OUR TERRORISM INITIATIVE
TERRORISM INITIATIVE
WHO WE ARE, WHAT WE ARE DOING
My associates and I have been engaged in
counter and competitive intelligence initiatives
for many years now, directly and peripherally.
Until recently the majority of our work has been
performed predominantly in the private sector
arena, for a select client base. ( Powerpoint available, services )
We've recently decided to make a shift and provide
a glimpse of some of our available services and
capabilities, to the mainstream general public.
Actually, the "toolbar" is part of this public initiative.
Under the news radar, out of sight of the world
media, is considerable part of militant Islam's
fight for power. Its taking the form of a magazine
and graphics INFORMATION war on the internet, which
we are loosing.
At stake is a phenomenon with major implications
for the future security of the United States and
risk to its Western allies -- the steady, stealthy
secret indoctrination and education of an entire
new generation of Muslim youth in a radicalized,
aggressive, militant vision of radical Islam. These people
(Muslims) are deceived by a bastardazation of their religion and the
false Mujahideen. The radicalizing propaganda on
the web is expanding by the day, improving in
sophistication, quality and quanity. This false Islam ideology
remains largely unopposed.
We are pushing a counter-ideology, and bringing a
response to the new battle arena, the internet.
Using the Koran we are countering al Qa'ida's lies, exposing
the false spin they use on Islam..
We provide this information to our toolbar users.
An "armchair mujahid" becomes converted via the
internet propaganda, from a sympathizer with the general aims
of the jihad to a motivated foot-soldier, jihadist,
sucide bomber. We expose this propaganda with quotes from the Koran.
Michael Chertoff, head of US Homeland Security,
warned that people don't need to travel to a
country with "-stan" in its name to become
radicalized and commit acts of violence. Instead,
they can now turn to the Internet. "They can train
themselves over the Internet. They never have to
necessarily go to the training camp or speak with
anybody else and that diffusion of a combination of
hatred and technical skills in things like
bomb-making is a dangerous combination."
Those are the kind of terrorists that we may not be
able to detect with spies and satellites.
How the terrorists are using the Internet is the
key to defeating them. They LIE to Moslems.
* Psychological Warfare:
"The Internet—an uncensored medium that carries stories, pictures,
threats, or messages regardless of their validity
or potential impact—is peculiarly well suited to
allowing even a small group to amplify its message
and exaggerate the groups importance and the threat it
poses."
* Publicity and Propaganda:
"Until the advent of the Internet, terrorists' hopes of winning
publicity for their causes and activities depended
on attracting the attention of television, radio,
or the print media. These traditional media have
"selection thresholds" (multistage processes of
editorial selection) that terrorists often cannot
reach. No such thresholds, of course, exist on the
terrorists' own websites, and forums and chat rooms."
They have "News sites" with false stories and dis-information.
We teach our toolbar users how to spot dis-information.
These are designed to incite readers with lies, and false 'News' stories.
* Data Mining:
"Like many other Internet users,
terrorists have access not only to maps and
diagrams of potential targets but also to imaging
data on those same facilities and networks that may
reveal counterterrorist activities at a target
site. One captured al Qaeda computer contained
engineering and structural features of a dam, which
had been downloaded from the Internet and which
would enable al Qaeda engineers and planners to
simulate catastrophic failures."
* Fundraising:
"The Sunni extremist group Hizb al-Tahrir uses an integrated web of Internet sites,
stretching from Europe to Africa, which asks
supporters to assist the effort by giving money and
encouraging others to donate to the cause of jihad.
Banking information, including the numbers of
accounts into which donations can be deposited, is
provided on a site based in Germany. The fighters
in the Russian breakaway republic of Chechnya have
likewise used the Internet to publicize the numbers
of bank accounts to which sympathizers can
contribute. (One of these Chechen bank accounts is
located in Sacramento, California.) Some
websites contains a a page on which visitors can
make credit card donations."
* Recruitment and Mobilization:
"The SITE Institute, a Washington, D.C.-based terrorism
research group that monitors al Qaeda's Internet
communications, has provided chilling details of a
high-tech recruitment drive launched in 2003 to
recruit fighters to travel to Iraq and attack U.S.
and coalition forces there. Potential recruits are
bombarded with false untrue religious decrees and anti-American
propaganda, provided with training manuals on how
to be a terrorist, and—as they are led through a
maze of secret chat rooms—given specific
instructions on how to make the journey to Iraq."
Currently they produce several terrorist magazines some weekly, and
post them on the web to 20 or 40 different public servers.
* Networking:
"Many terrorist groups, among them Hamas and al Qaeda, have undergone a
transformation from strictly hierarchical
organizations with designated leaders to
affiliations of semi-independent cells that have no
single commanding hierarchy. Through the use of the
Internet, these loosely interconnected groups are
able to maintain contact with one another—and with
members of other terrorist groups." And recruit new members.
* Sharing Information:
"Another manual, The Mujahadeen Poisons Handbook, written by Abdel-Aziz
in 1996 and 'published' on the official Hamas
website, details in twenty-three pages how to
prepare various homemade poisons, poisonous gases,
and other deadly materials for use in terrorist
attacks. A much larger manual, nicknamed 'The
Encyclopedia of Jihad' and prepared by al Qaeda,
runs to thousands of pages; distributed through the
Internet, it offers detailed instructions on how to
establish an underground organization and execute
attacks."
* Planning and Coordination:
"Hamas activists in the Middle East, for example, use chat rooms to
plan operations and operatives exchange e-mail to
coordinate actions across Gaza, the West Bank,
Lebanon, and Israel. Instructions in the form of
maps, photographs, directions, and technical
details of how to use explosives are often
disguised by means of steganography, which involves
hiding messages inside graphic files."
Virtual Jihad :
The Internet as the ideal terrorism recruiting tool
If you read Arabic and want a degree in jihad,
click on www.al-farouq.com/vb/. If you're
lucky--the site disappears and reappears--you will
see a post that belongs to the Global Islamic Media
Front (GIMF). It announces the "Al Qaeda University
of Jihad Studies." According to Ahmad al-Wathiq
Billah, the GIMF.
"Deputy General Emir," students "pass through
faculties devoted to the cause of the caliphate
with morale boosting religious posts and attack videos." and the site
offers specialization in "electronic, media,
spiritual and financial jihad."
The Internet has long been essential for terrorism,
but what has surprised us is the growth of
such Islamist (radical Islam) and jihadist sites.
Their continuing rise suggests that recruitment for
a "holy war" against the West could proceed
unabated, despite capture of key leaders.
According to Gabriel Weimann, a professor of
communications at the University of Haifa in
Israel, the number of all terrorist Web
sites--those advocating or inciting terrorism or
political violence--has grown from a dozen in 1997
to almost 4,700 today, a nearly 400-fold increase.
(By comparison, the total number of Web sites has
risen about 50- to 100-fold.)
The war in Iraq provides motivation for
radicals, Islamofacisits, and the Internet appears to be
facilitating them, even if legitimate governments
shun them. "We are talking about groups that are
opposed and persecuted all over the Arab and Muslim
world, so the Internet becomes the only alternative
to spread their messages," says Reuven Paz,
director of PRISM (Project for the Research of
Islamist Movements), a watchdog group in Herzliya,
Israel. The spread "is like an attempt to create a
virtual Islamic nation", and training camp.
Scott Atran, a research director at the Jean Nicod
Institute of the CNRS in Paris, studies the group
dynamics of terrorists. He notes that the attackers
of Madrid, London and Bali were autonomous groups,
like "swarms that aggregate to strike and then
vanish." The open, anarchic structure of the
Internet supports this "chaotic dynamics" modus
operandi as a way for militants to recruit new
members and look for goals or inspiration. "Without
the Internet, the extreme fragmentation and
decentralization of the jihadi movement into a
still functioning global network just would not be
possible," Atran argues. "I think we can expect
more independent attacks by autonomous groups
because of the Internet."
Here he is wrong, it is not "because" of the Internet but with or using the Internet.
Atran, who has interviewed several radical
jihadists, says that the Internet has spread a
homogenized, flat false notion of Islam, one that has
little to do with Islamic tradition. The militants
express a message of martyrdom for the sake of
global jihad as life's noblest cause. "I was very
surprised to find, from the suburbs of Paris to the
jungles of Indonesia, that people gave to me
basically the same stuff, in the same words," Atran
says. A Globalization of this false Islam facisistism.
But the chat rooms and forums can serve as a method for
spreading life-affirming Islamic ideas as it does for terrorist ones.
Convincing jihadists of alternative values, tridational Islamic values would be
a long process, he admits. Posting in forums works.
Even talking to them in forums BEFORE they become
Jihadist can delay or stop the radicalization. Currently we are loosing the Internet media war,
they are getting their ideas out there and NO ONE
is presenting a traditional Islamic Ideas.
WELL YOU CAN HELP...
By using the Terrorist toolbar to post the truth.
We provide text and videos and a list of Islamic forums.
What does the IAterror toolbar let me do?
Fight terrorism or just stay informed with Intel "NOT ON TV".
Terrorist are spreading their HATE and lies on the WWW. You can post the truth in the same forums they use, counter their lies with the truth.
We provide state of the art security and guide lines.
Including RULES TO HELP KEEP YOU SAFE.
Even an encrypted IM so you can counter-terrorist surf with a buddy (recommended) and keep in touch.
Join our "cyber corps", for tips and help. We give you Tools for evidence collection and reporting links.
OR JUST KEEP INFORMED WITH THE BEST INTEL ON THE NET. AND REMARKABLE SOURCES, live and Real time.
*Stop the terrorist from winning the Internet media war, Post.
TOOLBAR Includes FREE: Arabic Keyboard, 1000
terrorist sites, "Al Qaeda" manual, steganography
tools, translation Arabic to English, and a list of
forums they use, Encrypted email and IM. Music Juke
box, all FREE, to help in your Anti-terrorist surfing.
Free EASY VPN, Proxy tester, Intel updates,
Investigative TOOLS, SECURITY systems, Trackers, tracers, bots.
Terrorism SOURCES and a group to work with if you want.
Knowledge Base, Gov. Sources, VIDEOS, posting tools, who owns site, location etc.
Screen grabber, NAS AND CIA PHONE NUMBERS, CUSTOM RSS feeds,
Also NBC survival FAQ. Radiation and Blast Caculators,
INDEPENDENT REVIEW.
http://sunbeltblog.blogspot .com/2006/10/terrorism-toolbar .html
ACTUAL TERRORISM TOOLBAR USE:
http://mypetjawa.mu.nu/archives/185045.php
Combat Terrorism Toolbar:
http://cigars.bravepages.com/head/iaterror.htm
Gerald
Internet Anthropologist
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home