Network Technologies for Networked Terrorists
RAND, 10 Oct 07: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
Quote:
....This analysis focuses on the potential application of information and communication technologies that may be used across the full range of activities that make up terrorist operations and whether these applications can lead to new and different approaches to terrorist operations. Its purpose is to identify which of these network technologies terrorist organizations are likely to use in conducting their operations and to suggest what security forces might do to counter, mitigate, or exploit terrorists’ use of such technologies.
To highlight the merger of software and computer technologies with communication and display technologies that digitalization has made possible and to encourage thinking beyond military technologies, this report uses the term network technologies to describe what are referred to as command, control, communication, computer, intelligence, surveillance, and reconnaissance (C4ISR) technologies in military parlance, as well as the consumer-oriented technologies that can often provide the functionality needed for terrorist operations. These network technologies can include connectivity technologies (e.g., wireless routers), mobile computing (e.g., xiv Network Technologies for Networked Terrorists laptop computers), personal electronic devices (e.g., personal digital assistants and cell phones), IT services and Internet access, and video recording, among others.....
An Online Terrorist Training Manual
The Jamestown Foundation's Terrorism Focus, 1 Apr 08:
An Online Terrorist Training Manual - Part One: Creating a Terrorist Cell
Quote:
Jihadis continue to pursue terror training and knowledge exchange with fellow jihadis through Internet forums. Often, the jihadi forum participants post short, though significant, details pertinent to terror conduct drawn from real life experience in Iraq and Afghanistan. Recently, a forum participant posted six training episodes comprised of the basic knowledge needed by a novice jihadi to become a full-fledged terrorist. The episodes begin with two basics lessons on "How to set up a terrorist cell." Four more episodes followed, over a week, on sniper attacks, assassination techniques, attacking and looting government centers, and conducting massive terror strikes. Terrorism Focus will cover all six episodes of this important training manual, beginning with this issue and continuing over the next two weeks.
Posted by an Islamist forum participant nicknamed “Shamil al-Baghdadi,” the first of the training lessons is entitled, “Do you want to form a terror cell?” and is directed at setting up a terrorist cell behind enemy lines under tight security conditions. The cell, says al-Baghdadi, should commence with one, strong, monotheistic and valorous man as the nucleus. This individual should meet the following conditions:
• He must be a strong adherent of the Sunni ideology and well educated in the history of jihad.
• He should be experienced in—at the very least—light weapons such as pistols and rifles because these are available in nearly any society.
• He should be trained in secure communications through the Internet and mobile devices.
• He should be tolerant and display perseverance in religious preaching and teaching.
• He should maintain a good cover and not be on any security watch lists in order to allow free mobility