In case you missed this the first time around….
Terrorist and other high value criminals aren’t as dumb as they look! Don’t get me wrong – they aren’t smart either – they fall somewhere between a rock and a goat (which happens to be their best friend on a lonely night).
Unfortunately, over time – even dumb people learn a thing or two.
You've reached your daily free article limit.
Subscribe and support our veteran writing staff to continue reading.
In case you missed this the first time around….
Terrorist and other high value criminals aren’t as dumb as they look! Don’t get me wrong – they aren’t smart either – they fall somewhere between a rock and a goat (which happens to be their best friend on a lonely night).
Unfortunately, over time – even dumb people learn a thing or two.
These guys have become pretty creative over the past decade or so on how to communicate without detection or compromise. Most of the time, their advancements in technology and/or creativity are a direct response to some news breaking story about the technology or techniques used to catch them – very irritating to say the least!
So, I figure we should turn the tables and start exposing their techniques and technologies used to communicate covertly – ultimately exposing them! So let’s get started with some of Hamas’ not-so-secret communication techniques.
The use of a courier has been around longer than pigeons. UBL had a courier – the best courier in the business, but look where that got his handler – dead, bagged, and keelhauled – somebody call PETA – fish deserve better!
Using a courier is a fairly simple technique utilizing a trusted source or asset to transport and deliver a message. This is not a very secure way of passing sensitive information for obvious reasons – mostly human error. Here are just some reasons why couriers are not a good idea:
The use of “saved drafts” is widely used by naughty husbands and wives having affairs, which prevents emails from ever being directly sent from your wife to me : ) Terrorists have been using this method as well.
The idea is simple – one email account is opened and the user name and password given to multiple users. All users can log in, type a message, save it as a draft, and then log out. A different user can log in and read the messages left behind. Not once was a email sent and zero personal emails are attached.
Terrorists have taken this method to new heights. For example: they have put together 30 day communication plans that include a different email account for each day with 30 different user names and 30 different passwords. Its goes like this:
This process can go on and on. If you ask me, it’s a pain in the ass – I have a hard enough time remembering my 4 digit pin on my iPhone! Imagine trying to keep 30 different accounts, user names, and passwords straight – cheat sheet or not – what a nightmare!
The Virtual World
The use of Virtual Worlds, like Second Life, is now the rave in covert communications for Hamas and other terrorists. If you haven’t heard of Second Life – that’s okay – its not widely known to people that actually have a life.
Second Life allows you to create a “resident” avatar and then travel through a virtual world doing whatever you want. You can socialize, have sex with other avatars (be warned: you’ll probably end up with some he-she sitting in China pretending to be a hottie), buy and sell real estate, buy a Rolex, buy an island (like Hamas did).
You can even buy an AK-47 and learn how to use it from other more knowledgeable Avatars (Hamas) – you can pretty much do anything in that world that you can do here – in this world. It’s actually kinda funny because you’re reading this on a computer – at SOFREP Life – where all the bad ass avatars hang out! In Second Life, your avatar can be a human, animal, mineral, or even a vegetable – your choice…fucking weird.
Second Life has a GDP – Gross Domestic Product. Yes, like a country – roughly $100 million a year and growing. People are spending, making, and losing real money in this world. You can convert any currency in the world to Linden Dollars – named after the company that developed Second Life. It has a no shit economy. There are Second Life entrepreneurs that are making a million dollars a year! Crazy!
Here are 3 advantages that Second Life and other Virtual Worlds provide terrorists:
I think you get the point!
These are just some of Hamas’ covert communication techniques – some simple – some clever. We should always dime them out. Keep them off balance – keep them on the run. If you know of other ways these jackasses communicate, tell us, post it, and comment on it.
Join SOFREP for insider access and analysis.
TRY 14 DAYS FREEAlready a subscriber? Log In
COMMENTS
You must become a subscriber or login to view or post comments on this article.