First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Security firm: Al-Qaeda group's encryption software stronger
- — 04 February, 2008 07:58
Al-Qaeda support group Al-Ekhlaas has improved the encryption software it now provides to its online members, according to one security researcher who examined the software, known as "Mujahideen Secrets 2."
Mujahideen Secrets 2 has added the ability to encrypt chat communications, which the first version lacked, says Paul Henry, vice president of technology evangelism at Secure Computing. Henry says he got the software through a contact in the intelligence community. The home-grown Mujahideen Secrets 2 encryption software, based on open source RSA code, can encrypt binary files so they can be posted on ASCII-text-based bulletin boards and Web sites.
"They have improved the operation of the graphical user interface and it will now encrypt chat communications," says Henry, who adds that the Arabic translation suggests the software is encouraged for use by Al-Ekhlaas members to evade US government efforts at surveillance.
Tampa-based ISP NOC4Hosts and Rochester, Minn.,-based SiteGenesis in January found out their operations were being used to host the Al-Ekhlaas Web sites where Mujahideen Secrets 2 can be found. Both hosting firms pulled the plug on the Web sites after receiving specific technical information about the content.
This week another Web hosting company, CrystalTech Web Hosting in Phoenix, shut down sites linked to the Al Qaeda-link support group.
"As soon as we found out, we brought the IP sites down," says Bob Cichon, president of CrystalTech Web hosting, who blamed a reseller for it happening. "We're a very large host and it's hard to track everything."
In its analysis of Mujahideen Secrets 2, Secure Computing has noticed that the software appears to violate copyright law.
"Typically with open source, they still require a copyright notification," Henry says. "There's no copyright notification whatsoever here."
Another notable thing is that the public-key signature in Mujahideen Secrets 2 leaves a tell-tale sign that the Al-Ekhlaas home-rolled software produced it. The encryption itself is strong at up to a 2,048-bit key length, and like the previous version, provides e-mail and file encryption using public-key certificates.