WASHINGTON — The report detailing the supposed vulnerability of the Army's Stryker armored vehicles to rocket-propelled grenades appeared on a password-protected terrorist Web site in the summer of 2006.
Terrorists discovered it on the Web site of a think tank, downloaded it to their own site and urged fellow mujahedeen to study it and use it in attacking the U.S. combat vehicles in Iraq.
Though the report has been discredited, its posting on a jihadist Web site shows how cyberspace has become an increasingly important front in the war on terror.
From "Jihad University" to "Terrorists 007" to 5,000 or more other sites, terrorists are using the Internet to spread propaganda, recruit members, raise money, offer training and instruction and plan operations.
The National Security Agency, CIA, FBI, Defense Intelligence Agency and other U.S. and foreign intelligence agencies and some private contractors are fighting back. They are cracking terrorist passwords, monitoring suspicious Web sites, cyberattacking others and sometimes planting bogus information.
People are also reading…
Some lawmakers on Capitol Hill and independent experts, however, think the U.S. could be doing a better job.
"It's not like we aren't looking at these sites," said Rep. Adam Smith, D-Wash., the chairman of the House Armed Services terrorism subcommittee. "But we need better coordination, processing of what we find. It's a major concern."
"Government efforts are inadequate," said Bruce Hoffman, a professor in the securities-studies program at Georgetown University, who said the private sector is doing a better job than the government. "Our enemies have embraced the Internet. We have to ask how closely the government is monitoring it."
Much of what the intelligence community is doing is classified, and few details are available.
At the Department of Homeland Security, the focus has been on protecting government and private Web sites from cyberattacks by terrorists and other hackers who want to pilfer classified information or crash the sites with waves of e-mail.
"There are intrusions happening every day," said Russ Knocke, a Homeland Security spokesman. "There is no evidence of activity tied to the terror network. But it remains something we are concerned about."
Smith said the U.S. government has launched an effort to counter some of the propaganda that terrorists post in Internet chat rooms, message boards, blogs and other Web sites. He said the government programs use some "fairly cool stuff" that he can't talk about publicly.
The Internet threat is wide-ranging, complicated and not easy to contain.
Some sites include veritable libraries of videos showing attacks on U.S. forces in Iraq. Elsewhere, there are realistic video games based on attacking U.S. forces in Iraq or Israelis. Sites that show videos of beheadings have been known to crash because so many people are trying to get online.
Terrorist sites can contain instructions on how to use small arms, mortars and rockets, build bombs and train to become a sniper. Some analysts say the training and instruction offered on the Internet have largely replaced the terrorist training camps that al-Qaida established in Afghanistan and elsewhere in the 1980s and 1990s.
Find breaking news coverage of the war on terror at azstarnet.com/attack

