You are on page 1of 1

12 nationalpost.

com

issues &
national post, Tuesday, October 20, 2009

‘Western intelligence
agencies need central
capabilities to monitor
the terrorist web’

F i g h t i n g t h e v i r t u a l wa r
F i r s t o f F ou r pa rt s

Mike Faille / National Post

Terrorists and rogue states are moving their battle to the Internet. In a
four-part series, our authors explain how to fight this evolving menace

‘The code is mightier than the sword’


Mark Dubowitz to have produced 97 original videos, a the more dynamic sites that serve as being identified, fairly or not, with the extract and analyze only the data of
and Larry Footer six-fold increase from 2005. operational tools for the terrorists. An activities of a terrorist organization. higher intelligence value. They also
As-Sahab leverages its products effective online strategy should serve For those companies not willing to use “anonymizer” tools to hide the
through Internet “clearinghouses,” to limit and discredit the jihadist mes- self-regulate, regulations should be computer user’s identity to try and

T
he Long War against radical which act as middlemen in distribut- sage, deny safe haven to terrorists on adopted for “Terms of Service” agree- keep the intelligence analyst from be-
Islam is a war of ideas as much ing terrorist media to “mirror sites,” the Internet, thwart their ability to ob- ments between Internet companies ing shut out by terrorist web masters.
as a war of arms. Yet, for too whereupon the videos go viral on tain support from a vulnerable online and their clients, focused on prevent- As a last resort, terrorist media’s
long, the incitement and vio- jihadist web forums and on popular population, and continue to monitor ing the incitement of violence. In- infrastructure and personnel rep-
lent propaganda from Internet Western sites such as Archive.org and their communications on web forums. ternet providers that repeatedly aid resent viable military targets. The
platforms operated by violent Islamist YouTube. A first step: The U.S and Canada terrorist entities by hosting their web- precedent exists: During the war
extremists have gone unnoticed and All this is part of a deliberate stra- should designate or criminalize ter- sites should be fined to the full extent in Kosovo, NATO planes bombed
unanswered. tegic goal outlined by al-Qaeda’s sen- rorist sites as terrorist entities. of the law. the Belgrade-based headquarters of
Today, such neglect is not an op- ior leadership. In a letter to former The U.S. Treasury Department Western counterterrorism and in- Radio Television of Serbia — an at-
tion. As we have been warned by Iraqi al-Qaeda leader Abu Musab has already designated Hezbollah’s telligence agencies also need central- tack that was justified by the Alliance
Harry Wingo — a former Navy SEAL al-Zarqawi, Ayman al-Zawahiri, al- al-Manar and the Iraqi-Syrian al- ized capabilities to monitor and re- as a legitimate way to end the broad-
who now serves as Google’s Washing- Qaeda’s second in command, wrote: Zawraa television channels for their spond to the terrorist web. Co-ordin- casting of Slobodan Milosevic’s vio-
ton, D.C. policy counsel — “the code is “We are in a battle, and more than role in providing operational support ated strategic information campaigns lent call to arms. Today, recognizing
mightier than the sword.” half of this battle is taking place in the in furtherance of terrorist attacks. should be waged against these groups, the dangers of terrorist radio, U.S.
Internet code may have created battlefield of the media … we are in a including cataloging, tracking and officials are jamming the FM radio
enormous wealth for Mr. Wingo’s boss- media battle in a race for the hearts continuously updating a database of signals of Pakistani terrorist groups
es. But it is also an operational weapon and minds of our people.” terrorist websites, website operators to prevent them from assisting in the
in the hands of terrorist groups to in- Major General John M. Custer III, and chat room participants. planning and execution of attacks. In
doctrinate, recruit, train, and finance Commanding General of the U.S. ‘You start off with a Discrediting the jihadist cause the future, more direct action may be
the next generation of terrorists. In-
creasingly besieged on the battlefield,
Army Intelligence Center, underscores
the impact of online terrorist media:
site that looks like also is a critical aspect to winning the
hearts and minds of the primarily
necessary.
The terrorist groups — and their
al-Qaeda, Hezbollah, Hamas and their “I see 16, 17-year-olds who have been current news in Iraq. young online audience. Information Western apologists — can no longer
Islamist brethren now seek anonym- indoctrinated on the Internet turn up campaigns must be conducted against pretend that these terrorist media
ity and freedom of movement online on the battlefield … You start off with With a single click, Islamist terrorists by widely publiciz- sites are legitimate outlets deserv-
through a vast and sophisticated ter-
rorist web network. To counter their
a site that looks like current news in
Iraq. With a single click, you’re at an you’re at an active ing their atrocities on the Internet.
Too few Muslims, for example, know
ing of free-speech protection. In fact,
violent incitement has been pros-
influence, policymakers and counter-
terrorism officials need to treat these
active jihad attack site … You can see
humvees blown up … small arms at-
jihad attack site’ about incidents such as the February
2008 terrorist attack in which, accord-
ecuted as a war crime, initially at the
Nuremberg trials against the Nazi re-
outlets as indistinguishable from the tacks … Next link will take you to a ing to Britain’s Daily Mail, al-Qaeda gime after World War II and, in 2003,
terrorist organizations that use them. motivational site, where mortar opera- rigged two unsuspecting women who against three Rwandan media execu-
The threat is real. A declassified tives, suicide bombers, are pictured in These designations should be expand- were afflicted by Down’s syndrome tives who used Rwanda’s Radio Mille
April 2006 U.S. National Intelligence heaven [providing] religious justifica- ed to include websites, terrorist video with remote-controlled bombs and Collines to call for the extermination
Estimate concluded: “The radicaliza- tion for mass murder.” production units, media companies, detonated them in a Baghdad market of Rwanda’s Tutsis. At that time, Reed
tion process is occurring more quickly, Terrorist online platforms are a crit- and website operators. Governments killing 99 people. Brody, legal counsel to Human Rights
more widely, and more anonymously ical part of the battlefield on which the need to freeze their assets, and make Sophisticated technology has an Watch, in supporting the Rwanda de-
in the Internet age, raising the likeli- Long War against violent Islamist ex- the provision of material support to important role to play in countering cision, concluded that, “If you fan the
hood of surprise attacks by unknown tremism is being fought. If they hope these entities and individuals a crim- the terrorist web. While some por- flames, you’ll have to face the conse-
groups whose members and support- to persevere, Western democracies inal offense. tions of the terrorist web are out in the quences.”
ers may be difficult to pinpoint. We need to take aggressive and direct ac- The private sector must also be en- open, other parts operate in an area By doing just that — by inciting
judge that groups of all stripes will tion against these media properties. couraged to monitor and self-regulate. of the Internet commonly referred to attacks, by actively recruiting and
increasingly use the Internet to com- What can be done? A great deal as it Policymakers should encourage media as “the Deep Web.” Akin to an ocean, fundraising and providing pre-attack
municate, propagandize, recruit, train turns out — from shutting down these entrepreneurs to follow the lead of the Internet has surface pages, but a intelligence and operational assist-
and obtain logistical and financial sites to exploiting them for counter- Google, which, in 2008, after requests significant portion lies beneath that ance for terror attacks — today’s ter-
support.” terrorism purposes. from Senator Joseph Lieberman and surface, out of reach of most popular rorist Internet sites are doing more
Through as-Sahab, its dedicated To understand how, think of the ter- other members of Congress, removed search engines. than fanning the flames. They are
media wing, the bin Laden network rorist web as two different platforms: numerous violent al-Qaeda videos A handful of companies have de- providing the match, the gasoline,
has built a formidable infrastruc- (1) interactive forums, discussion from its YouTube video sharing service. veloped data intelligence technolo- and the arsonist. It is high time that
ture to export its violent ideology. In groups, blogs and chat rooms used In making the decision not to facilitate gies that give access to sites traditional we treated terrorist code as being as
its definitive report on as-Sahab, the by jihadists to communicate and plan the transmission of terrorist media, search engines cannot find. The U.S. dangerous as the sword.
U.S. Senate Committee on Homeland with each other and attract and direct Google made a sound business choice intelligence community and military National Post
Security and Governmental Affairs new recruits; and (2) static web pages to avoid the real reputational risk of use these technologies to transform z “Fighting the Virtual War” is pre-
equated al-Qaeda’s media presence of violent propaganda. While the for- web data from terrorist sites into sented in collaboration with the Foun-
with that of many Western corpora-
tions in terms of sophistication. Ac-
cording to the Senate Committee
report, as-Sahab has attracted West-
mer can provide Western intelligence
agencies with vital information about
potential attacks, the latter frequently
contain little if any probative value be-
tomorrow actionable intelligence.
For example, certain applications
can crawl millions of domains simul-
taneously, a task impossible for hu-
dation for Defense of Democracies
(FDD), a Washington, D.C.-based policy
institute focused on terrorism. Mark
Dubowitz is executive director of the
ern attention in part because its vid-
eos have included original sermons
yond their violent messaging.
The goal should be to shut down Milt Maltz man analysts alone. Since this volume
of data, including dynamic content
FDD. He previously worked in software
management and technology venture
from senior al-Qaeda officers, such those sites that yield little in the way Turning power lines from the most complex websites, can capital. Larry Footer is FDD’s chief
as Osama bin Laden and Ayman al- of actionable intelligence while infil- be overwhelming for intelligence technologist. He is also the CEO of a
Zawahiri. In 2007, as-Sahab is known trating, monitoring and countering into battle lines analysts, applications automatically New York-based software company.

You might also like