Osama bin Laden.
Osama bin Laden.
The people spoke on the condition of anonymity to discuss the sensitive intelligence analysis.
Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the US to scour.
The trove of electronic records pulled out of his compound after he was killed last week is revealing thousands of messages and potentially hundreds of email addresses.
Holed up in his walled compound in north-east Pakistan with no phone or internet capabilities, bin Laden would type a message on his computer without an internet connection, then save it using a thumb-sized flash drive. He then passed the flash drive to a trusted courier, who would head for a distant internet cafe.
At that location, the courier would plug the memory drive into a computer, copy bin Laden's message into an email and send it. Reversing the process, the courier would copy any incoming email to the flash drive and return to the compound, where bin Laden would read his messages offline.
It was a slow, toilsome process. And it was so meticulous that even veteran intelligence officials have marvelled at bin Laden's ability to maintain it for so long. The US always suspected bin Laden was communicating through couriers but did not anticipate the breadth of his communications as revealed by the materials he left behind.
Navy SEALs hauled away roughly 100 flash memory drives after they killed bin Laden, and officials said they appeared to archive the back-and-forth communication between bin Laden and his associates around the world.
Al-Qaeda operatives are known to change email addresses, so it is unclear how many are still active since bin Laden's death.
But the long list of electronic addresses and phone numbers in the emails is expected to touch off a flurry of national security letters and subpoenas to internet service providers.
The Justice Department is already coming off a year in which it significantly increased the number of national security letters, which allow the FBI to demand information from companies and others quickly without asking a judge to issue a subpoena.
Officials gave no indication that bin Laden was communicating with anyone inside the US, but terrorists have historically used US-based internet providers or free internet-based email services.
The cache of electronic documents is so enormous that the government has enlisted Arabic speakers from around the intelligence community to pore over it.
Officials have said the records revealed no new terrorist plot but showed bin Laden remained involved in al-Qaeda's operations long after the US had assumed he had passed control to his deputy, Ayman al-Zawahri.
The files seized from bin Laden's compound not only have the potential to help the US find other al-Qaeda figures, they may also force terrorists to change their routines. That could make them more vulnerable to making mistakes and being discovered.
Sign up for Computerworld eNewsletters.
Eric Schnatterly, Vice President IBM Systems for Cloud Platforms, Asia Pacific, talks about the company’s latest pipeline of innovation in the cloud and data space
Retailers may face cyber attacks like any other industry, but steps can be taken to guard against cyber crime.
The threat of ransomware is real and should be top of mind for CIOs as well as technology administrators of all types. In this brief, Veeam® will share some key tips to add ransomware resiliency to provide the best levels of Availability for critical applications and data.
Veeam Backup & Replication provides full support for VMware vSAN, enabling faster backups through smart logic that reduces network traffic and enables backup and restore for the storage policy associated with the VM.
Veeam for the Microsoft Cloud provides a consolidated solution for virtual, physical and cloud-based workloads with integrations for Microsoft Azure and Office 365.