Archive for the ‘Al-Qaida’ Category

Friend Me

Posted: December 9, 2010 in Al-Qaida, Friend Me, Jihadi Groups

Al Qaeda Looks to Make New ‘Friends’ — on Facebook

By Jana Winter

Published December 09, 2010 |


EXCLUSIVE: If you’re on Facebook, Al Qaeda wants to friend you.

Terrorist groups are using Facebook to share operational information and to target, recruit and radicalize members of the general public, according to a Department of Homeland Security report obtained by

The DHS report, “Terrorist Use of Social Networking Sites: Facebook Case Study,” notes while terrorists have been using social networking sites for quite some time, their strategies for exploiting Facebook have evolved and that they have learned “the inherent value in exploiting a non-ideological medium.”

According to the November report, terrorists and jihadists use Facebook as:

— a way to share operational and tactical information, including bomb recipes and weapons maintenance;

— a gateway to extremist forums;

— a media outlet for propaganda;

— a source of remote reconnaissance for targeting purposes.

“Every person who connects to the Internet with a computer needs to take this issue seriously,” says Steve Graham, senior director for EC Council, a cybersecurity certification membership organization. “Reports like this show we are figuratively sitting next to terrorists. So are our friends, our kids and anyone else who types http://www.”

DHS found that among the materials available to Facebook’s more than 500 million members are:

— Informational videos titled “tactical shooting,” “getting to know your AK-47” and “how to field strip an AK-47.” Those videos can be found on the page of a radical public Facebook group that is dedicated to jihad and has more than 2,000 members.

— A group discussion page featuring Arabic-language IED recipes for explosive ammonia and poisonous smoke bombs, and instructions on how to prepare nitric acid, which is used to make explosive mixtures. The same recipes were also posted on a radical forum, suggesting “some cross-over between radical content disseminated on Facebook and on Islamist extremist forums,” according to the report.

Some radical Islamist forums also maintain Facebook pages. “In this way, Facebook acts as a gateway or launching pad for further radicalization and for easy access to sites where explosives recipes and IED information are regularly posted,” the report says.

While DHS notes that Facebook is not the only social networking site employed by extremists, its report cites discussion threads collected from well-established radical forums that indicate jihadists are specifically targeting the site:

This [Facebook] is a great idea, and better than the forums. Instead of waiting for people to [come to you so you can] inform them, you go to them and teach them!

God willing, the mujahedeen, their supporters, and proud jihadi journalists will [use the site, too]. [First,] it has become clear that the market of social networking websites is developing in an astonishing manner and that it fulfills important needs for Internet users, particularly younger ones. [Second,] Facebook has become very successful in this field; therefore, it is our duty to use it, as adherents of jihad and [members] of the blessed jihadi media.

[I] mean, if you have a group of 5,000 people, with the press of a button you [can] send them a standardized message. [That] means if you send one message with a link to [forum names], a clear [path] to jihadi media is open.

I entreat you, by God, to begin registering for Facebook as soon as you [finish] reading this post. Familiarize yourselves with it. This post is a seed and a beginning, to be followed by serious efforts to optimize our Facebook usage. Let’s start distributing Islamic jihadi publications, posts, articles, and pictures. Let’s anticipate a reward from the Lord of the Heavens, dedicate our purpose to God, and help our colleagues.

One forum user outlined “General Goals of the Invasion”:

1. Reach the wide base of Muslims who [use] Facebook.
2. Encourage brothers to devise new online media in support of jihadi media.
3. Form a solid base on Facebook and shed light on it as a medium for reaching people.
4. Move from an elite society ([on] jihadi forums and websites) to mainstream Muslims, [encourage] their participation, and interact with them.
5. Advance media operations and encourage creativity, innovation, flexibility, and change. Reach large [numbers] of Crusaders, broadcast the losses of their armies, expose the lies of their leaders, and call Muslims to jihad.

“These posts call for the organized, strategic exploitation of Facebook, recognizing its value as a platform for reaching a wider, younger audience,” the report states.

Posters recognize that forums are visited by already-radicalized jihadi supporters, “whereas Facebook offers a space to interact with “mainstream Muslims” and attract and recruit new supporters.”

“[S]ocial networking interfaces whose purpose is to virtually connect people based on such common social bonds clearly lend themselves to extremist use and recruitment efforts,” the report states.

Other posts demonstrate security savvy by recommending the use of proxy servers to provide anonymity, while others show strategy employed to recruit new members.

A “concerning factor here is the speed at which an entire demographic can be located and communicated with,” Graham said. “DHS mentions the use of social media to find groups with similar interests.

“Fact is, what used to take months to get a few recruits who meet the right criteria is now on a harvested mailing list. Groups are being communicated to in the hundreds, speeding up recruiting efforts.”

Jihadists use cyber propaganda material to target youths on Facebook, said Jeff Bardin, chief security strategist at security firm XA Systems.

“The youth who come to Facebook looking for jihadist information are the Generation X and Y youth who also don’t worry too much about the security of their profiles and what they post, providing easy prey for intelligence agencies worldwide to access, infiltrate and fully penetrate those wishing to learn,” he said.

Facebook tries to filter out terrorist activity by checking for names of terrorists and terrorist organizations provided by the State and Treasury Departments.

The DHS report states:

“According to Facebook Rights and Responsibilities on the website, ‘You will not post content or take any action on Facebook that infringes or violates someone else’s rights or otherwise violates the law.’ It also states that ‘We can remove any content or information you post on Facebook if we believe that it violates this Statement.’ However, information is not screened before it is posted, so posts that violate the rules remain on the site until they are detected and removed.”

Facebook spokesman Andrew Noyes told

“We take our Statement of Rights and Responsibilities (SRR) very seriously and react quickly to reports of inappropriate content and behavior. Groups that threaten violence towards people are taken down, as are groups that express hatred towards individuals and those sponsored by recognized terrorist organizations. The goal of these policies is to strike a very delicate balance between giving people the freedom to express their opinions and viewpoints – even those that may be controversial to some – and maintaining a safe and trusted environment.”

Noyes added:

“In addition to using the State and Treasury Department lists, and the fact that our SRR prohibits anyone on those terrorist lists from using our service, we are also proactive in screening for those names and organizations. Our internal systems also employ keyword searches related to associated terminology. We give high priority to reviewing and responding to user reports in this area as well.”

DHS spokesman Bobby Whithorne provided with this statement:

“The Office for Bombing Prevention (OBP) facilitates a constant feedback loop with our law enforcement partners on TRIPwire, and as a result of ongoing discussions on the topic, OBP developed a case study on the use of social networking sites to better inform our partners about techniques, tactics and procedures used by terrorists. It is well known that terrorists recruit and share instructions to develop improvised explosive devices online, and we will continue to provide situational awareness and share information with our law enforcement partners on a range of topics in our shared efforts to deter and disrupt terrorism.”


Read more:

The United States has come close to taking out al Qaeda’s second-in-command on more occasions than have previously been acknowledged, according to current and former U.S. officials.

In February 2003, Ayman al-Zawahiri apparently met in Peshawar, Pakistan, with another senior al Qaeda leader whom the CIA was pursuing at the time. But according to the officials, the agency did not have a firm location for Khalid Sheihk Mohammed until it received a tip the following day enabling the Pakistanis to capture Mohammed in another city.

Read More

AQAP Releases Special Issue of ‘Inspire’ Magazine ‘Operation Hemorrhage’ – Dedicated Entirely To Explosive Parcels Plot



Subscribe a Friend to Free Email List
Subscribe to Additional E-Newsletters
Find MEMRI On: Twitter Facebook YouTube
Note to media and government: For the full report, send an email with “Inspire Operation Hemorrhage” in the subject line to

On November 20, 2010, Al-Qaeda in the Arabian Peninsula (AQAP) released a special edition of its English-language magazine Inspire titled ‘$4,200’ the total amount spent on the operation. Unlike the previous editions of “Inspire” this issue does not contain any contribution from Anwar Al-Awlaki nor does it mention him at all.

This edition consists of 23 pages that are entirely dedicated to the recent parcel plot.

The magazine was first pasted on the main Jihadi forum Shumukh Al-Islam. It was produced by al-Malahem media, the media wing of the AQAP.

Among the topics presented is the objectives of ‘Operation Hemorrhage’ (i.e. parcel plot):

-General details and objectives of the operation [which the magazine says was to cause economic damage to the United States]

-Technical details of the devices used [as well as a review of equipment in airport security which they have overcome]

-Economic leverage the AQAP believes it has gained over West

-Religious objectives of the attack
The magazine also includes “exclusive” images of the contents of the packages [i.e. printer, book].

The magazine also claims that AQAP was behind the incident of the UPS airplane in Dubai on September 3, 2010 and that the United States hid AQAP’s responsibility.

The release includes a list of prisoners of Al-Qaeda in the West. The magazine offers a way to communicate with AQAP.

More research from the magazine will be released in the coming day by MEMRI.

Months after he was released from Guantanamo Bay, Abdul Rahman was back in the company of terrorist leaders along the Pakistan-Afghanistan border. But he was a double agent, providing Taliban and al-Qaida secrets to Pakistani intelligence, which then shared the tips with Western counterparts.

The ruse cost him his life, according to a former Pakistani military intelligence official, Mahmood Shah. The Taliban began to suspect him, and after multiple interrogations executed him.

The case of Rahman, which Shah recounted to The Associated Press, falls in line with a key aspect of the fight against terror — Western intelligence agencies, with help from Islamic allies, are placing moles and informants inside al-Qaida and the Taliban. The program seems to be bearing fruit, even as many infiltrators like Rahman are discovered and killed.

via Spy agencies infiltrate al-Qaida – Yahoo! News.

Al Qaeda Manual

Posted: November 4, 2010 in Al Qaeda Manual, Al-Qaida, Jihadi Groups

Introduction: The attached manual was located by the Manchester (England) Metropolitan Police during a search of an al Qaeda member’s home. The manual was found in a computer file described as “the military series” related to the “Declaration of Jihad.” The manual was translated into English and was introduced earlier this year at the embassy bombing trial in New York.

First Lesson — General Introduction
Second Lesson — Necessary Qualifications And Characteristics For The Organization’s Member
Third Lesson — Counterfeit Currency And Forged Documents
Fourth Lesson — Organization Military Bases “Apartments Places”-Hiding
Fifth Lesson — Means Of Communication And Transportation
Sixth Lesson —  Training
Seventh Lesson — Weapons:  Measures Related To Buying And Transporting Them
Eight Lesson — Member Safety
Ninth Lesson —  Security Plan
Eleventh Lesson — Espionage (1)  Information-Gathering Using Open Methods
Twelfth Lesson —  Espionage (2 )Information-Gathering Using Covert Methods
Eighteen Lesson — Prisons And Detention Centers