The virtual world is fast becoming the most important meeting place for terrorists, and a major venue where extremists can make contact with like-minded individuals. Through these relatively anonymous contacts, an extremist can be brought into the terrorist fold and become physically involved in terrorist plots. Today, there are a growing number of cases in which terrorist groups, or jihadist radicalizers, have used the internet to recruit individuals in the West, providing them a starting point to engage in terrorist activity. By ignoring this developing issue, there is the risk of becoming complacent about an emerging threat that appears to be growing more significant with time.
This article will explore a now defunct network of terrorist cells that were located across the world and which became connected through the internet. By studying this network of cells, which the author identifies as the Digital Jihad Network, it becomes evident that the internet has become a key platform in cell formation and terrorist activity. Moreover, the article will also show how the internet is increasingly being used to recruit Westerners for jihadist operations at home and abroad. Finally, the article will identify the threat posed by “lone wolf” terrorism, which is made possible as a result of jihadist literature, online radicalizers and military training materials available on the web.
The Internet as a Staging Platform:
A Case Study of the Digital Jihad Network
The internet is increasingly playing a critical role in linking together disparate terrorist cells around the world. An examination of one major global jihadist network reveals the sheer number of links and connections forged through the internet. The case involved Ehsanul Sadequee, who an Atlanta court found guilty of conspiracy to materially support terrorists in August 2009. His trial explored a nexus of extremists who were connected through the internet to plan attacks and form a global network linking North America, Europe and South Asia. The trial resulted in eight terrorism cases involving several dozen defendants and years of complex international cooperation.
Born in Virginia with parents from Bangladesh, Sadequee exhibited radical sentiments in his teens. Soon after the September 11 attacks, he sent an e-mail to an extremist website expressing his desire to join the Taliban. Sadequee’s extremist activity intensified when he met Syed Haris Ahmed, a Pakistani-American student at Georgia Tech, at a mosque in Atlanta. The two made contact in a password-protected chat room. Transcripts of their internet conversations reveal that they fed off each other’s outrage at the U.S. wars in Iraq and Afghanistan.
It was in the virtual space, through murky web forums and radical chat rooms such as “Clearguidance,” that an extremist network of like-minded individuals, together with Sadequee and Ahmed, was established and where ideas for terrorist training and plotting attacks were discussed. The network included a group of radicals from Canada, known as the “Toronto 18” led in part by Zakaria Amara, a gas station attendant; a Bosnian-born Swede named Mirsad Bektasevic who was planning attacks against Western interests in Sarajevo; and Aabid Khan from Manchester, England, who acted as a facilitator for various Pakistan-based terrorist organizations. The final actor in the network was Younis Tsouli, a former Moroccan diplomat’s son living in London whose computer expertise made him the network’s hub. Tsouli had also used the internet to build links to al-Qa`ida operatives in Iraq.
In early 2005, Ahmed and Sadequee traveled to a Toronto mosque to meet with some members of the Toronto 18 to discuss possible attacks on the Centers for Disease Control and Prevention in Atlanta and oil refineries. Aabid Khan also flew in from London for the gathering. None of the individuals had formal terrorist training, so they agreed as a first step to travel to Pakistan and spend three months in a training camp run by Lashkar-i-Tayyiba (LT), a Pakistani terrorist group that orchestrated the Mumbai terror siege in November 2008. Khan would make the necessary arrangements with the LT so that the network’s members could travel to Pakistan and begin training. Khan was also in contact with Jaysh-i-Muhammad (JM), another terrorist group in Pakistan that was partly involved in the abduction and murder of U.S. journalist Daniel Pearl in Karachi. The network’s members rented two basement apartments in Toronto as a base from where they and others part of their internet chat group could gather before traveling to Pakistan.
After their planned paramilitary training trip in Pakistan, the network intended to return to Toronto and choose targets to attack in Canada, the United States, the United Kingdom and continental Europe. They anticipated the attacks to be possibly the most coordinated terrorist assault ever seen. A few weeks after their trip to Toronto, Ahmed and Sadequee visited Washington, D.C. where they made more than 62 video clips of potential targets, including the Pentagon, the Capitol, and the World Bank headquarters. Sadequee e-mailed the scouting videos to Tsouli and Khan.
Sadequee eventually traveled to Bangladesh to get married, and he continued his participation in the global network. Although Ahmed was able to travel to Pakistan, he and Khan were not able to arrange training for the global plotters because of the logistical difficulties in bringing them all together. In October 2005, Sadequee communicated via e-mail from Bangladesh with Tsouli in London and Bektasevic in Sarajevo, as the latter was obtaining explosives and weapons for a plot. They discussed a propaganda video that Bektasevic was preparing that would announce the formation of a group they called “Al-Qa`ida in Northern Europe.”
By this time, however, law enforcement and intelligence agencies had finally traced their internet communications and were monitoring their activities on the web, in addition to keeping them under close physical surveillance. Within days, in October 2005, Bektasevic was apprehended in Sarajevo and British police arrested Tsouli in London. Bektasevic’s arrest revealed that he had already assembled a suicide vest attached to a detonator, suggesting his plot was imminent. Tsouli’s encrypted hard drive provided a wealth of information that led investigators to pursue other militant links across the world. Both Tsouli and Bektasevic are serving lengthy prison sentences after being convicted on terrorism-related charges. In March 2006, Ahmed was arrested in Atlanta by the FBI and Sadequee was detained in April 2006 in Bangladesh. Ahmed was convicted in June 2009 for conspiracy to provide material support to terrorism in the United States and abroad.
In Britain, once the evidence had been gathered from the other plots, authorities quickly moved to apprehend the remaining members of the network. In April 2006, Scottish police arrested a student, Mohammed Atif Siddique, as he was in the process of boarding a flight to Pakistan to meet Aabid Khan who had been indoctrinating and radicalizing Siddique through the internet.
In June 2006, Toronto witnessed the dramatic arrests of several men also connected to the network. The Toronto 18 cell had been infiltrated by two police informants and was accused of planning attacks on two Toronto buildings and an Ontario military base. The cell members had in their possession large quantities of what they thought was ammonium nitrate. In October 2009, Zakaria Amara pleaded guilty to knowingly participating in a terrorist group and intending to cause an explosion for the benefit of a terrorist group. Investigations revealed that members of the Toronto cell, including Amara, were influenced by the internet sermons of U.S.-born Islamist ideologue Anwar al-Awlaki, who is believed to be based in Yemen.
Four days after the Toronto plotters were arrested, Aabid Khan was detained at London’s Heathrow Airport as he disembarked from a flight from Islamabad in June 2006. When police searched his luggage they found two computer hard drives, 16 CDs and a quantity of documents. The contents of the material showed Khan inciting others to participate in terrorist activity through the internet, and evidence also showed that he had facilitated trips to Pakistan. In August 2008, Khan was convicted of being a terrorist propagandist.
Hammaad Munshi, a 16-year-old British schoolboy, was also caught in the network, becoming Britain’s youngest convicted terrorist. Munshi was a friend and recruit of Aabid Khan, and was convicted in September 2008 of possessing materials that were likely to be used in acts of terrorism. Munshi collected instructions for making napalm, explosives and suicide vests from the internet. A quantity of propaganda videos and audio recordings, stored on the family computer, were also found during a search.
This case study of the Digital Jihad Network reveals how the internet is being used as a platform to facilitate contact among like-minded aspiring jihadists. Moreover, it also plays a role in the preparation and plotting of attacks. In the case of this network, it allowed members to come into contact with individuals with actual physical ties to terrorist groups, such as to the LT in Pakistan. The dismantling of the network led to dozens of arrests around the world. Worryingly, this template has also been used subsequently in the United States to recruit people for terrorist activity abroad.
Al-Shabab Recruits in the United States and the Pakistan-Virginia Case
In November 2009, federal authorities unsealed terrorism-related charges against men they say were key actors in a recruitment drive that led young Somali-Americans to join al-Shabab, a Somali insurgent group and an al-Qa`ida affiliate. In total, authorities have implicated 14 people in the case. Perhaps the most notorious is Zakaria Maruf, an American-Somali who had left Minnesota for southern Somalia to link up with al-Shabab and subsequently recruited men from the United States through a variety of means, including the internet.
This was the case of Mohamoud Hassan, a student at the Carlson School of Management, whose path toward extremism began through the internet with searches for jihadist videos and jihadist chat rooms. Like the Toronto 18, Hassan listened to the audio lectures of Anwar al-Awlaki. Hassan then began to communicate frequently with Maruf who established contact through listservs, an antiquated form of sending e-mails, and conference calls arranged by an associate who distributed several hundred numbers and passwords so people could establish contact securely.
In November 2008, Hassan turned his back on a university education and with two other students left for Somalia to join an al-Shabab training camp where he linked up with his internet recruiter Maruf. In September 2009, Hassan’s grandmother received news from Somalia that her grandson was killed. It is unlikely that he will be the last Somali-American recruited by al-Shabab handlers to fight in Somalia. His case is a mere example of the problem.
More recently, in December 2009 five men from northern Virginia were arrested in Sargodha in Pakistan’s Punjab Province on suspicion that they were plotting terrorist attacks and planned to fight in Afghanistan. The Pakistani police interrogation report identified one of the suspects as Ahmed Abdullah Minni, who it claims regularly went on YouTube to watch Taliban attacks on the U.S. military in Afghanistan and left comments praising the actions. His comments attracted the attention of extremists, and he was eventually contacted through the internet by a mysterious individual using the alias “Saifullah.” A Yahoo! e-mail account was set up so the accused and Saifullah  could communicate.
The suspects planned to travel to Pakistan, and then to Afghanistan. Once they arrived in Pakistan’s port city of Karachi, the men left for Hyderabad. Pakistani authorities claim that they tried to connect with JM and Jama`at-ud-Da`wa (JuD), the parent wing of LT. According to Pakistani authorities, neither JuD nor JM expressed any interest in recruiting the men. During the past 10 years, however, both groups have actively recruited foreigners. It is likely that the two groups are reluctant to induct Americans at this time in light of the recent case of David Headley, a Chicago resident accused of conducting reconnaissance on behalf of LT during the preparation for the 2008 Mumbai attacks, as well as conspiring to attack the offices of the Danish newspaper, Jyllands-Posten. Other reports state that the two terrorist groups thought that the men were working on behalf of Western intelligence agencies.
U.S. officials are exploring possible criminal charges against the northern Virginia men. The mystery man, Saifullah, has yet to be identified. The recent case is concerning because it shows how Westerners, in this case Americans, can be induced to partake in jihad through contacts made over the internet and travel to Pakistan for direct training. In many ways, the case is similar to the global network tied to Ehsanul Sadequee.
The Internet and its Role in “Lone Wolf” Terrorism
Another growing concern is the issue of “lone wolf” terrorism. This refers to an individual not connected to any particular cell or network, but who becomes radicalized as a result of jihadist literature online. Moreover, the individual can also become trained in explosives and other weapons through military training manuals available on the internet. The emergence of these self-generated violent extremists presents a significant challenge to law enforcement because they have few, if any, physical organizational links to other collaborators. This means that warning signs may only be seen in hindsight, after a plot has already been executed.
One of the most disturbing cases of “lone wolf” terrorism is Nicky Reilly, who attempted to carry out a suicide bomb attack in May 2008 in Exeter in the United Kingdom. Reilly, who has Asperger’s syndrome, made an improvised explosive device (IED) out of soft drink bottles filled with paraffin, caustic soda and nails. He tried to detonate the IED in a café, yet the bombs exploded prematurely and Reilly was the only person injured.
Reilly, a Muslim convert, researched how to make IEDs on the internet. He also used the internet to obtain the IED’s components, as well as to investigate potential targets. Importantly, he was in frequent contact via the internet with two unidentified men from Pakistan, with whom he discussed his intentions and from whom he received encouragement and information. The unidentified individuals answered his questions and directed him to bomb-making websites.
Reilly’s case is concerning because he never traveled to a foreign country for training, which is one reason why he was not discovered by authorities until he executed his plot. His case presents a worrying scenario because it was almost completely domestic, other than the virtual contacts forged over the internet. Furthermore, his two unidentified contacts were not apprehended, which means they can continue their attempts to foment jihad in Western countries through contacts made on the internet. Cases of “lone wolf” terrorism, of which Reilly is only one, show how the internet has the ability to at least somewhat become a substitute for physical military training, although the pattern so far implies that internet training alone reduces operational effectiveness.
Through its relatively secure anonymity, the internet has become a key medium for Westerners to identify and connect with jihadist radicalizers and recruiters. The internet is part of the process connecting aspiring terrorists with like-minded individuals or actual terrorists operating out of countries such as Pakistan and Somalia. After consolidating relationships over the internet, the recruits can then plot and plan mass casualty attacks while remaining in contact with their handlers through the world wide web.
These factors raise serious challenges for Western governments, whose citizens are being lured into the terrorist fold over the internet. The internet has become a starting point for those seeking persuasive jihadist information, ideological guidance, practical military instructions and connections with jihadist handlers. To combat this threat, counterterrorism efforts will need to increasingly factor in the virtual battlefield in addition to the physical battlefield.
Dr. Sajjan Gohel is Director for International Security at the Asia-Pacific Foundation, an independent intelligence and security think-thank. He received his Ph.D. in International History from the London School of Economics & Political Science (LSE). His doctoral thesis, entitled, “The Evolution of Egyptian Radical Ideological Thought from Hasan al-Banna to Ayman al-Zawahiri,” is in the process of being published. Dr. Gohel’s primary research interests include: the security challenges in South Asia, the Middle East and the Horn of Africa and the connection with the West; radical ideological thought both present and historical; and the role that New Media plays in transnational terrorism.
 “Atlanta Defendant Found Guilty Of Supporting Terrorists,” U.S. Department of Justice, August 12, 2009.
 Bill Gillespie, “The Case Against Canada’s Plotters,” Canadian Broadcasting Corporation, October 14, 2009.
 “Toronto 18 Video Evidence Released,” Canadian Broadcasting Corporation, October 20, 2009.
 “Atlanta Defendant Found Guilty Of Supporting Terrorists.”
 Tsouli infamously was able to hack an FTP server operated by the Arkansas Highway and Transportation Department and turn it into an al-Qa`ida message board, providing detailed information on the art of hacking.
 “Terrorist Use Of The Internet,” Combating Terrorism Working Group (CTWG), George C. Marshall European Center for Security Studies, June 16-17, 2009.
 Aryn Baker and Jyoti Thottam, “The Making of a Mumbai Terrorist,” Time Magazine, March 8, 2009. Interestingly, the anonymous nature of the internet also served as a tool to aid and mask the LT’s Mumbai attack. One of the handlers for the group sent an e-mail to an Indian TV channel claiming that the “Deccan Mujahidin” was responsible for the plot. Deccan, being an area in southern India, implied the plot was indigenous. Investigations subsequently found that the e-mail message originated in Lahore in Pakistan, before being routed to different locations through an anonymous “re-mailer” service. This is a system that acts as a mail intermediary and allows users to send e-mails to a destination anonymously. The ploy successfully misled many as to the origins of the group and could serve to act as a template for future attacks.
 Nick Fielding, “Omar Saeed Sheikh: The British Jackal,” Sunday Times, April 21, 2002.
 Sebastian Rotella, “Georgia Man Convicted of Aiding Terrorism Groups,” Los Angeles Times, August 13, 2009.
 “Terrorist Use Of The Internet.”
 Gordon Corera, “Al-Qaeda’s 007,” TimesOnline, January 16, 2008.
 “Atlanta Defendant Found Guilty Of Supporting Terrorists.”
 HMA v. Mohammed Atif Siddique, October 23, 2007; Swann.
 “Toronto 18 Video Evidence Released.”
 Unlike other radicals, Anwar al-Awlaki understands Western culture and has used the internet to tailor his messages to directly influence young impressionable people. During his time in the United States, he served as an imam at San Diego’s Rabat mosque, where he met future 9/11 hijackers Khalid al-Midhar and Nawaf al-Hazmi and developed a close relationship with them. Al-Awlaki was also in communication through the internet with Nidal Malik Hasan, the U.S. Army officer who is charged with killing 13 people and wounding 30 at Fort Hood, Texas in November 2009. See Michelle Shephard, “The Powerful Online Voice of Jihad,” Toronto Star, October 18, 2009; The 9/11 Commission Report (New York: W.W. Norton & Co., 2004), p. 221; Theo Emery, “The FBI Probe: What Went Wrong at Fort Hood?” Time Magazine, December 10, 2009. Al-Awlaki was characterized in court testimony as an inspiration by two of the six people convicted on conspiracy and other charges in a plot to kill U.S. military personnel at Fort Dix. A Facebook page devoted to the ideologue once had thousands of supporters. Following the Ft. Hood shooting, the page was removed by the website administrators.
 “Cases Concluded in 2008,” The Counter-Terrorism Division of the Crown Prosecution Service, undated.
 Jenny Percival, “Yorkshire Teenager Becomes Britain’s Youngest Convicted Terrorist,” Guardian, August 18, 2008.
 Amy Forliti, “Details Emerge About Somali Terrorists’ Recruiting Methods,” Associated Press, August 25, 2009; Andrea Elliott, “A Call to Jihad, Answered in America,” New York Times, July 12, 2009.
 Laura Yuen, “Fifth Minnesota Man Dies in Somalia,” Minnesota Public Radio, September 5, 2009. In December 2008, al-Awlaki addressed al-Shabab followers in one of his blog entries stating, “We are following your recent news and it fills our hearts with immense joy.”
 “Interrogation Report, ‘Profiles of the Foreigners Held,’” Punjab Police, Sargodha, Punjab Province, December 11, 2009.
 Ibid. Interestingly, to avoid interception by law enforcement and intelligence agencies, e-mails were never sent from the account, but messages were left in the draft folder and deleted after reading, the online version of a “dead letter drop.”
 “Mosque of Americans Arrested in Pakistan Plans Investigation,” CNN, December 11, 2009.
 Jama`at-ud-Da`wa was proscribed by the United Nations following the Mumbai terror siege attacks.
 “Interrogation Report, ‘Profiles of the Foreigners Held.’”
 HMA v. Nicky Reilly, January 30, 2009.
 Adam Fresco, “Bomber Nicky Reilly was Brainwashed Online by Pakistani Extremists,” The Times, October 16, 2008.