he said.
To that end, the Federal Energy Regulatory Commission has proposed implementing a set of
reliability standards developed by the North American Electric Reliability Corp. However, members
of the cyber-security committee have found those standards to be woefully inadequate, Langevin
said. "The NERC standard focuses on the reliability of the bulk power system as a whole, ignoring
the homeland security impact that loss of power in a region can have," he said.
The House committee faults the standards for a failure to cover a "significant number of assets"
that are critical to keeping the nation's electricity flowing—specifically, they neglect any
requirements regarding electric sector owners and operators securing generation units, distribution
units or telecommunications equipment.
"But we know from countless real-world examples that these units are highly vulnerable to
intentional and unintentional cyber-events," Langevin said. "Knocking any of these units off could
affect the power supply to our nation's critical infrastructure."
The proposed NERC standards would require certain users, owners and operators of the grid to
establish plans, protocols and controls to safeguard physical and electronic access to systems, to
train personnel on security matters, to report security incidents and to be prepared to recover
information.
The Idaho National Lab's formerly classified demonstration of blowing up a generator, revealed by
Homeland Security officials in September and subsequently aired in part by CNN, was a dramatic
illustration of how control systems can be used to inflict critical damage onto physical structure—
specifically, a turbine.
That scenario has been tested and known about for some time, according to Amit Yoran, CEO of
NetWitness and former director of the DHS' National Cyber Security Division. The reality is a bit
more complicated, however, than the sensationalistic, smoking-equipment video clip reveals, he
told eWEEK in a recent conversation.
"Utilities and equipment that rely on control systems—[i.e.,] computer or electronic equipment
attached to mechanical equipment—broadly in the power sector or in other utilities or other critical
infrastructure, that's a very complex system or set of systems, and their interaction is very
complicated, not only in the case of power if you're talking about generation, or transmission, or
Page 25
distribution, all these things are very complicated in and of themselves, and when you start
intertwining them, it gets very complicated.
"[Add to that] regulatory issues, industry standards and best practices, [and] sometimes seemingly
competing requirements between availability and redundancy and what we think of as a standard
that says you shalt not set a password on this system because if Joe is at home or hit by a bus and
power goes down, we don't want people to have to crack a password to get power."
Thus the systems that control the grid get increasingly interconnected, Yoran said, and the
disparate lines that were once more or less stand-alone get put together and deployed in ways that
"may be lacking from a security perspective," he said.
Still, nobody should assume that one turbine blowing up in the controlled situation of a lab should
be taken to mean that all control systems are vulnerable to this type of attack, he said.
"Many infrastructures have both electronic as well as physical measures to protect equipment, for
public or operator safety. They have spillover valves, auto shut-off valves. Some of those are not
electronic; some have mechanical protective measures. I don't think a valid conclusion is because
one turbine is destroyed all critical infrastructure is vulnerable to this attack. It's important, it's
dramatic, it's a good indicator of a bad-case scenario, but it shouldn't be interpreted as a pervasive
and definitive conclusion for all control systems."
At any rate, getting control systems vendors to comply with a rigid set of standards doesn't fit in
well with the reality of the world of control systems, Yoran said. Control systems themselves have
complex and long deployment cycles. A control system may be an application with a warranty that
the control system vendor put together and offered on a particular operating system where the
control system was tested and validated. As vulnerabilities are discovered, those who run control
systems run into scenarios wherein they well might void their warranty, such as when a security
patch is applied. Thus, in some cases, operators are caught between a rock and a hard place,
having to choose between improved security versus the desire for a valid warranty and support
services.
"The control system world is a very complex one. We can't say, 'Charge forward and by next
Tuesday patch everything and we'll be protected.' It takes a lot of detailed study of control systems
and interactions with the infrastructure before" the grid overall can be improved vis-à-vis its safety
from cyber-attack, he said.
The NERC is well aware of the complexity of the situation. Joseph McClelland, director of the Office
of Electric Reliability at the FERC, said at the Oct. 17 hearing that overly prescriptive standards run
the risk of becoming a "one-size-fits-all" solution that ignores "significant differences in system
architecture, technology and risk profile."
"A major concern with cyber-security is the prevalence in the industry of 'legacy equipment' which
may not be readily adaptable for purposes of cyber-security protection," he said. "If this equipment
is left vulnerable, it could be the focal point of efforts to disrupt the grid."
Replacing the grid's antiquated equipment or retrofitting it to incorporate cyber-security protection
could be costly, McClelland said, "but a successful cyber-attack could damage our bulk-power
system and economy in ways that cost far more."
The Homeland Security's cyber-security czar Greg Garcia reportedly said on Oct. 17 that his agency
will be passing out cyber-security self-assessment guidelines to control systems operators, will
offer training to workers in the field, and will be distributing suggestions for mitigations against
real-world attacks similar to the one enacted on the Idaho National Lab video.
Table of Contents
Page 26
Download