Bin Laden's Slow But Effective Method of E-mailing Off The Grid

By Tracey E. Schelmetic May 13, 2011

In the aftermath of the killing of Osama Bin Laden by Navy Seals at a compound in Pakistan, the U.S. government has been very interested in examining the dwelling for all manner of intelligence, including how the Al Qaeda figurehead managed to communicate with the outside world without leaving a digital trail for U.S. government eavesdroppers to follow.

Using intermediaries and thumb drives, bin Laden reportedly managed to send e-mails in a circuitous but effective way. His manual process allowed him to become a prolific e-mail writer despite not having Internet or phone lines running to his compound.

His methods, described in new detail to The Associated Press by a counterterrorism official and a second person briefed on the U.S. investigation, frustrated Western efforts to trace him through cyberspace. The people spoke to the AP on condition of anonymity to discuss the sensitive intelligence analysis.

Bin Laden’s system was built on discipline and trust. But it also left behind an extensive archive of e-mail exchanges for the U.S. to scour. After killing bin Laden, Navy SEALs recovered about 100 flash drives that contained much of his e-mail communication, reported Mashable.

The trove of electronic records pulled out of his compound after he was killed nearly two weeks ago revealed thousands of messages and potentially hundreds of e-mail addresses, the AP learned.

At that location, the courier would plug the memory drive into a computer, copy bin Laden’s message into an e-mail and send it. Reversing the process, the courier would copy any incoming e-mail to the flash drive and return to the compound, where bin Laden would read his messages offline.




Tracey Schelmetic is a contributing editor for TechZone360. To read more of Tracey's articles, please visit her columnist page.

Edited by Jennifer Russell

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More

Putting the Flow into Workflow, Paessler and Briefery Help Businesses Operate Better

By: Cynthia S. Artin    9/14/2018

The digital transformation of business is generating a lot of value, through more automation, more intelligence, and ultimately more efficiency.

Read More

From Mainframe to Open Frameworks, Linux Foundation Fuels Up with Rocket Software

By: Special Guest    9/6/2018

Last week, at the Open Source Summit, hosted by The Linux Foundation, the Open Mainframe Project gave birth to Zowe, introduced a new open source soft…

Read More

Unified Office Takes a Trip to the Dentist Office

By: Cynthia S. Artin    9/6/2018

Not many of us love going to see the dentist, and one company working across unified voice, productivity and even IoT systems is out to make the exper…

Read More

AIOps Outfit Moogsoft Launches Observe

By: Paula Bernier    8/30/2018

Moogsoft Observe advances the capabilities of AIOps to help IT teams better manage their services and applications in the face of a massive proliferat…

Read More