Modernizing Authentication — What It Takes to Transform Secure Access
In the film "Arlington Road," a college professor in a quiet Virginia town is disturbed to learn his neighbors may be terrorists. That film was released in 1999. In 2008, something similar happened, in a manner more fitting to the 21st century.
A few days ago, Paul Henry, vice president of technology evangelism at Secure Computing began tracking a software package called Mujahideen Secrets 2, an update to an encryption tool used by al-Qaeda and other terrorist groups to communicate on the Internet.
Henry tracked it down to a password-protected Web site that belongs to an Islamic forum known as al-Ekhlaas. al-Ekhlaas's domain, Ek-ls.org, traces back to a hosting company, Noc4Hosts, which in turn is run by Hi Velocity, a hosting provider based in Tampa, Florida.
"I'm appalled that someone is willing to risk these types of actions just to make a few dollars," he told InternetNews.com.
Hi Velocity did not answer a query as of press time, and calls to the phone number listed in its WHOIS registration entry did not go through, meaning the lines are disconnected or out of service. Its 800# customer service line has an option to report abuse, but on selecting that you are told all abuse must be reported via a feedback form on the company Website.
Henry said that he contacted the FBI about the site and its contents last weekend, but as of Wednesday evening it's still up and running, as is Henry's blog posting on the subject.
Because the site is password protected, Henry hasn't been able to download the new version of Mujahideen Secrets. Ironically, under U.S. law, he can't try to brute force his way in either. He's concerned because it looks like the bad guys are getting better at covering their tracks.
"What concerns me personally is we've relied on their use of archaic technology to block them in the past and it looks like this might be the start of a tech refresh for the bad guys," he said.