Terrorists become more Net-savvy


Some critics say the United States could be doing more to counter terrorist activity in cyberspace.

MCCLATCHY NEWSPAPERS

WASHINGTON — The report detailing the supposed vulnerability of the Army’s Stryker armored vehicles to rocket-propelled grenades appeared on a password-protected terrorist Web site in the summer of 2006.

Terrorists discovered it on the Web site of a think tank, downloaded it to their own site and urged fellow mujahedeen to study it and use what they learned in attacking the U.S. combat vehicles in Iraq.

Though the report has been discredited, its posting on a jihadist Web site shows how cyberspace has become an increasingly important front in the war on terror.

From “Jihad University” to “Terrorists 007” to 5,000 or more other sites, terrorists are using the Internet to spread propaganda, recruit members, raise money, offer training and instruction and plan operations.

The National Security Agency, the CIA, the FBI, the Defense Intelligence Agency, other U.S. and foreign intelligence agencies and some private contractors are fighting back, cracking terrorist passwords, monitoring suspicious Web sites, cyberattacking others and sometimes planting bogus information.

Critics

Some lawmakers on Capitol Hill and independent experts, however, think the U.S. could be doing a better job to counter the threat.

“It’s not like we aren’t looking at these sites,” said Rep. Adam Smith, D-Wash., the chairman of the House Armed Services terrorism subcommittee. “But we need better coordination, processing of what we find. It’s a major concern.”

“The government efforts are inadequate,” said Bruce Hoffman, a professor in the Securities Studies Program at Georgetown University, who suggested that the private sector is doing a better job than the government is. “Our enemies have embraced the Internet. We have to ask how closely the government is monitoring it.”

Much of what the intelligence community is doing is classified, and few details are available.

“People look at this issue on a regular basis and are aware of its importance,” said one senior U.S. intelligence official who spoke only on the condition that he wouldn’t be identified. “There is significant interagency cooperation.”

Homeland efforts

At the Department of Homeland Security, the focus has been on protecting government and private Web sites from cyberattacks by terrorists and other hackers who want to pilfer classified information or crash the sites with waves of e-mail.

“There are intrusions happening every day,” said Russ Knocke, a Homeland Security spokesman. “There is no evidence of activity tied to the terror network. But it remains something we are concerned about.”

Congressman Smith said the U.S. government has launched an effort to counter some of the propaganda that terrorists post in Internet chat rooms, message boards, blogs and other Web sites. He said the government programs use some “fairly cool stuff” that he can’t talk about publicly.

The Internet threat is wide-ranging, complicated and not easy to contain.

Terrorist sites can contain instructions on how to use small arms, mortars and rockets, build bombs and train to become a sniper. Some analysts say the training and instruction offered on the Internet have largely replaced the terrorist training camps that al-Qaida established in Afghanistan and elsewhere in the 1980s and 1990s.