
Analysis of the Technical Mujahid – Issue One

with the release of the first jihadist e-zine discussing hacking,
information hiding, of course in between the lines of radical
propaganda, whereas no one was providing more information on the exact
nature of the articles, but the SITE institute. So I decided to take a peek at the Technical Mujahid for myself, in order to break through the FUD, or not see the “threat sliced on pieces” by different news sources.
According to the official release, the magazine’s download locations seem to be slowly becoming useless, besides the Rapidshare link which seems to be still fully working — the Internet Haganah reasonably points out that owning a copy of it might get you in trouble in some countries, so don’t.
that I don’t speak any Arabic languages, and I pressume neither do you,
the e-zine is rich on visual materials and you can pretty much grasp
the big picture. Namely, that it’s practical compared to theoretical
source of information, it’s targeting mixed audiences, and it’s keeping
it very simple. So I’ve decided to compile a summary of the key sections
and topics in the articles covered for future references. In one
sentence – its simplicity is not to be feared, but its practicality.

release of the magazine is an indication of the ongoing use of the
Internet for mass-education — economies of scale — through videos and
visual howto’s, but much more advanced information related to
information security could be obtained from public sources. The cellphone triangulation in Iraq, and the demonstration of Hacker Defender are worth mentioning, but overall, concepts such as information warfare or online PSYOPS remain unstructured and abstract ideas to the average jihadist
– for now. Notice the multimedia file used as an example for the
alternate data stream as well and draw up the conclusions on your own.
exclude the logical possibility of on purposely disinforming the
general public and various intel folks across the world on a relatively
primitive inforwar practices such as using PGP and alternate data
streams.

explains triangulation, mentions satellite imagery’s power, and
satellite transfer speeds, mentions 1575 and 1227 as carrier frequencies
and Digital Sequence Spread Specturm – DSSS, mentions handheld GPS
receiver, includes photos of 3G data card, laptop. It then discusses a
locked device with a “WARNING” sign on it
– Zimmerman is quoted, explanation of the RSA algorithm, recommending
the use of PGP Whole Disk, features warning message that trial versions
of PGP Whole Disk will self-decrypt
future issues, the editors urge members of the jihadist Internet
community to submit articles in the field of technology for publishing.
They write: “My kind, technical Mujahid brother, the magnitude of
responsibility which is placed upon you is equal to what you know in the
regard of information. Do not underestimate anything that you know;
perhaps a small article that you write and publish can benefit one
Mujahid in the Cause of Allah or can protect a brother of yours in
Allah. This way you will gain the great reward with the permission of
Allah.“