Feeds

Al-Qaeda computer geek nearly overthrew US

A close shave, the Bushies claim

  • alert
  • submit to reddit

Designing a Defense for Mobile Applications

Update A White House with a clear determination to draw paranoid conclusions from ambiguous data has finally gone over the top. It has now implied that the al-Qaeda computer geek arrested last month in Pakistan was involved in a plot to destabilize the USA around election time.

Two and two is five

As we reported here and here, so-called al-Qaeda "computer expert" Muhammad Naeem Noor Khan, a Pakistani, was arrested on 13 July in possession of detailed but rather old surveillance documents related to major financial institutions in New York, Newark, and Washington.

Since that time, other intelligence has led the US security apparatus to imagine that a plot to attack the USA might be in the works. (No doubt there are scores of plots in the works, but we digress.) Therefore, last week, the ever-paranoid Bush Administration decided that Khan's building surveillance documents, and the hints of imminent danger, had to be connected. Indeed, if al Qaeda is to strike at all, it is most likely to strike the targets mentioned in Khan's documents, as opposed to thousands of others, the Bushies reasoned.

New York, Newark and Washington were immediately put on high alert, at great expense, and to the inconvenience of millions of residents. The sites mentioned in the Khan documents have received extraordinary attention, while thousands of other potential targets remain exposed to easy attack. (Anyone doubting this should look at the photos of unguarded access and control points to a Manhattan gas pipeline over forty inches in diameter, photographed without difficulty by Cryptome's John Young.)

But government panic over dubious intelligence was not enough. Another Bush Administration hobby horse is a notion that foreign evildoers intend to disrupt the November elections. We've been hearing about this ever since it was assumed that a terrorist attack determined the Spanish elections back in March.

So it did not take long for Bush security apparatchiks to begin leaking to the press strong hints that this is precisely what's behind the Administration's current terrorist hysteria.

According to an article in the New York Times, Khan the cyberterrorist "was also communicating with al Qaeda operatives who the authorities say are plotting to carry out an attack intended to disrupt the fall elections, a senior intelligence official said Saturday."

Given the amount of skepticism the Administration has had to confront over its most recent Chicken Little act, and its hammerheaded aversion to acknowledging even the tiniest of mistakes, perhaps it was inevitable that the terror hype of last week could only be hyped further. It was impossible to retreat.

It has now got every citizen and law enforcement officer obsessing on a handful of targets that, thanks to the news cycle, al Qaeda knows not to mess with.

Missed opportunities

Meanwhile, back in Britain, UK Home Secretary David Blunkett - in a rare moment of common sense, if not lucidity - upbraided the Bush Administration for "feed[ing] the news frenzy."

The information on which the Bushies decided to raise the terror alert level is "of dubious worth," Blunkett said, adding that such information should be published "only if it would prove useful in preventing injury and loss of life," which he obviously believes the Bush hysteria would not do.

"There has been column inch after column inch devoted to the fact that in the United States there is often high-profile commentary, followed - as in the most current case - by detailed scrutiny with the potential risk of inviting ridicule," Blunkett said, inelegantly but rightly.

Blunkett is spot on in that critique, and still it gets worse. According to wire reports, Kahn the geek had been cooperating with Pakistani security forces, until the Bush Administration's insistence that he be arrested immediately, and their leaking of his name, ended his cooperation, and stuffed up several terror investigations in various countries, the UK included.

Pakistani intelligence forces have complained that several high-profile al Qaeda suspects they'd been keeping an eye on have gone to earth and now can't be found, merely because Khan was named. The twelve suspects suddenly rounded up in Britain last week were almost certainly nabbed in haste for the same reason.

But Khan is clearly a small-fry player, one whose continuing cooperation would have yielded more fruit than his arrest. Indeed, his arrest has signaled to scores of other al-Qaeda players that they should shift their plans. ®

Thomas C Greene is the author of Computer Security for the Home and Small Office, a comprehensive guide to system hardening, malware protection, online anonymity, encryption, and data hygiene for Windows and Linux.

Related stories US terror alert becomes political football Al-Qaeda cyber terrorist panics US

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.