U.S. Web site said to offer strengthened encryption tool for al-Qaeda backers
Update of year-old software available on password-protected site, researchers say
Computerworld - An Arabic-language Web site hosted on a server located in Tampa, Fla., is apparently offering a new version of software that was designed to help al-Qaeda supporters encrypt their Internet communications.
The new encryption tool is called Mujahideen Secrets 2 and appears to be an updated version of easier-to-crack software that was released early last year, said Paul Henry, vice president of technology evangelism at Secure Computing Corp. in San Jose.
The tool is being distributed free of charge on a password-protected Web site that belongs to an Islamic forum known as al-Ekhlaas, according to Henry and a blog posting by the Middle East Media Research Institute. MEMRI is a Washington-based organization that monitors what it describes as jihadist Web sites and publishes translations of online content originally posted in Arabic, Persian or Turkish.
Henry said that he contacted the FBI about the al-Ekhlaas site and its contents last weekend. But as of this afternoon, the site was still up and running. Prior to being hosted on the server in Tampa, the site appears to have been run off of a system in Minnesota, Henry said.
MEMRI identified the Web hosting firm that owns the server on which the al-Ekhlaas site is running as Tampa-based Noc4hosts Inc. Officials from the hosting firm didn't immediately return calls to a general toll-free number listed on its Web site.
Because of the password protection, Henry hasn't been able to download the new tool and therefore can't say what level of encryption it supports. But he said that a banner ad on the site claims that the software offers the highest level of encryption now available. That means it likely uses at least 1024-bit encryption, whereas the first version of Mujahideen Secrets used 256-bit AES encryption, he said.
A Reuters story posted Jan. 18 and datelined Dubai quoted the al-Ekhlaas Web site as saying that the new release was a "special edition" of the encryption tool created "in order to support the mujahideen in general and the Islamic State in Iraq in particular." That organization was described by Reuters as being linked to al-Qaeda.
Efforts by groups that support al-Qaeda to develop their own encryption tools appear to be driven by concerns about possible back doors being built into publicly available encryption software, Henry said. He added that the upgraded Mujahideen Secrets tool could cause problems for law enforcement and antiterrorism agencies that are tracking the activities of such groups.
"Up to this point in time, we have been able to discount al-Qaeda's use of the Internet as an attack vehicle because of their use of outdated and easily thwarted technologies," Henry said. But, he warned, that could begin to change if al-Qaeda backers start adopting more up-to-date tools.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- IDG Research Survey: Are you Paying Too Much for Your NMS? Feel like you're paying too much for network monitoring? You're not alone. This survey brief summarizes findings from research recently fielded by IDG...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Live Webcast 5 Steps to Assuring Quality of Experience In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones...
- Live Webcast Master the Changing SAP Landscape with Performance Management SAP landscapes are not getting simpler. Gradually, business processes that used to be contained on a single SAP system now involve a range...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Navigating the New Wireless Landscape Thriving in the new wireless landscape View Now>> All Networking White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!