december 2009 . Vol 2 . Issue 12 despite losing its South Waziristan The Internet and its Role South Asia. The trial resulted in eight base. Moreover, the hardest part of the terrorism cases involving several mission for ’s military has only in Terrorist Recruitment dozen defendants and years of complex just begun. Routing guerrilla forces and Operational Planning international cooperation.1 with a modern army is not difficult; it is the “hold” phase of counterinsurgency By Sajjan M. Gohel Born in Virginia with parents from that will prove the most challenging. Bangladesh, Sadequee exhibited radical The militants can now begin to practice the virtual world is fast becoming sentiments in his teens. Soon after the the form of warfare at which they are the most important meeting place for , he sent an e-mail best: sporadic guerrilla attacks against terrorists, and a major venue where to an extremist website expressing his troops. extremists can make contact with desire to join the Taliban.2 Sadequee’s like-minded individuals. Through extremist activity intensified when he Moreover, for Pakistan’s government these relatively anonymous contacts, met , a Pakistani- to be successful, it will need to move an extremist can be brought into the American student at Georgia Tech, at against TTP leaders and cadre in other terrorist fold and become physically a mosque in Atlanta. The two made tribal areas—where they are seeking involved in terrorist plots. Today, contact in a password-protected chat shelter—which will stretch the military’s there are a growing number of cases room.3 Transcripts of their internet operations and make it more vulnerable in which terrorist groups, or jihadist conversations reveal that they fed off to guerrilla attacks. Public support radicalizers, have used the internet each other’s outrage at the U.S. wars in for military operations could fall if to recruit individuals in the West, Iraq and Afghanistan.4 civilians feel increasingly insecure in providing them a starting point to their own homes, workplaces and cities. engage in terrorist activity. By ignoring It was in the virtual space, through Public support for the army’s actions in this developing issue, there is the risk of murky web forums and radical chat the tribal areas, currently at 51%, could becoming complacent about an emerging rooms such as “Clearguidance,” that also be jeopardized if the military bows threat that appears to be growing more an extremist network of like-minded to the pressure of the United States and significant with time. individuals, together with Sadequee its NATO allies and takes action against and Ahmed, was established and the hideouts of predominately Afghan This article will explore a now defunct where ideas for terrorist training and Taliban militants, such as in North network of terrorist cells that were plotting attacks were discussed.5 The Waziristan and Baluchistan.28 It is clear located across the world and which network included a group of radicals that Pakistan’s security forces are still became connected through the internet. from , known as the “Toronto in the early stages of their perennial By studying this network of cells, which 18” led in part by Zakaria Amara, a fight against Islamist militants intent the author identifies as the Digital Jihad gas station attendant;6 a Bosnian-born on weakening the state. Network, it becomes evident that the Swede named Mirsad Bektasevic who internet has become a key platform in was planning attacks against Western Rahimullah Yusufzai is a senior Pakistani cell formation and terrorist activity. interests in Sarajevo; and Aabid Khan journalist and political and security analyst Moreover, the article will also show from Manchester, England, who acted presently working as Resident Editor of the how the internet is increasingly being as a facilitator for various Pakistan- English daily The News International used to recruit Westerners for jihadist based terrorist organizations.7 The final in Peshawar. He has been reporting on operations at home and abroad. Finally, actor in the network was Younis Tsouli, Afghanistan and Pakistan’s North-West the article will identify the threat posed a former Moroccan diplomat’s son living Frontier Province, Federally Administered by “lone wolf” terrorism, which is made in London whose computer expertise Tribal Areas, and Baluchistan since the possible as a result of jihadist literature, made him the network’s hub.8 Tsouli early 1980s. online radicalizers and military training had also used the internet to build links materials available on the web. to al-Qa`ida operatives in Iraq.9

The Internet as a Staging Platform: 1 “Atlanta Defendant Found Guilty Of Supporting Ter- A Case Study of the Digital Jihad Network rorists,” U.S. Department of Justice, August 12, 2009. The internet is increasingly playing a 2 Ibid. critical role in linking together disparate 3 Bill Gillespie, “The Case Against Canada’s Plotters,” terrorist cells around the world. An Canadian Broadcasting Corporation, October 14, 2009. examination of one major global jihadist 4 Ibid. network reveals the sheer number of 5 Ibid. links and connections forged through 6 “Toronto 18 Video Evidence Released,” Canadian the internet. The case involved Ehsanul Broadcasting Corporation, October 20, 2009. Sadequee, who an Atlanta court found 7 “Atlanta Defendant Found Guilty Of Supporting Ter- guilty of conspiracy to materially rorists.” support terrorists in August 2009. His 8 Tsouli infamously was able to hack an FTP server trial explored a nexus of extremists who operated by the Arkansas Highway and Transportation were connected through the internet to Department and turn it into an al-Qa`ida message board, 28 This poll is available at Gallop Pakistan, the findings plan attacks and form a global network providing detailed information on the art of hacking. of which were published on November 3, 2009. linking North America, Europe and 9 “Terrorist Use Of The Internet,” Combating Terrorism

12 december 2009 . Vol 2 . Issue 12

In early 2005, Ahmed and Sadequee base from where they and others part of his plot was imminent.20 Tsouli’s traveled to a Toronto mosque to meet their internet chat group could gather encrypted hard drive provided a wealth with some members of the Toronto 18 to before traveling to Pakistan.14 of information that led investigators to discuss possible attacks on the Centers pursue other militant links across the for Disease Control and Prevention After their planned paramilitary training world. Both Tsouli and Bektasevic are in Atlanta and oil refineries.10 Aabid trip in Pakistan, the network intended serving lengthy prison sentences after Khan also flew in from London for the to return to Toronto and choose targets being convicted on terrorism-related gathering.11 None of the individuals had to attack in Canada, the United States, charges. In March 2006, Ahmed was formal terrorist training, so they agreed the United Kingdom and continental arrested in Atlanta by the FBI and as a first step to travel to Pakistan Europe. They anticipated the attacks Sadequee was detained in April 2006 and spend three months in a training to be possibly the most coordinated in Bangladesh. Ahmed was convicted camp run by Lashkar-i-Tayyiba terrorist assault ever seen. A few weeks in June 2009 for conspiracy to provide (LT), a Pakistani terrorist group that after their trip to Toronto, Ahmed and material support to terrorism in the Sadequee visited Washington, D.C. United States and abroad.21 “Through its relatively where they made more than 62 video clips of potential targets, including In Britain, once the evidence had secure anonymity, the the Pentagon, the Capitol, and the been gathered from the other plots, internet has become a key World Bank headquarters.15 Sadequee authorities quickly moved to apprehend e-mailed the scouting videos to Tsouli the remaining members of the network. medium for Westerners to and Khan.16 In April 2006, Scottish police arrested identify and connect with a student, Mohammed Atif Siddique, as Sadequee eventually traveled to he was in the process of boarding a flight jihadist radicalizers and Bangladesh to get married, and he to Pakistan to meet Aabid Khan who had recruiters.” continued his participation in the been indoctrinating and radicalizing global network. Although Ahmed Siddique through the internet.22 was able to travel to Pakistan, he and Khan were not able to arrange training In June 2006, Toronto witnessed the orchestrated the Mumbai terror siege for the global plotters because of dramatic arrests of several men also in November 2008.12 Khan would make the logistical difficulties in bringing connected to the network. The Toronto the necessary arrangements with the them all together. In October 2005, 18 cell had been infiltrated by two police LT so that the network’s members could Sadequee communicated via e-mail from informants and was accused of planning travel to Pakistan and begin training. Bangladesh with Tsouli in London and attacks on two Toronto buildings and an Khan was also in contact with Jaysh- Bektasevic in Sarajevo, as the latter was military base. The cell members i-Muhammad (JM), another terrorist obtaining explosives and weapons for had in their possession large quantities group in Pakistan that was partly a plot.17 They discussed a propaganda of what they thought was ammonium involved in the abduction and murder of video that Bektasevic was preparing nitrate.23 In October 2009, Zakaria U.S. journalist Daniel Pearl in Karachi.13 that would announce the formation Amara pleaded guilty to knowingly The network’s members rented two of a group they called “Al-Qa`ida in participating in a terrorist group basement apartments in Toronto as a Northern Europe.”18 and intending to cause an explosion for the benefit of a terrorist group.24 Working Group (CTWG), George C. Marshall European By this time, however, law enforcement Investigations revealed that members of Center for Security Studies, June 16-17, 2009. and intelligence agencies had finally the Toronto cell, including Amara, were 10 Gillespie. traced their internet communications influenced by the internet sermons of 11 Ibid. and were monitoring their activities on U.S.-born Islamist ideologue Anwar al- 12 Aryn Baker and Jyoti Thottam, “The Making of a the web, in addition to keeping them Awlaki, who is believed to be based in 25 Mumbai Terrorist,” Time Magazine, March 8, 2009. In- under close physical surveillance. . terestingly, the anonymous nature of the internet also Within days, in October 2005, served as a tool to aid and mask the LT’s Mumbai attack. Bektasevic was apprehended in Sarajevo 20 Ibid. One of the handlers for the group sent an e-mail to an In- and British police arrested Tsouli in 21 “Atlanta Defendant Found Guilty Of Supporting Ter- 19 dian TV channel claiming that the “Deccan Mujahidin” London. Bektasevic’s arrest revealed rorists.” was responsible for the plot. Deccan, being an area in that he had already assembled a suicide 22 HMA v. Mohammed Atif Siddique, October 23, 2007; southern India, implied the plot was indigenous. Inves- vest attached to a detonator, suggesting Swann. tigations subsequently found that the e-mail message 23 “Toronto 18 Video Evidence Released.” originated in Lahore in Pakistan, before being routed to 24 Ibid. different locations through an anonymous “re-mailer” 14 Ibid. 25 Unlike other radicals, Anwar al-Awlaki understands service. This is a system that acts as a mail intermediary 15 Sebastian Rotella, “Georgia Man Convicted of Aiding Western culture and has used the internet to tailor his and allows users to send e-mails to a destination anony- Terrorism Groups,” Los Angeles Times, August 13, 2009. messages to directly influence young impressionable peo- mously. The ploy successfully misled many as to the ori- 16 Ibid. ple. During his time in the United States, he served as an gins of the group and could serve to act as a template for 17 Ibid. imam at San Diego’s Rabat mosque, where he met future future attacks. 18 “Terrorist Use Of The Internet.” 9/11 hijackers Khalid al-Midhar and Nawaf al-Hazmi and 13 Nick Fielding, “Omar Saeed Sheikh: The British Jack- 19 Gordon Corera, “Al-Qaeda’s 007,” TimesOnline, Janu- developed a close relationship with them. Al-Awlaki was al,” Sunday Times, April 21, 2002. ary 16, 2008. also in communication through the internet with Nidal

13 december 2009 . Vol 2 . Issue 12

Four days after the Toronto plotters attacks. In the case of this network, it It is unlikely that he will be the last were arrested, Aabid Khan was allowed members to come into contact Somali-American recruited by al-Shabab detained at London’s Heathrow Airport with individuals with actual physical handlers to fight in . His case is as he disembarked from a flight from ties to terrorist groups, such as to the a mere example of the problem.37 Islamabad in June 2006.26 When police LT in Pakistan. The dismantling of the searched his luggage they found two network led to dozens of arrests around More recently, in December 2009 computer hard drives, 16 CDs and a the world. Worryingly, this template five men from northern Virginia were quantity of documents.27 The contents has also been used subsequently in arrested in Sargodha in Pakistan’s of the material showed Khan inciting the United States to recruit people for Punjab Province on suspicion that others to participate in terrorist activity terrorist activity abroad. they were plotting terrorist attacks through the internet, and evidence also and planned to fight in Afghanistan.38 showed that he had facilitated trips Al-Shabab Recruits in the United States and The Pakistani police interrogation to Pakistan.28 In August 2008, Khan the Pakistan-Virginia Case report identified one of the suspects as was convicted of being a terrorist In November 2009, federal authorities Ahmed Abdullah Minni, who it claims propagandist.29 unsealed terrorism-related charges regularly went on YouTube to watch against men they say were key actors Taliban attacks on the U.S. military in Hammaad Munshi, a 16-year-old British in a recruitment drive that led young Afghanistan and left comments praising schoolboy, was also caught in the Somali-Americans to join al-Shabab, the actions.39 His comments attracted network, becoming Britain’s youngest a Somali insurgent group and an al- the attention of extremists, and he convicted terrorist.30 Munshi was a Qa`ida affiliate. In total, authorities was eventually contacted through the friend and recruit of Aabid Khan, and have implicated 14 people in the case. internet by a mysterious individual was convicted in September 2008 of Perhaps the most notorious is Zakaria using the alias “Saifullah.”40 A Yahoo! possessing materials that were likely to Maruf, an American-Somali who had left e-mail account was set up so the accused be used in acts of terrorism.31 Munshi Minnesota for southern Somalia to link and Saifullah could communicate.41 collected instructions for making napalm, up with al-Shabab and subsequently explosives and suicide vests from the recruited men from the United States The suspects planned to travel to internet.32 A quantity of propaganda through a variety of means, including Pakistan, and then to Afghanistan. Once videos and audio recordings, stored on the internet.33 they arrived in Pakistan’s port city of the family computer, were also found Karachi, the men left for Hyderabad.42 during a search. This was the case of Mohamoud Pakistani authorities claim that they Hassan, a student at the Carlson School tried to connect with JM and Jama`at- This case study of the Digital Jihad of Management, whose path toward ud-Da`wa (JuD), the parent wing of Network reveals how the internet is extremism began through the internet LT.43 According to Pakistani authorities, being used as a platform to facilitate with searches for jihadist videos and neither JuD nor JM expressed any contact among like-minded aspiring jihadist chat rooms. Like the Toronto interest in recruiting the men.44 During jihadists. Moreover, it also plays a 18, Hassan listened to the audio lectures the past 10 years, however, both groups role in the preparation and plotting of of Anwar al-Awlaki.34 Hassan then have actively recruited foreigners. It is began to communicate frequently with likely that the two groups are reluctant Malik Hasan, the U.S. Army officer who is charged with Maruf who established contact through to induct Americans at this time in light killing 13 people and wounding 30 at Fort Hood, Texas in listservs, an antiquated form of sending of the recent case of David Headley, a November 2009. See Michelle Shephard, “The Powerful e-mails, and conference calls arranged Online Voice of Jihad,” Toronto Star, October 18, 2009; by an associate who distributed several 37 Laura Yuen, “Fifth Minnesota Man Dies in Somalia,” The 9/11 Commission Report (New York: W.W. Norton & hundred numbers and passwords Minnesota Public Radio, September 5, 2009. In Decem- Co., 2004), p. 221; Theo Emery, “The FBI Probe: What so people could establish contact ber 2008, al-Awlaki addressed al-Shabab followers in 35 Went Wrong at Fort Hood?” Time Magazine, December securely. one of his blog entries stating, “We are following your 10, 2009. Al-Awlaki was characterized in court testimo- recent news and it fills our hearts with immense joy.” ny as an inspiration by two of the six people convicted on In November 2008, Hassan turned his 38 “Interrogation Report, ‘Profiles of the Foreigners conspiracy and other charges in a plot to kill U.S. military back on a university education and with Held,’” Punjab Police, Sargodha, Punjab Province, De- personnel at Fort Dix. A Facebook page devoted to the two other students left for Somalia to cember 11, 2009. ideologue once had thousands of supporters. Following join an al-Shabab training camp where 39 Ibid. the Ft. Hood shooting, the page was removed by the web- he linked up with his internet recruiter 40 Ibid. 36 site administrators. Maruf. In September 2009, Hassan’s 41 Ibid. Interestingly, to avoid interception by law en- 26 Swann. grandmother received news from forcement and intelligence agencies, e-mails were never 27 “Cases Concluded in 2008,” The Counter-Terrorism Somalia that her grandson was killed. sent from the account, but messages were left in the draft Division of the Crown Prosecution Service, undated. folder and deleted after reading, the online version of a 28 Ibid. 33 Amy Forliti, “Details Emerge About Somali Terror- “dead letter drop.” 29 Ibid. ists’ Recruiting Methods,” Associated Press, August 42 “Mosque of Americans Arrested in Pakistan Plans 30 Swann. 25, 2009; Andrea Elliott, “A Call to Jihad, Answered in Investigation,” CNN, December 11, 2009. 31 Ibid. America,” New York Times, July 12, 2009. 43 Jama`at-ud-Da`wa was proscribed by the United Na- 32 Jenny Percival, “Yorkshire Teenager Becomes Brit- 34 Elliott. tions following the Mumbai terror siege attacks. ain’s Youngest Convicted Terrorist,” Guardian, August 35 Ibid. 44 “Interrogation Report, ‘Profiles of the Foreigners 18, 2008. 36 Ibid. Held.’”

14 december 2009 . Vol 2 . Issue 12

Chicago resident accused of conducting components, as well as to investigate of the process connecting aspiring reconnaissance on behalf of LT during potential targets.46 Importantly, he terrorists with like-minded individuals the preparation for the 2008 Mumbai was in frequent contact via the internet or actual terrorists operating out of attacks, as well as conspiring to attack with two unidentified men from countries such as Pakistan and Somalia. the offices of the Danish newspaper, Pakistan, with whom he discussed his After consolidating relationships over Jyllands-Posten. Other reports state that intentions and from whom he received the internet, the recruits can then plot the two terrorist groups thought that encouragement and information.47 The and plan mass casualty attacks while the men were working on behalf of unidentified individuals answered his remaining in contact with their handlers Western intelligence agencies. questions and directed him to bomb- through the world wide web. making websites. U.S. officials are exploring possible These factors raise serious challenges criminal charges against the northern Reilly’s case is concerning because he for Western governments, whose Virginia men. The mystery man, never traveled to a foreign country for citizens are being lured into the Saifullah, has yet to be identified. The training, which is one reason why he terrorist fold over the internet. The recent case is concerning because it was not discovered by authorities until internet has become a starting point shows how Westerners, in this case he executed his plot. His case presents a for those seeking persuasive jihadist Americans, can be induced to partake information, ideological guidance, in jihad through contacts made over practical military instructions and the internet and travel to Pakistan for “Cases of ‘lone wolf’ connections with jihadist handlers. To direct training. In many ways, the case terrorism show how the combat this threat, counterterrorism is similar to the global network tied to efforts will need to increasingly factor Ehsanul Sadequee. internet has the ability to in the virtual battlefield in addition to at least somewhat become the physical battlefield. The Internet and its Role in “Lone Wolf” Terrorism a substitute for physical Dr. Sajjan Gohel is Director for International Another growing concern is the issue military training, although Security at the Asia-Pacific Foundation, an of “lone wolf” terrorism. This refers independent intelligence and security think- to an individual not connected to any the pattern so far implies thank. He received his Ph.D. in International particular cell or network, but who that internet training History from the London School of Economics becomes radicalized as a result of & Political Science (LSE). His doctoral thesis, jihadist literature online. Moreover, the alone reduces operational entitled, “The Evolution of Egyptian Radical individual can also become trained in effectiveness.” Ideological Thought from Hasan al-Banna explosives and other weapons through to Ayman al-Zawahiri,” is in the process of military training manuals available being published. Dr. Gohel’s primary research on the internet. The emergence of interests include: the security challenges in these self-generated violent extremists worrying scenario because it was almost South Asia, the Middle East and the Horn presents a significant challenge to law completely domestic, other than the of Africa and the connection with the West; enforcement because they have few, if virtual contacts forged over the internet. radical ideological thought both present and any, physical organizational links to Furthermore, his two unidentified historical; and the role that New Media plays other collaborators. This means that contacts were not apprehended, which in transnational terrorism. warning signs may only be seen in means they can continue their attempts hindsight, after a plot has already been to foment jihad in Western countries executed. through contacts made on the internet. Cases of “lone wolf” terrorism, of which One of the most disturbing cases of Reilly is only one, show how the internet “lone wolf” terrorism is Nicky Reilly, has the ability to at least somewhat who attempted to carry out a suicide become a substitute for physical military bomb attack in May 2008 in Exeter training, although the pattern so far in the United Kingdom. Reilly, who implies that internet training alone has Asperger’s syndrome, made an reduces operational effectiveness. improvised explosive device (IED) out of soft drink bottles filled with paraffin, Conclusion caustic soda and nails. He tried to Through its relatively secure detonate the IED in a café, yet the bombs anonymity, the internet has become a exploded prematurely and Reilly was key medium for Westerners to identify the only person injured.45 and connect with jihadist radicalizers and recruiters. The internet is part Reilly, a Muslim convert, researched how to make IEDs on the internet. He 46 Adam Fresco, “Bomber Nicky Reilly was Brain- also used the internet to obtain the IED’s washed Online by Pakistani Extremists,” The Times, Oc- tober 16, 2008. 45 HMA v. Nicky Reilly, January 30, 2009. 47 Ibid.

15