U.S. Web site said to offer strengthened encryption tool for al-Qaeda backers
Update of year-old software available on password-protected site, researchers say
Computerworld - An Arabic-language Web site hosted on a server located in Tampa, Fla., is apparently offering a new version of software that was designed to help al-Qaeda supporters encrypt their Internet communications.
The new encryption tool is called Mujahideen Secrets 2 and appears to be an updated version of easier-to-crack software that was released early last year, said Paul Henry, vice president of technology evangelism at Secure Computing Corp. in San Jose.
The tool is being distributed free of charge on a password-protected Web site that belongs to an Islamic forum known as al-Ekhlaas, according to Henry and a blog posting by the Middle East Media Research Institute. MEMRI is a Washington-based organization that monitors what it describes as jihadist Web sites and publishes translations of online content originally posted in Arabic, Persian or Turkish.
Henry said that he contacted the FBI about the al-Ekhlaas site and its contents last weekend. But as of this afternoon, the site was still up and running. Prior to being hosted on the server in Tampa, the site appears to have been run off of a system in Minnesota, Henry said.
MEMRI identified the Web hosting firm that owns the server on which the al-Ekhlaas site is running as Tampa-based Noc4hosts Inc. Officials from the hosting firm didn't immediately return calls to a general toll-free number listed on its Web site.
Because of the password protection, Henry hasn't been able to download the new tool and therefore can't say what level of encryption it supports. But he said that a banner ad on the site claims that the software offers the highest level of encryption now available. That means it likely uses at least 1024-bit encryption, whereas the first version of Mujahideen Secrets used 256-bit AES encryption, he said.
A Reuters story posted Jan. 18 and datelined Dubai quoted the al-Ekhlaas Web site as saying that the new release was a "special edition" of the encryption tool created "in order to support the mujahideen in general and the Islamic State in Iraq in particular." That organization was described by Reuters as being linked to al-Qaeda.
Efforts by groups that support al-Qaeda to develop their own encryption tools appear to be driven by concerns about possible back doors being built into publicly available encryption software, Henry said. He added that the upgraded Mujahideen Secrets tool could cause problems for law enforcement and antiterrorism agencies that are tracking the activities of such groups.
"Up to this point in time, we have been able to discount al-Qaeda's use of the Internet as an attack vehicle because of their use of outdated and easily thwarted technologies," Henry said. But, he warned, that could begin to change if al-Qaeda backers start adopting more up-to-date tools.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts