Posted September. 18, 2001 08:35,
Osama bin Laden (44), a man with a genial look and who enjoys wearing traditional clothes. Underneath him lies the hidden quality of armed leader who leads the Jihad (Holy War).
He commands the Jihad through modern IT technologies. America`s periodical the Times reported that Bin Laden uses computer, fax, and satellite phones in the hills and caves of Afghanistan to specify terror objects to his followers abroad.
The internet is the core of e-Jihad. His secret company bound together to fight until death called `Al Kaeda` usually lies below the radar. When there is strategy planned out, they exchange information over the internet. It not only takes good care of its members spread abroad in 34 countries and it boasts in high security. Some utilizes chatting rooms in sports site or adult sites. Because these sites can be joined anonymously, they can avoid the tracking of intelligence institutions.
Bin Laden also utilizes the IT materials to the full. Last year the US intelligence office acquired 1,000 pages worth of bin Laden`s `terrorism manual CD`. This manual contained visual information concerning the formation and establishment of explosives, the manufacturing of poisons and firearms, winning over people to help in the cause, among others. It also contained details concerning the production method of explosives used in the 1998 US Embassy bombings in Kenya and Tanzania, which claimed 224 lives.
It is likely that Bin Laden also possesses hacking ability. There were some suggestions that the secret software `promise` which was delivered to the former Soviet Union by former FBI agent Robert Hanson, who is now imprisoned for spy activities. This software observes the content of internet bank transactions and cuts through certain databases to do money laundering.
Even the IT security system sees Laden to be very meticulous. Last year, the communication method was immediately switched to a codified internet communication method when Laden realized that the CIA were tapping into the satellite communication emanating from a hiding place in Afghanistan. Laden also avoids TV live broadcastings that make identification of a location possible. He is clearly fully conversant with the double-sided aspect of IT technology.
CNN reported that Laden has stopped the use of modern technological communication device after the terrorist attack. This is because of the possibility of tapping. Perhaps he is going against America, a supreme IT nation, by resorting to a stone-age communication method such as delivering messages through a secret messenger on a horse.