Quantcast

Jihadist Use of the Internet 2008-2011 Overview 4: Forensics and the Hierarchy of Murder

Making final strokes to the presentation, Jeff Bardin reviews more toolkits, including one on forensics, and al-Qaeda’s strategic and operational objectives.

FBI Field Kit for forensics utilized by Jihadis

FBI Field Kit for forensics utilized by Jihadis

Somewhere along the line the Jihadis were able to get hold of the FBI Field Kit for forensics (see right-hand image). This was posted online on several sites, 71 MB per section, 17 sections, created on a DVD as an ISO image, exposed over 4 GB worth of data. You can see some of the information here listed in the forensics kit: Cryptcat, Netcat, different tool sets, many of which you might have been able to put together yourself. But there’s much more to it than this; we’ll show you in the next couple of slides.

More details on the Field Kit

More details on the Field Kit

Here is a bit more extensive listing of what is actually in the Field Kit (see left-hand image); this time from forensics tools and security tools and field kit manuals out there. These manuals are actually full PDF books, fully available. There are still more interesting things coming up with respect to what is out there.

Listing of security tool sets

Listing of security tool sets

One more view on what is actually available on the toolkit – again, some standard security tool sets out there (see right-hand image). Nothing earth-shattering here when you look at this particular listing; fully aggregated, though, and built into an effective toolkit.

Toolkit on physical and cyber activities

Toolkit on physical and cyber activities

Other toolkit combined physical, as well as cyber type of activities, crime scene investigation, all kinds of different books (see left-hand image). The most interesting piece was the faces tool set, which allowed you to do sketch art right from your PC. That was a pretty interesting tool out there, fully made available out there, and has been in use for quite some time and downloaded by the Jihadis.

Field Kit availability as of 2010

Field Kit availability as of 2010

Here’s a full breakdown of the parts for the particular disk (image to the right), the Field Kit through 17 different parts; the ISO image, 1.4 GB, overall explodes out to about 4 GB. I’m not sure if it’s still out there.

Communicating Jihad

Communicating Jihad

Another snippet on communicating Jihad here (see left-hand image); I will be doing a separate write-up on Jihad overall that will be forthcoming in the next couple of months here. Regardless, Inspire magazine first came out in Arabic language and eventually was translated into English, and we’ve seen now 11 versions of that, and it’s become quite well received in Jihadist circles, and it is something that the West is always looking for to getting its hands on to see what it can actually endue and deliver. So, it is full of the usual propaganda and information out there; there’s plenty other magazines available as well. This Inspire, though, gets our attention because it is, in fact, in English.

The stunning hierarchy of murder

The stunning hierarchy of murder

Now this particular diagram (see right-hand image), or the hierarchy of murder, as I call it, is actually a way of communicating Jihad, and also sets things up almost like a video game. It starts with who to murder and who to kill. We’re looking at Jews and Christians. If we start moving from left to right here, Jews and Christians in Muslim lands will come first, in particular, Saudi Arabia. Americans are first and Brits are second. In Iraq they want Americans, Afghanistan – Americans, Algeria, of course – the French, and Indonesia – the Australians.

They have human target categories as well: the Jews of America and Israel, as well as Jews of the UK and Jews of France. As you go down the line, the points scoring on this video game would actually be in place and would go from high to low. Christian rankings: Americans, UK, Spanish, Australians, Canadians and Italians, as well as further divisions in the hierarchy of murder: they take you down in finance and businessmen, diplomats, politicians, intellectuals, political delegations, and so on.

The goal of targeting humans here is to provide clarification of the nature of the conflict: by targeting Christians and Jews it shows that it is a religious struggle and that’s, again, what they want to make this. To show the main enemy and to deter others is what they’re after; to spread fear in the enemy – and this is a requirement documented in the Quran. To raise the morale of the Islamic nation, destroy the image of the government that was targeted, and after the 9/11 attacks they believed America’s nose was in the dirt. Disrupt the plans of the infidels, like the time when Italy refused to send troops to Iraq. Also, like what happened in Spain, where the challenger of the Prime Minister promised to pull the troops out of Iraq after the attacks in Madrid, the train bombing set we covered earlier; and to punish them for killing Muslims. So this is the hierarchy of murder that helps communicate Jihad and lay out the architecture of who to kill first.

Winding up with the study

Winding up with the study

So, we’ve covered quite a bit in this talk today, but there is much more that we could have covered. The 60 slides is quite a bit to review, so excuse me for the length of this, could have spent a whole day in discussion, and the information has been collected over the years. Regardless, what we did cover is that we have to know that cyber attacks will continue and cause economic harm as much as possible, and they will continue to disrupt websites.

They intend to make money through online fraud and they desire to conduct more damaging attacks as much as possible, and they use the Internet for command and control. They not only use it for command and control, but their strategic and operational objectives. This doesn’t necessarily translate into hacking capabilities, but it does provide the opportunity for monitoring and disrupting their activities. Hacking is definitely coming on its own as a state-sponsored activity through the use of cyber proxies – we’ve seen that most frequently.

There are some caveats to this as well – the information is based on open sources, and open source provides a plethora of data out there, if you can sift through it and find little pieces and nuggets that you can organize into something that’s possibly actionable.

The Jihadis are innovating all the time.

They are skilled in various technologies, and this is increasing significantly. Their medium propaganda is key to their recruitment and has been for some time as they follow the radicalization process. And they’re innovating all the time; most recently they’ve come out with some new technologies relative to encrypting Pigeon and other pieces that may not be known to others. They have malware encryptors and they have other tool sets that have been around for some time.

There was a heavy use of forums up to 2011; then they started to move more towards Facebook, YouTube, Twitter for faster communication setup. And this fits the lone wolf mentality of setting up my own. That will come in different discussions down the road as we move forward from 2011 up to current days. And they understand that 90% of the war is information, and if they can control it, if they can manipulate it, then they have the propaganda edge and they have quite some time.

Al Qaeda’s strategy

Al Qaeda’s strategy

And of course, their intent on slaughtering anyone who doesn’t believe as they do; they’ll use human activities, open source, culture, history, religion, language – any way, shape or form to move their goals ahead. I urge you all to study more on this topic and subject. Wish I could spend more time on delving deeper into this. Hopefully, this is an overview that has been worthwhile. You have my email address, should you wish to contact me further, available for cyber intelligence training services, counter-intelligence activities. Thanks very much, we have one more slide (see right-hand image above).
 

Read previous: Jihadist Use of the Internet 2008-2011 Overview 3: Online Training Materials

Like This Article? Let Others Know!
Related Articles:

Leave a comment:

Your email address will not be published. Required fields are marked *

Comment via Facebook: