Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How bin Laden emailed without being detected

Sydney Morning Herald | May 13, 2011
Osama bin Laden built a painstaking email system that kept him one step ahead of the US government's best eavesdroppers despite having no Internet access in his hideout.

Osama bin Laden.

The people spoke on the condition of anonymity to discuss the sensitive intelligence analysis.

Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the US to scour.

The trove of electronic records pulled out of his compound after he was killed last week is revealing thousands of messages and potentially hundreds of email addresses.

Holed up in his walled compound in north-east Pakistan with no phone or internet capabilities, bin Laden would type a message on his computer without an internet connection, then save it using a thumb-sized flash drive. He then passed the flash drive to a trusted courier, who would head for a distant internet cafe.

At that location, the courier would plug the memory drive into a computer, copy bin Laden's message into an email and send it. Reversing the process, the courier would copy any incoming email to the flash drive and return to the compound, where bin Laden would read his messages offline.

It was a slow, toilsome process. And it was so meticulous that even veteran intelligence officials have marvelled at bin Laden's ability to maintain it for so long. The US always suspected bin Laden was communicating through couriers but did not anticipate the breadth of his communications as revealed by the materials he left behind.

Navy SEALs hauled away roughly 100 flash memory drives after they killed bin Laden, and officials said they appeared to archive the back-and-forth communication between bin Laden and his associates around the world.

Al-Qaeda operatives are known to change email addresses, so it is unclear how many are still active since bin Laden's death.

But the long list of electronic addresses and phone numbers in the emails is expected to touch off a flurry of national security letters and subpoenas to internet service providers.

The Justice Department is already coming off a year in which it significantly increased the number of national security letters, which allow the FBI to demand information from companies and others quickly without asking a judge to issue a subpoena.

Officials gave no indication that bin Laden was communicating with anyone inside the US, but terrorists have historically used US-based internet providers or free internet-based email services.

The cache of electronic documents is so enormous that the government has enlisted Arabic speakers from around the intelligence community to pore over it.

Officials have said the records revealed no new terrorist plot but showed bin Laden remained involved in al-Qaeda's operations long after the US had assumed he had passed control to his deputy, Ayman al-Zawahri.

The files seized from bin Laden's compound not only have the potential to help the US find other al-Qaeda figures, they may also force terrorists to change their routines. That could make them more vulnerable to making mistakes and being discovered.


 

Previous Page  1  2 

Sign up for Computerworld eNewsletters.

CIO upfront: The compliance conundrum of digital transformation

Project management: 5 tips for managing your project budget

How to create a company culture that can weather failure

GCIO Forum 2017: Public-private partnerships key enabler of digital governments

Will AI kill jobs?

Why eSIM is crucial for managing IoT

HKU and Cyberport commit to building a digital tech ecosystem in Hong Kong

Macao Water builds enterprise asset management system to improve productivity

University of the City of Manila inaugurates technology and innovation centre

Sompo Insurance Singapore's chatbot help consumers make informed buying decisions

Digital Malaysia: Penang teacher centre transforms into Digital Maker hub

Malaysia's Mesiniaga enterprise cloud mandated by PCI DSS certification

Malaysia's Open Data journey ramps up to Asean scale with new accelerator

'Let this be a warning,' says Malaysia enforcement director, seizes pirated Microsoft products

With an eye on WCIT 2020 in Malaysia, PIKOM delegation supports global ICT gathering in Taiwan