TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum

TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum TECHNICAL MUJAHID MAG ISSUE 2.pdf - ASEAN Regional Forum

aseanregionalforum.asean.org
from aseanregionalforum.asean.org More from this publisher
15.05.2015 Views

[pg i – Cover] [pg ii] Why a Technical Mujahidin Magazine? The Technical Mujahid magazine provides everything that benefits the mujahidin in the media sphere on the one hand and visitors to jihadist websites on the other. The magazine follows up everything that is new and useful in the field of information security, ways of protecting computers, editing, sound engineering, the news of the jihadist media, and monitoring the Crusader leaders' comments about the impact that the jihadist media have on them, etc. We seek to attain the following objectives by publishing this magazine: 1. To remove the fear and panic complex from the hearts of some people who are held back from actively participating in jihad because they think that intelligence services are watching their every move and counting their every breath. When they are better informed of the facts, they will know when to go forward and when to hold back. 2. To disseminate a sense of security in a scientific way among the members of the jihadist websites as a precaution that we are required to take in a logical, organized, and realistic way with neither exaggeration nor disregard. 3. To spread technical awareness of everything that might be useful in the jihadist media sphere including visual editing, sound engineering, and other basic media skills. 4. To publish scientific articles about some modern techniques that can help to develop the work of the brother mujahidin who operate in the field. Chief Editor: Abu-al-Muthanna al-Najdi Writers: Abu-Mus'ab al-Jaza'iri, Abu-al-Hasan al-Maghribi, Abu-Dajanah al-Makki, Abu-al-Harith al-Dulaymi, Mujahid I'lami. Proofreader: Abu-Muhammad al-Marakishi Artistic editor: Abu-al-Zubayr al-Madani Contents Staff 1. 'Secret Communications: Hiding Secrets Inside Images' This article describes the most modern communication techniques and how messages and files can be hidden inside images or other signals. In this way information can be sent without arousing suspicion. The writer explains the techniques of sending hidden messages and counter techniques that are used to discover and retrieve them. It gives examples of how carrier image files are carefully chosen. By: Abu-Mus'ab al-Jaza'iri 2. 'How To Create a Jihadist Website' This article explains in a simple style the basics of choosing a hosting company and how to choose a domain and related issues. By: Abu-Dajanah al-Makki 3. 'Smart Weapons: Short-Range Surface-to-Air Missiles' This is Part One of a series of articles acquainting the reader with smart weapons. The article illustrates the technology of thermally guided missiles, the manner of their operation, and their uses. It provides numerous examples of how the mujahidin in Iraq are using these weapons with high efficiency. By: Abu-Harith al-Dulaymi 4. 'Video: Question and Answer (2)' This is Part Two of a previous article. In this part we continue our theoretical explanation in preparation for the practical process in the next part, God willing. By: Mujahid I'lami 5. 'Translating Films and Providing Subtitles' This is a very important article on how to translate and edit jihadist films and provide professional level subtitles. By: Abu-al-Hasan al-Maghribi 6. 'Program on the Mujahidin's Secrets: A View From Within'

[pg i – Cover]<br />

[pg ii]<br />

Why a Technical Mujahidin Magazine?<br />

The Technical Mujahid magazine provides everything that benefits the mujahidin in the media sphere on the one<br />

hand and visitors to jihadist websites on the other. The magazine follows up everything that is new and useful in the<br />

field of information security, ways of protecting computers, editing, sound engineering, the news of the jihadist<br />

media, and monitoring the Crusader leaders' comments about the impact that the jihadist media have on them, etc.<br />

We seek to attain the following objectives by publishing this magazine:<br />

1. To remove the fear and panic complex from the hearts of some people who are held back from actively<br />

participating in jihad because they think that intelligence services are watching their every move and<br />

counting their every breath. When they are better informed of the facts, they will know when to go forward<br />

and when to hold back.<br />

2. To disseminate a sense of security in a scientific way among the members of the jihadist websites as a<br />

precaution that we are required to take in a logical, organized, and realistic way with neither exaggeration<br />

nor disregard.<br />

3. To spread technical awareness of everything that might be useful in the jihadist media sphere including<br />

visual editing, sound engineering, and other basic media skills.<br />

4. To publish scientific articles about some modern techniques that can help to develop the work of the<br />

brother mujahidin who operate in the field.<br />

Chief Editor: Abu-al-Muthanna al-Najdi<br />

Writers: Abu-Mus'ab al-Jaza'iri, Abu-al-Hasan al-Maghribi, Abu-Dajanah al-Makki, Abu-al-Harith al-Dulaymi,<br />

Mujahid I'lami.<br />

Proofreader: Abu-Muhammad al-Marakishi<br />

Artistic editor: Abu-al-Zubayr al-Madani<br />

Contents<br />

Staff<br />

1. 'Secret Communications: Hiding Secrets Inside Images'<br />

This article describes the most modern communication techniques and how messages and files can be hidden<br />

inside images or other signals. In this way information can be sent without arousing suspicion. The writer<br />

explains the techniques of sending hidden messages and counter techniques that are used to discover and<br />

retrieve them. It gives examples of how carrier image files are carefully chosen.<br />

By: Abu-Mus'ab al-Jaza'iri<br />

2. 'How To Create a Jihadist Website'<br />

This article explains in a simple style the basics of choosing a hosting company and how to choose a domain<br />

and related issues.<br />

By: Abu-Dajanah al-Makki<br />

3. 'Smart Weapons: Short-Range Surface-to-Air Missiles'<br />

This is Part One of a series of articles acquainting the reader with smart weapons. The article illustrates the<br />

technology of thermally guided missiles, the manner of their operation, and their uses. It provides numerous<br />

examples of how the mujahidin in Iraq are using these weapons with high efficiency.<br />

By: Abu-Harith al-Dulaymi<br />

4. 'Video: Question and Answer (2)'<br />

This is Part Two of a previous article. In this part we continue our theoretical explanation in preparation for the<br />

practical process in the next part, God willing.<br />

By: Mujahid I'lami<br />

5. 'Translating Films and Providing Subtitles'<br />

This is a very important article on how to translate and edit jihadist films and provide professional level<br />

subtitles.<br />

By: Abu-al-Hasan al-Maghribi<br />

6. 'Program on the Mujahidin's Secrets: A View From Within'


The Security Department of the Global Islamic Media Front presents the first program about coded Internet<br />

messages that rely on a public key algorithm. The program provides numerous advantages and is of Islamic<br />

manufacture. It is not possible to secure the mujahidin's secrets by trusting foreign programs.<br />

By: the Security Department of the Global Islamic Media Front<br />

[pg iii]<br />

Editorial<br />

In the name of God, the Compassionate, the Merciful.<br />

May God be praised. God's prayers and peace be upon the imam of the mujahidin, our Prophet Muhammad, his<br />

household, and all his companions.<br />

We return to you in this issue of our blessed magazine, with the power of God.<br />

At the beginning we would like to thank and appreciate the efforts of all the brothers who encouraged and supported<br />

us and were generous in providing us with their views, observations, and questions about the magazine and its first<br />

issue.<br />

While offering thanks, we should not forget to mention our brothers who responded to our call and sent us technical<br />

articles to publish in the magazine. We tell them that this time neither time nor space allowed us to include all the<br />

articles that were sent to us. We promise that your articles will appear in future issues, God willing. We seize this<br />

opportunity to encourage other brothers to begin doing creative work and to send us their articles or suggestions.<br />

We should also mention that we could not respond to all the brothers who sent us proposals or requests but we<br />

would like to tell them that all that they wrote will be taken into account, God willing.<br />

Regarding this issue, we will present in it various subjects, beginning with video and editing issues in view of the<br />

fact that they are important to jihadist media work. This issue also contains important articles on protecting<br />

information either by putting it in code or hiding it inside electronic images. We have decided in this issue to begin a<br />

series that will explain the steps involved in establishing a hosting company and creating websites for jihadist<br />

purposes.<br />

We will continue our war against the enemies of God in every land and under every sky until all Muslim lands are<br />

liberated from the desecration of the aggressor Jews and grudge-bearing Crusaders and until all religion is devoted<br />

to God and we can see the banner of Islam fluttering over the land.<br />

God is great. Dignity is to God, His messenger, and the believers.<br />

We will be happy to receive your questions and letters sent to the magazine's domain:<br />

http://teqanymag.arabform.com<br />

Your brother,<br />

Chief Editor Abu-al-Muthanna al-Najdi


[pg 1]<br />

Secret Communications: Hiding Secrets Inside Images<br />

by Abu-Mus'ab al-Jaza'iri<br />

The thing that worries the Federal Bureau of Investigation<br />

most is when the mujahidin use the secret<br />

communications technology known as the art of hiding<br />

messages.<br />

This art, known as steganography or information hiding,<br />

is the most sophisticated method of sending information<br />

either via the Internet, a cellular telephone, or other<br />

information-transmitting tools.<br />

Although sending coded messages by using the public key<br />

algorithm, which can be deciphered if you know the key,<br />

guarantees the confidentiality of a particular piece of<br />

information or private communication, it still has a point<br />

of weakness because the opponent is aware that you are sending coded messages. This in itself puts the sender in<br />

some sort of danger and causes many intelligence agencies to discover the source of the messages and place the<br />

sender under surveillance. This is where the art of hiding information comes in. It abolishes the weak point of coded<br />

messages by hiding information of all types inside other types of expression like graphics or musical notes for<br />

example.<br />

The following study will acquaint the reader with information hiding technology and the parallel technology of<br />

uncovering the secret information, which is known as steganalysis. We will also warn the readers against certain<br />

types of programs that claim to be able to hide information. Actually they are fraudulent programs that no one<br />

should use. They can cause tremendous damage because while you might think that you have hidden the information<br />

you are sending, someone familiar with the program can extract the information you have sent with extreme ease.<br />

With the spread of new media technologies in the 1990s attention began to be focused on hiding information inside<br />

the digital media. Prior to this development, watermarking was used to protect copyrights such as protecting a<br />

photographer's copyright by watermarking his photographs. The real objective is to send secret messages under the<br />

cover of digital tools that arouse no suspicion. This helps to prevent their interception or even the knowledge that<br />

messages are being sent.<br />

Interest in hiding information grew among people doing research into signals and digital pictures as useful tools of<br />

information security. Many countries began to feel worried that this new technology would be used to send<br />

information that could undermine their public security and interests.<br />

[pg 2]<br />

So a new sphere of technical methods came into existence, namely, methods that could uncover the existence of<br />

hidden information with the aid of digital tools. This new field has been given the name steganalysis.<br />

Steganalysis is more successful when the information hiding technology is weak. Although steganalysis can uncover<br />

some digital signals carrying hidden messages, it frequently fails to do so when the hiding methods are<br />

sophisticated, especially as hundreds of millions of digital signals are continuously traveling across the Internet. It is<br />

impossible to analyze this astronomical number of signals.


Diagram 2 [Diagram 1 is missing as received]: Color picture with images of the basic colors composing it. The basic<br />

picture is a grayscale conglomeration of 256 color shades for each scale, which when merged produce the color<br />

picture.<br />

1. New Technologies and a Long History<br />

The hiding of information has historically been linked with spying on the enemy and attempting to send secret<br />

information without being discovered. Secret ink was one of those information hiding methods. In ancient times<br />

onion juice was used to manufacture this ink but in the 1950s and 1960s chemical engineers developed new methods<br />

of writing between the lines. The spy would pen an ordinary letter to a friend but would use the secret ink to include<br />

secret information.<br />

[pg 3]<br />

The visible message is the medium while the real letter is what the ordinary reader cannot see. The secret text is<br />

made visible by wiping the page of the letter with a special chemical that reacts with the secret ink.<br />

Perhaps many people remember the story of the Egyptian intelligence operative Rif'at al-Jamman (Ra'fat al-Hajjan)<br />

who was recruited by Egyptian intelligence and planted as a Jewish young man inside the Zionist entity in occupied<br />

Palestine. He was trained from the start to send secret messages by writing letters to his girlfriend in Paris. This<br />

girlfriend was actually an apartment rented by Egyptian intelligence in the French capital. With the development of<br />

communication engineering Al-Jamman was trained to send and receive coded messages by radio using the Morse<br />

code, a language invented by the scientist Morse in 1890. It relies on identifying letters by using dots and dashes<br />

only. This later came to be known as binary encoding in digital communication.<br />

2. Information Hiding<br />

While the use of codes protects information secrecy and prevents ordinary people from understanding the contents<br />

of messages, steganography goes further. It hides the fact that information is being sent at all. The use of codes<br />

sends secret information but does not mind that others realize that secret messages are being sent. Steganography's<br />

function, on the other hand, is to send information without letting anyone realize that communications are taking<br />

place. It sends information inside various signals using highly secure codes that use deciphering keys varying in<br />

strength from 256 to 2048 bits.<br />

The function of information hiding is to relay secret information without arousing the slightest suspicion that<br />

messages are being exchanged. This is done under the cover of digital signals that look totally innocent. Pictures are<br />

the most widely used medium to relay secret messages. Images of the non-compressed bitmap type and compressed<br />

jpeg files have been used. The information is hidden inside the color images relying on several methods including<br />

modifying the bit. Other methods use the frequency domain.


2. (1) Modifying the Bit (LSB Modification)<br />

In this technical method the bit inside the picture's color component (pixel) is modified. It is the smallest bit in the<br />

color and when it is modified, this does not alter the shape of the picture at all because it represents only one part in<br />

255 parts of the basic color. The basic colors in digital images are red, green, and blue. This means that we can<br />

exploit three bits out of every 24-bit component in a picture.<br />

Modifying the smallest bit in the color introduces a type of noise into the image that is measured by the signal to<br />

noise ratio and is referred to by the letters SNR. In this case the ratio is 50 decibel-dB, which means that the<br />

alteration to the picture cannot be noticed.<br />

To calculate the quantity of material that one can hide inside a picture, we carry out the following operation:<br />

q=.3((L x w)/8)<br />

[pg 4]<br />

The symbols refer to the following:<br />

q: the quantity of material introduced into the image<br />

L: is the length of the image (that carries the hidden message)<br />

W: is the width of image<br />

Keep in mind that this is the quantity of material that can be hidden in the image without compression. If the<br />

material is in compressed form, a much larger message can be hidden. This means that we can hide a noncompressed<br />

message consisting of 300 letters in a picture that is 800 pixel wide and 1 pixel high. Such a picture<br />

passes unnoticed on any website and can be part of the site's design. It will never arouse any suspicions. If we<br />

compress the message, we can send a message that is several times longer.<br />

Among the well-known programs used to merge messages into images in this way are: EzStego, S-Tools, and Hide<br />

and Seek. There are others. We must distinguish between hiding information in images that cannot be compressed<br />

and hiding it in images that can be compressed. Compression alters the color values and the picture quality.<br />

Diagram 3: The three layers that form color pictures. Illustration of the least significant bit (LSB) in each basic<br />

color. Every basic color is composed of eight bits. Three bits are introduced into each pixel.<br />

The term pix represents the image component and LSB represents the bit. Color images are made up of three layers,<br />

namely, the basic colors of red, green, and blue. Each color consists of eight bits and can represent 256 shades of the<br />

basic color. This means that every color in a picture that consists of 24 bits can represent 16,777,216 shades.<br />

[pg 5]


Three bits of every image component are used to merge and hide a secret message, keeping in mind that merging<br />

this information does not affect the size or quality of the picture. It will continue to look as it originally did.<br />

Additionally this technology does not signify real information hiding, as we shall see later when we look at some<br />

programs that are marketed as information hiding programs but are something completely different. The information<br />

hidden in them can be discovered and retrieved with total ease.<br />

3. Digital Fingerprint<br />

The digital fingerprint consists of a cipher that ranges in length between 218-512 bits. It is used to ensure that a<br />

certain file is the original one and not one that has been altered. The digital fingerprint is also used to preserve a<br />

password inside a file. The technology involved in a digital fingerprint is based on a one way encryption. This<br />

means that it is not possible to retrieve the password from the digital fingerprint. This is known as Hash or Message<br />

Digest.<br />

Diagram 4: Program to calculate the digital fingerprint of texts or files. The fingerprint is a one way encryption.<br />

4. Deciphering Hidden Information or Counter Solutions (Steganalysis)<br />

Deciphering hidden messages is a task that is contrary to hiding information. The function of steganalysis is to<br />

reveal whether a particular graphic file, audio file, or other type of file contains hidden information. The deciphering<br />

process depends on the type of file used to carry the secret message. If a certain image is suspected, digital image<br />

technology is used to decipher the LSB layers.<br />

[pg 6]<br />

A color image contains 24 bits, only 3 of which can be suspected of hiding information. These three bits are then<br />

extracted and examined to see if there are disparities from the perspective of statistical analysis in the whole expanse<br />

of the picture. This technology fails entirely if the information was put in cipher before it was merged and<br />

distributed in an appropriate way inside the image.<br />

It is easy to uncover hidden information in JPG images because the colors are linked together by the DCT system<br />

(Discrete Cosine Transform). Any alteration of the colors resulting from hiding information in such an image causes<br />

defects in the DCT coefficients, thus making it easy to realize that a secret message has been hidden inside even if<br />

this message is not extracted. To reduce the chances of uncovering such messages, some programs exploit a smaller<br />

number of color layers, as for example hiding the message inside the color red only.<br />

Some programs are sold over the Internet on the grounds that they are programs in which you can hide information<br />

but in reality they serve no such purpose at all. They merely rely on manipulating the identification of the file's<br />

beginning and end. In this study we will present the most recent such program, which is called Steganography 1.8<br />

and we will show how simple it is to extract the hidden information from it with extreme ease. This renders their<br />

claim about putting messages in code and hiding them completely meaningless.


After opening the carrier file with a hexadecimal program, one can go to the end of the file where the cipher for the<br />

end of the EOF file is found. In hexadecimal language the number is 454F46. The original file in this case is called<br />

Cellphones.pdf.<br />

Diagram 5: A steganography program: Attractive but fraudulent<br />

[pg 7]<br />

Diagram 4 [as published]: Details of carrier file showing the end of file marker (EOF)<br />

After using the Steganography 1.8 file, we will notice that the program did not merge the second file into the first<br />

file but merely attached it to the end of the first file in a process called concatenation.<br />

The following image shows how this attachment is done. The information of the carrier file is shown in yellow and<br />

under it appears the file that the program has hidden. In (Diagram 7) the same file has been hidden and protected by<br />

a password. When you compare the information in Diagram 6 with Diagram 7, you will realize that the password<br />

has no connection at all with putting the password in code. The information in both diagrams is identical regardless<br />

of the password. This simply means that the program does not put the information in code by relying on the<br />

password.


Diagram 6: Hiding a file without using a password<br />

[pg 8]<br />

Diagram 7: Hiding a file and protecting it using a password<br />

4. 1 Revealing What Is Hidden<br />

We made several experiments to hide various files inside various types of original files. After using a hexadecimal<br />

editor to open a file that hides another file inside it and going to the end of the file, we noticed that 64 bits are<br />

repeated in all the files in two sections (48491200 and 0084E673), shown in blue in the diagram. These 64 bits are<br />

considered a telltale sign of files that hide other files inside them. This means that they reveal that there is a hidden<br />

file inside the original file.<br />

4. 2 Putting the Password or the Message in Code<br />

We carried out an experiment to hide a file inside another file. The first time we did not use any password and the<br />

second time we did. Our aim was to discover whether the program put the information hidden inside in code or not.<br />

We got a surprise!<br />

In Diagrams 8 and 9 there is no difference in the two pictures under the command line although the first picture<br />

represents the hidden file that has not been put in code (without a password). The second picture represents the<br />

hidden file that is protected by a password. Of course there is no difference and this means that no cipher is used in<br />

hiding the information. What the program does is save the digital fingerprint of the password alone and rely on a<br />

message digest made up of 128 bits (16 x 8 bits).


After comparing the file for which we used a password with the file without a password, we discovered the place<br />

where the digital fingerprint of the password was saved, namely, 128 bits directly before the cipher: 0084E673.<br />

When you use a password, what the program does is to calculate the digital fingerprint of the password and save it<br />

inside the file. This method of protecting hidden information is not worthy of the name because it is so easily<br />

uncovered. It has also been discovered that without using a password, the following fingerprint is found instead of<br />

the digital fingerprint of the password. The presence of this fingerprint means the file is not using protection for the<br />

hidden information. The special fingerprint is:<br />

6C 3C 39 6C 30 6B 6C 31 30 6E 38 38 6A 3A 38 3C<br />

[pg 9]<br />

To abolish any password that protects the hidden file, whenever any other fingerprint is present, it is enough to<br />

delete it and replace it with this special fingerprint that is characteristic of a hexadecimal editor. This way we can<br />

retrieve the hidden file with extreme ease without even having to know what kind of coding was used in producing<br />

the digital fingerprint of the password. What we would simply be doing is abolishing what the manufacturer<br />

describes as coding. It is merely a deceptive device built into the program.<br />

Diagram 8: Showing the end of the carrier file after hiding another file inside of it without using a password<br />

Diagram 9: Showing the same operation in the diagram above, but this time using a password<br />

4. 3 Retrieving the Hidden Information in Three Steps<br />

[pg 10]


The following three steps are used to uncover and retrieve any file that has been hidden inside another file:<br />

1. Search for the fingerprint 48491200 with 0084E673 at the end of the file. If this is found in the file, it<br />

means that it contains another hidden file inside it. This first step rebuts the program's claim of successful<br />

information hiding.<br />

2. Replace the password's digital fingerprint which consists of 128 bits and appears directly before the cipher<br />

0084E673 and replace it with the special fingerprint: 6C 3C 39 6C 30 6B 6C 31 30 6E 38 38 6A 3A 38 3C,<br />

which deletes the password. This second step rebuts the program's claim that it can protect information<br />

when a password is used.<br />

3. Open the carrier program and retrieve the hidden file. This last step shows you that what you imagined was<br />

a coded and well hidden message was merely an illusion. It can be easily retrieved.<br />

At this point we can respond to the manufacturer's claim that appears on the program:<br />

Make your secrets invisible in just 3 easy steps! [English in original]<br />

This is our answer: Your hidden secrets were retrieved by three easy steps regardless of the code you used in this<br />

program.<br />

5. Real Information Hiding<br />

In real information hiding technology, the carrier file, either an image or an audio file, can carry a specific quantity<br />

of information without any alteration to the file size or the picture and sound quality. When you put your<br />

information in code before hiding it, you can guarantee its total secrecy. This can foil steganalysis that relies on<br />

visual or statistical analysis of the messages haphazardly merged with the color layers that are used in the hiding<br />

process. By additionally using compressed files, it is possible to increase the size of the statements or messages that<br />

you wish to hide. The following example illustrates the quantity of information that one can hide inside a picture for<br />

example. Keep in mind that the following program is not widely known and the techniques that it uses have not been<br />

published.<br />

[pg 11]


Example 1: The picture above, 512 x 380 pixels in size, hides inside it 200 pages of the holy Koran. These pages,<br />

together with the inflections, represent more than 240,000 characters including spaces and line returns. The code<br />

used is 1024 bits and the compression ratio is 330%. The hiding of all this material does not increase the original<br />

picture's size by even 1 bit. One cannot distinguish between the original picture and the picture that hides<br />

information inside it.<br />

It is possible for a picture that is 700 x 800 pixels to hide the entire Koran inside it together with inflexions, page<br />

numbers, and verse numbers. Images like this one are able to hide not only text material but also all kinds of files.<br />

You can, for example hide a computer program, an audio file, or an image, or collect several files in one compressed<br />

file and hide it in the picture, all this without increasing the picture's original size.<br />

Example 2: The small picture above, which is 50 x 100 pixels hides 20 communiqués by the Islamic Army of Iraq,<br />

namely, more than 15,000 characters including spaces at a compression ratio of 1000%. This high level of<br />

compression can be obtained by what is called data redundancy.<br />

[pg 12]<br />

This involves the fact that all mujahidin communiqué have the same preamble and the same ending with only the<br />

body of the communiqué changing each time. This structure allows the program to increase the compression. These<br />

small pictures, which can hide a large quantity of messages, can be transmitted by using cellular telephones within<br />

multimedia messages (MMS).<br />

Example 3: A picture that is 500 x 3 pixels only, so that it might not be noticed, can be part of a website design. Yet<br />

it can hide a message that has more characters than the Koran's opening sura [chapter].<br />

Diagram 10: A histogram of an original picture and of the same picture after more than 240,000 characters have<br />

been hidden inside it (example 1). The slight change does not affect the picture's clarity or arouse any suspicion<br />

because the color distribution appears normal.<br />

6. Way of Selecting Carrier Images<br />

Choosing the picture in which the information or messages will be hidden is subjected to a prior analysis of the type<br />

of image. To ensure a high hiding capability, we conduct a steganalysis examination of the picture before using it.<br />

We will give here three examples of how to choose suitable pictures.


A distinction must be made between graphics and photographs. The first kind contains a limited number of colors<br />

and lower color layers that are not all subjected to haphazard distribution. This makes the task of hiding information<br />

inside such an image impossible because of the ease with which the hidden material can be detected.<br />

[pg 13]<br />

However, discovering that information is hidden inside the graphic does not mean that the discoverer can learn the<br />

contents of the message because he does not know the code, the compression level, or the method of hiding. For this<br />

reason we should not use Western programs because they are purely deceptive. Each one of them has a type of<br />

signature indicating that the carrier file (image) has been amended by a certain program.<br />

6.1 Steganalysis Using Visual and Statistical Analysis<br />

6.1.1 Steganalysis Using Visual Analysis, Example 1<br />

Diagram 11:<br />

Part 1: The original picture<br />

Part 2: The picture after hiding information inside it<br />

Part 3: Layer analysis of the original picture<br />

Part 4: Layer analysis of the picture that hides information inside it. It shows a rectangle<br />

containing haphazard colors that indicate the presence of a secret message. After obtaining this<br />

result, the role of steganalysis ends. The result means that this picture is not suitable for use as a<br />

medium file to carry hidden information.<br />

Diagram 11: Pictures (drawings) containing a limited number of colors. The hidden message within is easily<br />

revealed because of the homogenous background without the ability to know the content.<br />

[pg 14]<br />

6.1.2 Steganalysis Using Visual Analysis, Example 2<br />

Diagram 12:<br />

Part 1: The original picture<br />

Part 2: The picture with a secret message hidden inside it<br />

Part 3: Layer analysis of the original picture<br />

Part 4: Layer analysis of the picture carrying a hidden message. A rectangle of haphazard colors<br />

appears at the top of the picture, indicating the presence of a secret message.<br />

Part 5: The position of the message inside the picture has been moved to the lower part where<br />

there are haphazard colors. In this case visual analysis becomes incapable of detecting whether<br />

there is hidden information or not.


Part 6: The same picture but after we placed a red rectangle over the secret message to show its<br />

position.<br />

Diagram 12: Shows a type of drawing that can be used to hide messages, but the location of hiding should be<br />

carefully chosen. Placing the message in the green area, which is revealed through enhanced LSB layers analysis by<br />

the color black, makes it easy to discover.<br />

[pg 15]<br />

6.1.3: Steganalysis Using Visual Analysis, Example 3<br />

Diagram 13:<br />

Part 1: The original picture<br />

Part 2: The picture after hiding a message consisting of 16,000 characters in it at a tenfold<br />

compression rate. The message occupies only 9 percent of the area of the picture that measures<br />

250 x 190 pixels.<br />

Part 3: Layer analysis of the original picture<br />

Part 4: Layer analysis of the picture hiding the secret message. Of course no differences can be<br />

detected between the two pictures by using visual layer analysis. Even when other analysis<br />

techniques are used, it cannot be definitely known that there is anything hidden in such pictures.<br />

Even if a particular program claims that they contain something, this is merely a possibility that<br />

might be right or wrong. The type of program that tries to uncover secret messages by relying on<br />

the theory of likelihood errs also when normal pictures are used, thus making their user lose<br />

confidence in their usefulness. Erroneous discovery of hidden information is called false positive.


Diagram 13: Layer analysis shows that the picture above has a wide range of colors. Messages are hidden inside it<br />

but visual layer analysis techniques cannot discover such messages. This is a specimen of the images that must be<br />

used.<br />

[pg 16]<br />

Diagram 14: An example showing the failure of statistical analysis in identifying the image that hides 1.6 kb of<br />

coded information. Upper picture: Analysis of the picture without information. Lower picture: Analysis of the<br />

picture with hidden information. The analysis shows that the two pictures contain information, thus making the<br />

analysis lose credibility.


Diagram 15: Statistical analysis completely fails to discover the presence of secret information. The red line at level<br />

zero shows that the three pictures, which were statistically analyzed, do not contain any hidden information. In<br />

reality, however, two of the three pictures above contain 1.6 kb of coded information (the analysis pertains to<br />

Diagram 12)<br />

[pg 17]<br />

7. Conclusion<br />

The battle between steganography and steganalysis continues and represents the cornerstone in the battle of<br />

transmitting secret information. The first aspect of this battle represents secret communications where information<br />

and statements are transmitted without letting anyone be aware that communications are taking place. The other<br />

aspect represents the attempt to stop this type of communication. Several programs are used in steganography and<br />

most of them have counter programs that can reveal the likely presence of secret messages.<br />

In numerous cases, as in the program that we analyzed, some programs' claim to hide information successfully is a<br />

pure lie and deception. We showed how it is possible to retrieve the information that was hidden and protected by a<br />

password. This should alert us not to use any program without carrying out prior analysis of it.<br />

A sophisticated steganography program merges several advanced techniques together to perform the task with high<br />

efficiency. The program compresses the information at high rates and then puts it in code at 2048 bits prior to hiding<br />

it. Some programs hide brief messages inside brief audio files. Some programs use a limited number of basic color<br />

layers to try to evade any likely discovery through the use of steganalysis, which relies on the statistical distribution<br />

of colors.<br />

Other programs hide statements or messages by using the most sophisticated communication engineering techniques<br />

in a process described as spread spectrum. This is done to escape all possible steganalysis processes. We also<br />

showed how to select suitable photographic pictures or pictures of natural scenes because visual analysis and<br />

statistical analysis fail to discover the secret messages hidden inside them. This makes the art of hiding information<br />

a science worthy of its name and is unique in transmitting secret information without being detected.<br />

God Almighty said: 'So I do call to witness what ye see, and what ye see not' [Koranic verse]. '<br />

Important terms


[pg 18]<br />

[pg 19]


How To Set Up a Jihadist Website from A to Z (Part 1)<br />

by Abu-Dajanah al-Makki<br />

May God, the Lord of the worlds, be praised. Peace<br />

be upon the most virtuous of prophets and<br />

messengers, our master Muhammad, his virtuous and<br />

pious companions, and all those who emulate them<br />

down the ages until Judgment Day.<br />

We will now begin, with the aid and power of God, to<br />

explain to the brothers who support jihad the way of<br />

establishing jihadist websites to propagate the<br />

mujahidin's ideology and publish the news of their<br />

operations to inform the world of the truth about the<br />

mujahidin, their operations, and their goals.<br />

This study will consist of several subjects. In this<br />

subject we will explain in a very simple way, the<br />

basic steps of finding the best possible hosting<br />

company. We will then speak about various types of<br />

domains, how to reserve space for them, and related<br />

issues.<br />

1. Website Components (What a Website Is)<br />

A website is composed of two parts:<br />

1. Website space: This is the space in which you post your files and pages. It is actually your website and is<br />

rented from a hosting company.<br />

2. Website domain: This is the name that you use to deal with your visitors. It is your hosting address. The<br />

Internet is like a large city and when you reserve space for yourself, you will be found on the net but you<br />

will need an address, which is referred to as a domain, where your visitors can access your website.<br />

[pg 20]<br />

2. Plans To Rent Space for a Website<br />

Some companies offer space for websites free of charge but these companies cannot be trusted with your files. They<br />

frequently disappear in mysterious circumstances and have their own motives, like putting advertisements on your<br />

pages, and they do not commit themselves to anything with regard to you. We will not talk about such companies<br />

but about the hosting companies that charge you for renting space.<br />

2.1 Important Advice<br />

1. Deal with the foreigner (though we regret this necessity): There are many hosting companies of various<br />

nationalities. There are Arab and other companies. There are problems characteristic of Arab hosting<br />

companies that are managed by one person who will not be totally committed to you. They offer you<br />

expensive plans but meager advantages. Frequently they deal horribly with their customers and will bargain<br />

with you over your files or even databases.<br />

2. Ask about a hosting company's reputation and its clients: Do not rent space from a newly created company<br />

or even one that is a year old. Do not rent from companies that hassle their clients. You can discover who<br />

the clients are by various means. You can also make inquiries about the company's own technical support<br />

capabilities. Always rent from reliable companies and examine the speed with which they load and<br />

respond.<br />

3. Make sure about the quality of the hosting company's technical support: Technical support is an important<br />

thing that you might need. The website might freeze. You might face other problems. In this case it is the<br />

technical support that will help you and answer your questions and requests. Is the technical support unit<br />

alert? Is it cooperative enough for your purposes? You know your website and what it will need.


4. Things that your website will need: Sometimes some brothers need to create a website for a particular<br />

purpose or their website requires special features. For example you wish to create a website and want to<br />

install a script that relies on the indicator COPY. You should ask the company's technical support about this<br />

indicator. Some of them de-activate it. You might want to send out a mailing list that relies on MAIL.<br />

Some of them close it. Make sure you ask about it. You might need a closed safe mode and so on. There are<br />

other tools that you know that you will need. They might not be active.<br />

5. Type of server and number of sites that it supports: You might need to know the type of server and how<br />

many websites it supports. The type and speed of server will affect the speed of your own site. The server is<br />

a computer and like any other computer, you can ask about its specifications and the number of sites that it<br />

supports. This might affect your own speed.<br />

6. Period when server is up: The server might stop for a few moments and then come back. There are ways of<br />

monitoring this. The time when the server is up and connected to the websites that it serves is given a<br />

percentage like 99.8 percent. This is called Up Time.<br />

[pg 21]<br />

2.2 Different Hosting Advantages and Plans<br />

You need space to insert your files, post your pages, and operate your programs, like forums for example. You need<br />

methods of creating programs. What do these terms mean? How does a hosting company make its plans?<br />

1. Space: Hosting companies offer spaces in gigabytes or megabytes that they call storage space. This space is<br />

important for you to place your files. Will your files be a few simple pages that require little space? Or will<br />

you also post audio and video files? Will you place the files in the website or in several hyperlink sites?<br />

2. Exchanging data: The data space is the space in which you can post your material. Everything you post will<br />

be measured and you are usually allowed to post a limited amount of data, which is counted by the month.<br />

Sometimes the companies set daily conditions. Let us suppose that you have a 100-Mb file and the space<br />

you have is 10 Gb. This means if this file is accessed 100 times, your website will be suspended until the<br />

end of the month. The pages do not use up a large space but this depends on the number of visitors to the<br />

site. Data space is calculated in gigabytes and called Bandwidth Transfer.<br />

3. Huge and unrealistic plans: Sometimes you come across huge offers like 300 Gb at a low cost. This is<br />

called oversell. This means that the hosting company is selling space that it does not really possess but<br />

knows that no one is using this space at that time because 90 percent of website owners do not use up more<br />

than 10 percent of their shares. Your website will not need all this space because if it does, this means that<br />

it will be using a lot of the CPU-RAM resources. This can result in the suspension of your website. This is<br />

where it becomes important to ask the company's clients and people with expertise about the actual space<br />

that your website will need and whether this will use up too much CPU-RAM. Using so much CPU-RAM<br />

resources might force you to look for a private server or a semi-private server, VPS.<br />

4. Databases: You will need databases for many of your website programs. You might need more than one.<br />

You could, if you wanted, place more than one program on the same database but this is not advisable.<br />

There is more than one type of database. You might need a particular type. Ask for it. The generally used<br />

type is MySQL. Some websites limit the size of a database, which might be less than 50 Mb. Now<br />

databases use up space but sometimes no limits are placed on their size.<br />

5. Electronic mail: You will need email capability for the exchange of messages. This will be your official<br />

email. Limits might be set on the number of emails allowed or the space available for them. Again it might<br />

be unlimited.<br />

6. PHP Support: This is support for the programming language. It is a very important language on which most<br />

websites operate. It is supposed to be present in all space sold by the hosting companies. It might not be<br />

mentioned because its presence is taken for granted. The existence of databases, however, is proof of its<br />

presence.<br />

[pg 22]<br />

One must make sure that the PHP is present. Many programs depend on PHP4. Will the server support<br />

PHP4 or PHP5? Which one will you need? You might need PHP5 instead of PHP4.<br />

7. Perl Support: This is usually used in advanced applications and you might not need it at this stage.<br />

8. CGI Support: It is an important programming language and you might need it for various programs. It is<br />

widely used and it is advisable to get it.


9. Control panel: There are various types of control panels. A control panel makes it easy for you to control<br />

and manage your website and establish databases, manage your email, and manage your files. There are<br />

famous and useful control panels known as CPanel.<br />

10. SSL: These are the coded links known as https. They have their own prices, licenses, and IPs. They might<br />

be offered free of charge or you might need to pay for them.<br />

11. Preparation fees: You might find out that you have to pay preparation fees for one time only, especially if<br />

you rent space for a brief period only. You are charged this fee to ensure that you are serious. Usually you<br />

do not have to pay, however.<br />

12. Parked domains: This involves adding more than one domain to your website. If you have more than one<br />

domain for the same site, then you will need this option.<br />

13. Add-on domains: If you want to have more than one website in your rented space, you will need this<br />

option. You will have more than one domain that visitors can access. This can be done by creating a file<br />

and linking it to the first domain. The add-on domains might be limited to a specific number or they might<br />

be unlimited.<br />

14. Additional programs: There are additional programs that can be added to your control panel and be useful<br />

to you, as for example Fantastico.<br />

15. Free add-ons: Sometimes there might be free add-ons, including a free domain, an SSL, or a private IP, or<br />

you might be given those for an additional period free of charge.<br />

16. Server operating system: The server operating system has an effect on your operations. This includes Lynx<br />

servers that use PHP as a programming language and MySQL as databases, and Windows servers that use<br />

ASP as a programming language and Access and MSSQL databases. Prices are different for each.<br />

Windows servers are more expensive not because they are better but because Windows requires a license<br />

that the companies pay fees to purchase. Generally, however, Lynx servers are the best and most famous.<br />

17. Refund guarantee: Large companies might give you a refund option after a trial period. This is usually done<br />

after 30 days or as the hosting company specifies. It is called money back guarantee.<br />

3. Domains<br />

The domain is very important to you. It sticks to the visitor's mind and identifies you and your website. It stays with<br />

you more than the hosting space itself. You might leave the hosting company at any time but you will not leave the<br />

domain. When you change your hosting company, you will not lose your visitors or reputation, unlike when you<br />

change the domain. Since matters are such, you must choose your domain carefully.<br />

[pg 23]<br />

3. 1 Important Advice<br />

1. Search for the largest companies: There are small companies that are licensed to act as representatives of<br />

larger companies. Do not purchase space from these. Go to the original company. Be with the larger<br />

enterprises.<br />

2. Do not place all your eggs in one basket: If possible do not reserve a domain from the hosting company or<br />

let the hosting company pick a domain for you from just any source without giving you a control panel for<br />

your domain. You need to have a control panel for your domain. Some cunning hosting companies do not<br />

give their customers a control panel for the domain at first and later charge them a high price to provide<br />

them with one. If you are suspended by your hosting company, you can do business with another. You<br />

cannot do this with the domain.<br />

3. Ask about a company's reputation and its clients: Do not reserve a site from a new company or even a<br />

company that is one year old. Do not deal with a company that does not treat its clients well. There are<br />

well-known global companies that have a stellar reputation.<br />

4. Special features: You might need special features for your domain. You own a server and you want a NIM<br />

server. Will the company easily provide you with this? If you wish to hide your information, will the<br />

company provide you with this capability at a reasonable price?<br />

5. Do not worry if the domain is not immediately present: After you reserve a domain, you might not find it<br />

on the web after connecting it to the hosting company. Do not be surprised. Minutes, even hours might pass<br />

until the communications companies connect the domain to your space. This depends on your Internet<br />

provider. If you reserve a site with proxy, you might find it immediately present but if you do so through a<br />

slow Arab provider, you might have to wait for hours or even a whole day before it appears. Do not worry.


6. Express yourself through the domain: Choose an expressive name for your domain. If the website is called<br />

Al-Ikhlas, let the domain be Al-Ikhlas in Latin characters. Attach a suitable extension although visitors<br />

generally look for the .com extension because it is the most widely used.<br />

7. Check name accuracy: Make sure that the domain can be easily memorized and spelled correctly if it is in<br />

Latin characters. If it is Arabic written in Latin characters, make sure that it is simple. Test it first with<br />

some brothers.<br />

8. Close the domain: On your control panel you have the option of closing the domain. This option serves to<br />

prevent the transfer of your domain from one company to another. You need this option.<br />

3. 2 Specifications and Various Terms Used in Domains<br />

1. Different names: Domains have various names, each denoting something like a country's name or the type<br />

of website and its focus. The names vary in price also. Some are cheaper than others like the extension<br />

.info. Some are pricey like the extension .tv. The simplest and most widely used is .com.<br />

2. Special offers: While reserving your website, you will come across special offers for domain or hosting<br />

features that might be useful to you. You might find some features highlighted and you can delete them if<br />

you do not need them.<br />

[pg 24]<br />

3. Registration privacy: A domain might have a collection of data that is offered to the public or to those who<br />

look for them, including a name, an IP address, and email. You choose these and they are different from the<br />

data you buy. You can insert false information of course. You can also purchase a private registration<br />

service so that no information will be supplied about you. You might have to pay for this service or it might<br />

be free.<br />

4. Renewal fees: Sometimes tricks are used, like making the domain price cheap but the renewal fee<br />

expensive after a year. The first price is to attract customers and the second high fee is to make up for the<br />

initial cheap price. Do not be deceived by the cheap initial price. Check the renewal fees first.<br />

5. SSL certificate: This is a certificate to guarantee SSL (Secure Sockets Layer). This has an additional price<br />

and it comes as 128 or 256 bits.<br />

3.3 Connecting the Domain to the Hosting Company<br />

"To connect the domain to the hosting company, you need to work from two angles: from the domain angle to<br />

inform it of the server that contains your website and from the hosting company's angle to inform it of your domain.<br />

"On the domain's control panel you will find the Name Server option. You can use this option to alter your website<br />

name, which usually consists of two or more addresses in this fashion:<br />

"NS1.host.com//NS2.host.com<br />

Domain Meaning Domain Meaning<br />

.ae<br />

.sy<br />

UAE<br />

Syria<br />

.com<br />

.net<br />

Commercial<br />

Networks<br />

.af<br />

.uk<br />

Afghanistan<br />

Britain<br />

,org<br />

.info<br />

Organizations<br />

Information (one<br />

of the cheapest)<br />

.il Israel .biz Businesses<br />

.sa Saudi .ws Website<br />

.iq Iraq .tv Television<br />

.jo Jordan .name Personal<br />

.eg Egypt .edu Educational<br />

.ir Iran .gov Government<br />

4. Conclusion<br />

In the foregoing article we explained the initial basic steps to establish a jihadist website on the Internet. After<br />

selecting a hosting company, a hosting plan, and a domain, the website will be established. In future articles we will<br />

explain how to manage the website and upload material on it until we end up with a complete jihadist site, God<br />

willing.


[pg 25]<br />

Smart Weapons: Short-Range Surface-to-Air Missiles (Part 1)<br />

by Abu-al-Harith al-Dulaymi<br />

Surface-to-air or antiaircraft missiles are divided into<br />

three classes: short-, intermediate-, and long-range<br />

missiles. The second and third types are fired from huge<br />

launching platforms and have ranges of 200 km or<br />

more. The first type is fired from the shoulder and one<br />

person can operate it by night or day. It has a range of<br />

10-15 k. Some of the most famous types is Stinger<br />

(diagram 1) and the Russian IGLA missile. Both are<br />

among the most modern shoulder-fired missiles. This<br />

weapon is very effective against aircraft of all types.<br />

The missile is a smart weapon equipped with a thermal<br />

camera that detects infrared radiation coming from the<br />

aircraft's engine and pursues it. The heat-seeking system<br />

is a smart pursuit method that follows the engine's heat source and flies at twice the speed of sound. It can down a<br />

plane flying at an altitude of less than 3,500 meters and is no more than 4 km away.<br />

We will illustrate later how this type of missile operates, its effectiveness, and the manner in which it is used. We<br />

will acquaint ourselves with the role it plays against the US occupation forces in Iraq and Afghanistan and the<br />

Russian occupation forces in Chechnya.<br />

Diagram 1: Stinger FIM92 surface-to-air missile. After its initial production this missile was developed into versions<br />

A,B,C,D,E,F. There is also an air-to-air version ATAS that the air force uses.<br />

[pg 26]<br />

1. Smart Short-Range Surface-to-Air Missiles<br />

Short-range surface-to-air missiles were designed to provide land forces with an effective weapon to engage lowflying<br />

fighter aircraft and helicopters. From the perspective of the mujahidin fighting on the ground, low-flying<br />

hostile aircraft pose a real threat because they carry out bombing raids, perform reconnaissance flights, land or<br />

evacuate troops, or bring fresh supplies to the enemy forces (figs 3, 4). Downing these planes is the easiest way to<br />

get rid of this threat.<br />

The best example that we can give is the downing of 10 helicopters of all types including Apaches, Blackhawk, and<br />

Chinook, in a single month. Indeed an F-16 was downed in Al-Karmah area west of Baghdad. This operation was<br />

carried out by the mujahidin of the Islamic State of Iraq in cooperation with the Al-Mujahidin Army on Monday, 27<br />

November 2006.


Diagram 2: The mujahidin of the Islamic State of Iraq fire a surface-to-air missile at a Chinook helicopter in Al-<br />

Karmah area. Mere seconds after the missile was fired the helicopter and the troops it was carrying turned into a ball<br />

of fire. The center picture shows the guided missile flying towards the target. The news of the 7 February 2007<br />

operation was published by Al-Furqan Media Production Establishment.<br />

These missiles use unicolor thermal sensors to detect infrared radiation. The sensors operate in the 3-5 micron<br />

frequency range to detect the radiation coming from the aircraft's engine that is produced by CO2. This radiation has<br />

a wavelength of 4.2 microns. The missiles have sensors that largely resemble thermal cameras operating within the<br />

8-13 micron range, which gives them a high resistance against countermeasures. This frequency is barely absorbed<br />

from the air and the sensors are bicolor sensors. The newest sensors now used are Insb and HgCdTe.<br />

The advantages that make this type of missile an effective weapon include the fact that it is light and easily<br />

transportable. The missile and launcher together weigh 15-18 kg. The launcher can be re-used and the missile alone<br />

weighs 10-11 kg. One person can carry the launcher and fire the missile by day or night. Using this type of missile is<br />

referred to as 'fire and withdraw.' After firing the missile, the combatant can immediately withdraw from the place.<br />

The missile automatically follows the target, using its built-in computer that relies on digital, thermal images.<br />

[pg 27]<br />

The result of the analysis of these images are relayed to the automated control system that directs the missile toward<br />

the target. It does this by altering the direction of the front guidance wings. This type of control is known as the<br />

feedback control system.<br />

This weapon has attractive qualities and many armies have sought to possess it. Many countries have also sought to<br />

manufacture it and make it a cornerstone of their air defense systems.<br />

Diagram 3: Helicopters are easy targets for surface-to-air thermally guided missiles. Shown in the picture is a<br />

Blackhawk helicopter used for landing troops. Several Blackhawks were downed among a total of 10 helicopters<br />

downed in one month.<br />

The infrared sensor is able to pursue the heat radiating from the aircraft's engine. This sensor is described as<br />

'negative' because unlike radar-guided missiles, it does not need to send out radar waves from a ground launcher in<br />

order to pursue its target. It follows the target by itself without ground support. The missile uses solid fuel with a<br />

high heat yield. To protect the person who launches the missile from the heat, the missile is launched in two stages.<br />

In the first stage the missile is ejected outside the launch tube and after it has reached a sufficient distance, the<br />

missile's engine is switched on and allows the missile to fly at twice the speed of sound or faster.


Diagram 4: Interior of a Blackhawk helicopter. The red circle shows the night-vision screen while the blue screen<br />

shows the positioning system that uses satellite-fed information together with digital maps.<br />

[pg 28]<br />

2. How To Operate a Surface-to-Air Missile<br />

To fire the missile, the mujahid must follow the target through the missile's viewfinder. The firing system, which<br />

basically rests on the thermal sensor, sends a special signal indicating that the target (aircraft) is within the missile's<br />

firing range. This is known as locking the target. The mujahid then presses the trigger and the launching motor ejects<br />

the missile out of the shoulder-held launch tube. In this way the missile is at a sufficient distance from the mujahid<br />

when it automatically ignites the main motor that runs on solid fuel. The missile then flies at a high speed, which in<br />

certain models reaches 2,448 km/hr. This is twice the speed of sound and is referred to as Mach II (figs 5, 6).<br />

Diagram 5: (Right picture) Basic components of an infrared-operated surface-to-air missile: 1. Ejection motor 2.<br />

Solid-fuel motor 3. Warhead 4. Automatic guidance system. 5. Thermal sensor and thermal camera<br />

(Left picture) Basic components of shoulder-held missile launcher: 1. Launch tube 2. Trigger 3. Viewfinder 4.<br />

Communications aerial to identify friendly and hostile planes (optional)<br />

Diagram 6: Taliban mujahidin in the Islamic Emirate of Afghanistan armed with surface-to-air missiles watch out<br />

for hostile planes. (Right picture)<br />

Mujahid fires missile at US helicopter in the Land of the Two Rivers. (Left picture)


[pg 29]<br />

The missile can fly at an altitude of 3,000 meters and pursue any target up to an 8-km range. Generally this means<br />

that it can destroy any plane that appears in the sky with a high rate of success on condition that it can be clearly<br />

seen and does not appear as a mere dot. New models of this missile are able to overcome countermeasures used by<br />

the planes.<br />

Some launchers are equipped with a system known as IFF to identify friendly and hostile planes (optional). It is a<br />

coded digital communications system that sends a wireless signal to the plane requesting identification. An<br />

electronic system in the plane responds automatically by sending a signal identifying itself. The signals are in code,<br />

which means that the plane cannot respond unless it knows the cipher used. Failure to respond means that it is a<br />

hostile plane and it is then attacked with a missile.<br />

Diagram 7: Area covered by a short-range surface-to-air missile and percentage of likelihood that it will hit the<br />

target. This illustration pertains to fighter aircraft that fly at a speed of over 250 meters per second. Regarding<br />

helicopters, the area covered becomes circular, which means that it is possible to down a helicopter from any<br />

direction within a 4-km range. If a missile is fired at a helicopter in the 1,000-2,000 meter range, a direct hit is<br />

certain. This range is referred to as the kill zone.<br />

The missile should only be fired if the target is flying at a low altitude and within a firing range not greater than<br />

4,000 meters and at an altitude under 3,000 meters. The likelihood of hitting a fighter aircraft as it approaches is<br />

much greater than when it is moving away because the missile might not be able to catch up with the target if it is a<br />

fast fighter aircraft (Figs 7, 8).<br />

One missile can destroy a plane costing more than $30 million (price does not include crew). The element of<br />

surprise is important in downing a plan. A few seconds separate the firing of the missile and its hitting the target.<br />

[pg 30]


Diagram 8: One of the mujahidin steps on the remains of an F-16 downed by a surface-to-air missile. In this<br />

particular operation the mujahidin of the Islamic State of Iraq also downed several Blackhawk helicopters with the<br />

help of the Al-Mujahidin Army.<br />

3. Electronic Control System and Pursuing the Target<br />

A surface-to-air missile uses infrared-operated thermal sensors. They are in the form of a thermal digital<br />

photography camera that senses the thermal images coming from the plane's engine. The missile follows the heat<br />

source. Some missiles use ultraviolet sensors to distinguish an illusionary from a real target. The illusionary targets<br />

are flares that planes drop when their radar discovers a missile moving toward them before the missile can reach<br />

them. These flares emit a lot of heat to divert the course of the missile and make it explode far from the plane. The<br />

thermal digital camera is made up of a network of sensors measuring 2 x 2 in the older models and 128 x 128 in<br />

newer models.<br />

When the target is detected, the missile's electronic system determines whether the target is within the killing range.<br />

After this the missile is aimed so that the target is in the center of the viewfinder (diagram 9). At this point the<br />

missile gives the lockdown signal, which means that the thermal sensor will pursue the plane and the missile is fired.<br />

Diagram 9: A military transport plane as seen by the thermal camera mounted on a surface-to-air missile. This plane<br />

can be easily downed. The black color shows the heat coming from the engine.<br />

[pg 31]<br />

The missile is equipped with a control and guidance system and a computer that handles digital images in real time<br />

(diagram 10). The camera is a passive sensor receptor, which means that it receives infrared radiation but does not<br />

send out any itself. The missile flies towards the target at a high speed. It revolves constantly to maintain stability<br />

while flying. Since the target is moving, the thermal image starts to move away from the center of the viewfinder<br />

indicating that the target has moved out of the missile's path. The control and guidance system corrects this<br />

automatically (diagram 11)


Diagram 10: Blueprint of a surface-to-air missile control system operating by infrared. The navigation system<br />

analyzes the digital images through a digital treatment unit. It controls the missile's wings so that the target is kept in<br />

the center of the viewfinder. This means that when the target is in the missile's path, it takes mere seconds to reach<br />

and destroy it.<br />

Diagram 11: The missile's control and guidance system analyzes the images and determines how far the target has<br />

moved out of the missile's path. It corrects this automatically by altering the direction of the missile's wings, thus<br />

pursuing the target and keeping it constantly in the center of the image.<br />

Left image: The plane appears in the center of the missile's thermal camera.<br />

Right image: The plane has moved to the left. This change of position appears clearly in the center of the thermal<br />

camera.<br />

When a mujahid prepares to fire a missile, the target must be clearly seen and must be nearly at the center of the<br />

viewfinder. When targeting a supersonic fighter aircraft, the target must be flying at an altitude lower than 3,000<br />

meters and must be approaching, not moving away, because the missile cannot catch up with a plane that is flying at<br />

a speed greater than 250 m/s (900 km/hr).<br />

[pg 32]<br />

Additionally the plane must be within the effective range, meaning that it should not be farther than 4,000 meters<br />

away. A plane might pass sideways without the mujahid being able to down it because its speed is the major factor<br />

in his inability to hit it. Transport and cargo military planes and helicopters are slow enough to be hit when they are<br />

within the effective range regardless of whether they are approaching or moving away. Their speed is relatively slow<br />

compared with the missile's speed that might reach twice the speed of sound. Hence the effective range is found<br />

within a circle with a radius of 4,000 meters (diagram 8)<br />

Although the missile might be able to fly twice the distance of the effective range, it is fired only if the target is<br />

within this range. There are two basic reasons: The missile's ability to follow the target depends on its sensing a<br />

sufficient quantity of its engine heat. This means that the target must appear clearly in the missile's viewfinder prior<br />

to the firing. The second reason is that after it is fired, the missile will fly an additional distance during which the


target will try to evade the missile. In most cases the missile's solid fuel is sufficient to cover a distance of 8,000-<br />

10,000 meters.<br />

4. Countermeasures<br />

When a helicopter releases very hot flares (diagram 12), it can escape from an infrared-guided missile. Nevertheless<br />

some types of missile can overcome such evasive action.<br />

Diagram 12: A Cobra assault helicopter releases very hot flares to try to deceive and keep away surface-to-air and<br />

air-to-air missiles that follow the heat source (right).<br />

A military transport plane tries to evade a thermal-guided missile (left).<br />

[pg 33]<br />

The red square shows the helicopter's location and the red circle shows the heat coming from the engine. We can see<br />

that the flares produce an amount of heat greater than the plane's engine (diagram 13). These pictures are in reverse<br />

color (black hot).<br />

Diagram 13: This is how the missile's camera sees the Blackhawk helicopter in diagram 9 (right) and military cargo<br />

plane (left). Such evasive measures can be counteracted by using missiles that have ultraviolet sensors in addition to<br />

infrared sensors.<br />

Russia manufactures shoulder-borne air defense systems (MANPADS) that can overcome the target's evasive<br />

measures. The 9M32 (Sam 7) series was updated into an improved version known as 9M34 Strella-3 (SA-14<br />

Gremlin). This was later replaced by the IGLA 9K38 or SA-18 Grouse and 9K310 IGLA or SA-16 Gimlet. The<br />

IGLA series is provided with a heat-searching device that is cooled with bicolor nitrogen. The missile has a 2-kg<br />

warhead that includes 390 grams of TNT. It possesses a high resistance to flares and can distinguish the real target<br />

from among the false ones. This is done through the use of additional ultraviolet sensors. The IGLA is technically<br />

equivalent to the US-built Stinger missile FGIM-92 (Table 1).<br />

The following picture (diagram 14) shows the newest system that aircraft use to escape an infrared-guided missile<br />

moving toward them. When a radar-guided or thermal sensor-guided missile is detected moving toward the plane,<br />

the plane operates a laser-based jamming system. This system locates the missile's position and directs toward it a<br />

high-intensity laser beam that disables its thermal camera by forcing it to absorb high quantities of energy. If this<br />

operation works, the missile loses visibility and destroys itself automatically after it loses the target.


All the above measures do not have a high rate of effectiveness, especially when defending against short-range<br />

missiles because the time period between firing the missile and its hitting the target is less than five seconds in most<br />

cases. This does not give the pilot any time to adopt evasive measures. Furthermore modern missiles like SA-16<br />

have a system that counteracts the evasive measures. All these new technologies reduce the likelihood that the<br />

missile will hit the target by no more than 6% to 18%.<br />

[pg 34]<br />

Diagram 14: The newest countermeasure that aircraft use to evade infrared-guided surface-to-air missiles. After the<br />

missile approaching the target is detected, a laser device directs a high-energy beam to make the missile's thermal<br />

camera absorb a lot of energy, thus disabling it and sending the missile away from the target.<br />

Table 1: Comparison of four infrared surface-to-air missile systems<br />

United States:<br />

"Name of missile:<br />

"Stinger FIM-92C (US)<br />

"(series A,B,C,D,E,F)<br />

"Specifications:<br />

"Length: 1.5 meters<br />

"Farthest effective range: 4.8 km<br />

"Shortest range: 200 meters<br />

"Lowest altitude: ground level<br />

"Thermal sensors: infrared, ultraviolet<br />

"Highest altitude: 3,800 meters<br />

"Greatest speed: 700 m/s (Mach 2.2)<br />

"Explosive charge: 3.0 kg<br />

"Russia (former USSR)<br />

"Name of Missile:<br />

"SA-16 Gimlet (IGLA-1)<br />

"SA-18 Grouse (IGLA)<br />

"Specifications:<br />

"Length: 1.7 meters<br />

"Farthest effective range: 5.0 km<br />

"Shortest range: 500 meters<br />

"Lowest altitude: 10 meters<br />

"Thermal sensors: infrared, ultraviolet<br />

"Highest altitude: 3,500 meters<br />

"Greatest speed: 600 m/s (Mach 1.8)<br />

"Explosive charge: 2.0-3.0 kg<br />

"Russia (former USSR)<br />

"Name of Missile:<br />

"SA-14 Gremlin (Strella 3 9K34) (IGLA)<br />

"Specifications:


"Length: 1.5 meters<br />

"Farthest effective range: 4.1 km<br />

"Shortest range: 500 meters<br />

"Lowest altitude: 50 meters<br />

"Thermal sensors: infrared<br />

"Highest altitude: 3,000 meters<br />

"Greatest speed: 470 m/s (Mach 1.2)<br />

"Explosive charge: 2.0 kg<br />

"Pakistan<br />

"Name of missile: ANSA MK I, II, III<br />

"Specifications:<br />

"Length: 1.44 meters<br />

"Farthest effective range: 4.2-15 km<br />

"Shortest range: 500 meters<br />

"Lowest altitude: 50 meters<br />

"Thermal sensors: infrared<br />

"Highest altitude: 2,300 meters<br />

"Greatest speed: 500 m/s (Mach 1.47)<br />

"Explosive charge: 1.0 kg (HE)<br />

[pg 35]<br />

Diagram 15: Top: Russian-made IGLA 9M39 missile and launcher 9K38, SA-18 Grouse. Below: Russian-made<br />

IGLA-1 9M313 with launcher 9K310, SA-16 Gimlet. It is a smaller version of the SA-18.


Diagram 16: Soldier preparing to fire a surface-to-air SA-18 Grouse missile<br />

[pg 36]<br />

5. Conclusion<br />

A report by Western intelligence agencies states that 500,000 surface-to-air missiles are spread throughout the world<br />

and it is impossible to control their transfer from one country to another. According to statistics about their uses,<br />

Western sources have reported that the Afghan mujahidin downed 269 planes during the Russian occupation by<br />

firing 340 shoulder-borne surface-to-air missiles. Despite the small numbers mentioned by these statistics, they give<br />

a clear indication that these weapons are effective.<br />

During the first Gulf war, or what was known as Desert Shield, Iraqi infrared-guided missiles hit their targets 80<br />

percent of the time, including fatal strikes 56 percent of the time. According to intelligence reports these missiles<br />

proved highly effective in downing civilian [as received] planes with a 70% success rate, causing fatal crashes.<br />

"In the foregoing study we identified shoulder-borne surface-to-air missiles, the way they operate, and how to use<br />

them effectively both against supersonic fighter aircraft, helicopters, and slow-moving military transport and cargo<br />

planes. We discussed the newest technology that planes use to evade approaching missiles by using<br />

countermeasures. We illustrated the effectiveness of these countermeasures against modern smart missiles that use<br />

thermal photography and ultraviolet sensors to neutralize the countermeasures that the target planes use and how<br />

they can distinguish between a real and false target.<br />

We would like to remind our dear readers that the mujahidin have demonstrated their skill in using these weapons in<br />

a noticeable fashion. The use of these weapons is causing huge losses to the US occupation forces in Iraq and<br />

Afghanistan. A missile carried on the shoulder by a mujahid can down a helicopter that costs more than $10 million<br />

or a fighter aircraft costing tens of millions of dollars, not counting the human losses represented by the soldiers who<br />

are killed in the operation.<br />

Important terms


[pg 37]


[pg 38]


Video Series - Question and Answer (Part Two)<br />

by Mujahid I'lami<br />

In this article we will do the following, God<br />

willing:<br />

1. Add some terms to the previous<br />

article to complete the glossary.<br />

2. I will talk about the sampling rate<br />

and horizontal size.<br />

3. The vertical sampling rate and<br />

vertical size will be the same as<br />

before.<br />

4. Some troublesome technical<br />

information about the types of<br />

reception programs and the<br />

general differences among them<br />

will be explained.<br />

1. New Terms<br />

Let us begin by reminding ourselves of certain points:<br />

A television signal, as we said previously, consists of dual lines (that will compose the dual field) and single lines<br />

(that will compose the single field). These lines are called sweep lines.<br />

As we noticed in a previous picture (I will illustrate it again here) the electron beam travels from the left side of the<br />

screen to the right side to draw a sweep line and then returns to the left side to draw a new line. This return is called<br />

horizontal retrace.<br />

[pg 39]


As we mentioned previously, the fields are shown by a frequency of 50 fields per second (PAL) and 59.94 fields per<br />

second (NTSC).<br />

The fields are separated from each other by what are called 'vertical blanking interval' lines and are written as VBI<br />

lines for short. They do not show on the screen. They have a function, but that does not interest us here.<br />

So why do we mention them if their function is unimportant?<br />

We mention them because these lines do not carry any data about the picture but they do carry other already known<br />

data (for the sake of synchronicity and other purposes).<br />

What do these words mean? Whether they carry known or unknown data, how does this interest me?<br />

It interests us to know that we do not need to save any data about these lines when we receive visual television data<br />

because their data are already known. What happens is that the reception device or capture card ignores these lines,<br />

thus reducing the size of the received visual data. When we operate the visual material, the operating device forms<br />

these lines by itself because it already knows their content as we said before.<br />

Hence there are lines on the screen that carry picture data and others that do not. Let us call the lines that carry data<br />

active lines.<br />

This method of showing the picture on the screen, in the presence of fields, is called interlacing. All non-digital<br />

television signals use this method.<br />

[pg 40]<br />

Before we continue, I would like to state that in the next passage you will see some numbers. They do not interest us<br />

as much as the general idea interests us.<br />

A PAL signal line takes 64 microseconds to be drawn from the left side of the screen to the right side. This line<br />

carries data about the picture but not throughout its entire course. Of the 64 microseconds around 52 carry picture<br />

data. The remainder of the line carries (like VBI lines for example) already known data that are used for<br />

synchronization. Space is reserved for these data since we know beforehand what they contain.<br />

As we previously said, every two successive fields will form a picture (or frame). The PAL system shows 25 frames<br />

a second and 625 lines. The NTSC system shows 30 frames a second and 525 lines, keeping in mind that the<br />

essential difference between the two systems is the color encoding method. If you introduce an NTSC signal into a<br />

PAL television set, the picture will be black and white because there is no color identification agreement between<br />

both systems. This does not today pose a problem because modern television sets are multi-system and can identify<br />

all color encoding methods.<br />

Now we come to a piece of information that might surprise you: on a television screen there is no such thing as a<br />

pixel, only lines. Why?<br />

A pixel is a characteristic of the digital signal. A television signal is non-digital and consequently we cannot say that<br />

the screen's accuracy will be (so much x so much) as in the case of a computer screen. When we describe a<br />

television screen, we say that it is either PAL (containing 625 lines) or NTSC (containing 525 lines). It takes 64<br />

microseconds to complete the drawing of each of these lines.<br />

2. Horizontal Sampling Rate<br />

We will now move on to something completely new, namely, the sampling rate and size.<br />

As we said when we identified reception, the receiver's function is to transform a non-digital signal into a digital<br />

signal (so that the computer will understand it). How does the receiver carry out this function? It carries it out by a<br />

process called signal sampling. To understand what this means let us remember that a non-digital signal (such as a


adio signal) is drawn as high and low waves. A computer does not understand these signals. It understands the 0<br />

and 1 language. How can we transform this signal into zeros and ones?<br />

This is done by specifying a very short period of time, let us say for example 1 millisecond. Every millisecond the<br />

receiver measures the intensity of the continuous signal and records it. It takes a sample of the signal and records its<br />

intensity every millisecond.<br />

[pg 41]<br />

The rate of taking samples is 1,000 times per second. This 1,000 times per second is called the sampling rate. The<br />

following picture explains what I mean.<br />

On the left there is a continuous signal. Specific periods of time are set to take signal samples to test the signal's<br />

intensity. Afterward these measurements become interrupted numbers that are turned into zeros and ones (binary<br />

system) that the computer understands. So, the continuous signal is simply transformed into an interrupted digital<br />

signal that the computer can understand. The transformation passes through three stages: sampling, quantifying,<br />

encoding.<br />

I just gave an example of taking a sample every millisecond, which gave us a sampling rate of 1,000 times per<br />

second (that is, 1,000 Hz). The actual sampling is measured 1,000,000 times per second, that is, it is measured in<br />

MHz.<br />

You are very lucky that you do not involve yourself in all these problems. All you do is tune the VirtualVCR<br />

(reception program) to the picture size, let us say 576 x 704, and you leave it to the receiving device or capture card<br />

to do the following:<br />

• First the receiver will take samples at a high frequency to ensure the greatest accuracy.<br />

• The receiver will then delete the VBI lines about which we spoke earlier.<br />

• It will then delete the empty horizontal lines that do not carry data. It will leave 52 microseconds from<br />

every line, which is the part that carries the picture data.<br />

• After that it will use the samples that it took from this remaining part and distribute them to the horizontal<br />

pixels.<br />

[pg 42]<br />

• Of course the receiver will not forget to merge the two fields so that in the end it will present a picture with<br />

just the level of accuracy you requested, that is, 576 x 704. It will present this ready picture to the<br />

VirtualVCR program to do with it as it likes.


• This, simply, is the function of the capture card. It continues carrying out this function until the film you<br />

want is completed and is ready in a digital form and in the size that you asked. You can then use the<br />

VirtualVCR program to alter or handle it as you wish.<br />

Let us now perform some quick calculations of what we did.<br />

We distributed 52 microseconds of the television signal among 704 pixels, that is, 704 acts of reception (one for<br />

every pixel) in 52 microseconds. If we divide them, we will find that the sampling rate is 704/52=13.54 MHz. This<br />

is the real sampling rate if you request a 576x704 size. You will notice that the sampling rate will differ in<br />

accordance with the size you requested. The bigger the size, the higher the sampling rate.<br />

3. Vertical Sampling Rate<br />

All continuous non-digital television signals are produced by 576 active lines in the PAL system or 480 active lines<br />

in the NTSC system. As we said before, the receiver turns the lines into pixels one by one (it is as if it divides the<br />

lines into equal parts consisting of the pixels that are closely packed, one next to the other in a horizontal line). This<br />

is done horizontally.<br />

It is much easier vertically because there is nothing to divide as the lines move horizontally. The lines themselves<br />

are packed on top of each other and each one may be regarded as one pixel.<br />

Consequently you do not have a big choice in a screen's vertical size. You have two solutions (in the PAL system for<br />

example). You can either choose a vertical size of 576 pixels (the number of the lines) or half of them (288 pixels).<br />

Any other vertical size that you try to choose will distort the picture. This means that you can control the picture's<br />

horizontal size as you wish and by this choice, you will specify the sampling rate to the receiver. You cannot,<br />

however, alter the vertical size as you wish. You must choose one of two options, either 576 or 288 pixels (in the<br />

PAL) system.<br />

[pg 43]<br />

4. A Quick Glance at Receiver Programs<br />

Before we begin the practical application of video reception with VirtualDub or VirtualVCR, we need to answer the<br />

following question:<br />

Someone might say: 'I can see that there are many video reception programs, including VirtualDubMod, VirtualDub,<br />

iuVCR, VirtualVCR, FLYDS, AVIO, and others. Which one should I use?'<br />

Actually you can try all of them and choose what you like and tell us what you think. There are, however, some<br />

points to keep in mind that might save you time.<br />

• There are two types of receiver device drivers: One supports the VfW model. It is short for Video for<br />

Windows. The other supports WDM, which is short for Windows Driver Model. Based on this, receiver<br />

programs come in two classes:<br />

o<br />

o<br />

The first class supports WDM and includes iuVCR, VirtualVCR, and FLYDS.<br />

The second class supports VfW and includes VirtualDubMod, VirtualDub, and AVIO.<br />

• We conclude therefore that the receiver program that you will use depends on the type of device driver that<br />

you have. If it supports VfW, then you are using programs like VirtualDub, VirtualDubMod, AVIO. If it<br />

supports WDM, you are using programs like iuVCR, Virtual VCR.<br />

• The users of either type should not worry because we will, God willing, explain the reception method of the<br />

programs VirtualDub (that supports VfW) and VirtualVCR that supports (WDM).<br />

All right, before you continue, would you like to explain to us the terms VfW and WDM? You have not mentioned<br />

them before.


All right, we will give some general information about VfW and WDM. Some brothers, however, might find this<br />

information too technical and are not interested in it. If they find it too technical, let them ignore it and move on to<br />

what comes after.<br />

General Information About VfW and WDM :(troublesome information that I advise you to ignore completely)<br />

- The VfW is an old program that is not currently developed. Because of its narrow parameters Microsoft has<br />

developed a new device driver, which is WDM (this began with Windows 2000).<br />

- Most video card device drivers are now developed to use WDM.<br />

[pg 44]<br />

- There are programs that can convert VfW to WDM. They are called wrappers. They allow you to receive<br />

video signals by using a program that supports VfW (such as VirtualDub) although your receiver card<br />

supports WDM. You will need a fast decoder when using the wrapper because it will put a big load on the<br />

decoder.<br />

- The VfW is still supported by Windows 98, Windows 200, Windows NT, and Windows XP. The problem<br />

mostly lies in the capture card device driver. New video cards do not possess VfW drivers. Only<br />

Hauppauge possesses a device driver that supports VfW for the sake W2K and XP.<br />

- The VfW does not have a TvTuner. WDM has it.<br />

- If you upload the DirectX 9.0b, and you have PAL and W2K/XP, make sure that you upload the patch with<br />

it. Otherwise your television will stop working.<br />

I did not understand anything!<br />

All right, here is some more.<br />

Some Information about bt8x8 driver:<br />

Device driver for video cards that support WDM for bt8x8 chips:<br />

1. btwincap program: You might have some problems in loading and using. The audio will sound as if it is<br />

mono (that is, coming identically from both speakers so that you do not sense the depth of the sound). The<br />

btwincap is totally compatible with the wrapper, so you can use btwincap VirtualDub combo.<br />

2. The iulab tweaked WDM driver: This cannot be used with VirtualDub because it is not compatible with the<br />

wrapper.<br />

Notes:<br />

• Hauppauge driver programs support WDM and WfW and are supposed to work with Windows 98,<br />

Windows 2000, Windows NT, and Windows XP but they will not allow you full reception.<br />

• bt8x8 chips: This is a decoder that captures the pictures from compatible non-digital (analog) sources like a<br />

television set or a non-digital receiver and converts them immediately into digital form without needing to<br />

wait. All video capture devices that are called (video in) use this type of decoders. There are two wellknown<br />

types (I do not remember their numbers now) but one of them supports FM reception and can only<br />

be used with Windows XP. The other supports Win98.<br />

[pg 45]<br />

Believe me, I have not understood anything and I cannot understand why you are telling me all this!<br />

I know that you find this information strange and some terms do not appear compatible with the general context.<br />

However, when we proceed further in video technology, you will appreciate its value and we will add more<br />

information, God willing. At any rate, I would like to give you the glad news that the bothersome technical<br />

information is finished, thank God.<br />

5. Conclusion


We explained in this article and the previous article the theoretical basis that we will need to understand future<br />

stages in this series. As of the next issue this article will be full of practical applications that will rely on the<br />

explanation I have given.<br />

Important Terms


[pg 46]<br />

Translating Movies with Subtitles<br />

By Abu-al-Hasan al-Maghribi<br />

Subtitles serve to translate movies into any<br />

language without recourse to video editing<br />

programs. They consist of a small file that<br />

contains the text of the translation and<br />

synchronous data that is placed next to the basic<br />

movie file and carries the same name but with a<br />

different extension. When the user starts the<br />

movie, the operating program shows the<br />

translation automatically from the small file.<br />

1. Stages of Creating Subtitles<br />

The creation of subtitles usually passes through<br />

two chief stages.<br />

• Stage One: Converting the words spoken<br />

in the movie into a text written in the<br />

required language.<br />

• Stage Two: Dividing this text, in<br />

accordance with the context and period, into small parts that are synchronized with the contents of the<br />

movie (that is, controlling the appearance of each piece of text and the time when it should disappear).<br />

Stage One and the division part of Stage Two are done manually but the synchronizing of intervals can be done by<br />

using an auxiliary program like Subtitle Workshop.<br />

Link of the tutorial:<br />

http://www.urusoft.net/downloads/subtitleworkshop251.zip<br />

1.1 Method of Synchronizing the Intervals by Using Subtitle Workshop<br />

After you open the program, you will need to create a new translation file (from the File menu choose 'Open New<br />

File'). You must then specify which movie you want to work on. From the Movie menu choose 'Open.'<br />

The next picture shows the program screen during the synchronization of the text intervals for the movie 'Abu-al-<br />

Zubayr al-Maghribi.'


Downloading and synchronizing can be done by several methods according to choice. The following is an example<br />

of one of these methods:<br />

1. Download the movie as a text file.<br />

2. Divide the text into small portions. Preferably this should be done while watching the movie.<br />

3. Go to the program screen and play the movie.<br />

4. Keep your finger near the Insert button on the key panel and whenever you hear the first word of every<br />

divided portion, push the Insert button. (This step adds a new portion that is synchronous with the<br />

beginning of the scene.)<br />

5. After completing step 4, you will find that you have the same number of intervals as the number of portions<br />

in the text file. Start at the beginning (from portion 1) and transfer each portion from the text file to the<br />

program in turn.<br />

6. You need to ensure that the ending of every text portion is synchronized with the ending of the interval.<br />

This is done as follows:<br />

a. Make sure that the down arrow is not highlighted so that it will not move to the next interval<br />

automatically.<br />

[pg 48]<br />

b. Activate portion 1.<br />

c. Play the movie.<br />

d. When you hear the last word of the first interval, push the right arrow.


e. You will notice that the program has moved the highlight to the next interval.<br />

f. Whenever you hear the last word of each text portion, push the insert button.<br />

7. Play the movie again through the program and make sure that the synchronization was done right.<br />

After you finish synchronizing the translation, choose save from the menu and you will see the following screen.<br />

Push the SubRip button twice and save the file. Give it a name similar to the movie's title.<br />

This is the result after the completion of transcribing and synchronizing the texts and saving the file.<br />

[pg 49]<br />

If you finish preparing the subtitles for the first language and ensure correct synchronization, you can then open the<br />

text file by using the Diary File and translating each line into the language that you want without touching the<br />

numbers at the beginning of each line or above it.


Problems and solutions:<br />

Diagram showing a part of the subtitle file after opening it in a text editor.<br />

The translation does not appear on the screen although the translation file is found next to the movie file and carries<br />

the same name: This problem is caused by the absence of the add-on pertaining to showing the translation in the<br />

user's computer. This problem can be solved by inserting the add-on called DirectVobSub.<br />

The add-on pertaining to the translation is already in the computer but the translation still does not show when using<br />

rm or rmvb files: The solution is to save the translation file using RealTime instead of SubRip.<br />

2. Conclusion<br />

In this article we explained the method of doing a professional translation of jihadist films so that the subtitles<br />

appear at the bottom of the screen exactly as television channels do. This feature helps to propagate jihadist films<br />

widely and in various languages.<br />

Important terms


[pg 50]<br />

'The Mujahidin Secrets Program: A View From Within'<br />

by the Security Department of the Global Islamic Media Front<br />

The mujahidin's secret program is the first<br />

Islamic encoding program for secure<br />

messaging via the Internet. The program<br />

was devised by the Global Islamic Media<br />

Front's (GIMF) Technical Security Unit.<br />

This program enables the exchange of<br />

messages in a secure way because foreign<br />

programs for exchanging secure<br />

information are unreliable. It is unwise to<br />

use them to protect the mujahidin's secrets.<br />

After security gaps and numerous strong<br />

suspicions surfaced about PGP, the most<br />

famous program that ensures secret<br />

communications over the web, the GIMF<br />

produced its own program that guarantees<br />

communications with the highest possible<br />

level of secrecy, relying on the highest<br />

standards attained by the science of encoding and digital communications engineering. The mujahidin's secrets<br />

program was produced to ensure that the secrecy of messages is protected because it relies on an encoding system<br />

that the front produced. Those who developed it benefited from research done into algorithms that were subjected to<br />

deep analysis by senior scientists and encoding experts.<br />

The art of encoding is treated as an electronic weapon, as indeed it is, because it is the basis of ensuring secure<br />

communications and guarantees the confidentiality of the mujahidin's secrets. Nothing is more dangerous than for a<br />

person to rely on a foreign program to protect his secrets and ensure that his communications are secure. Perhaps he<br />

will discover only after it is too late that the enemy has infiltrated all his communications. Umar Bin-al-Khattab,<br />

may his soul find favor with God, said: 'I will not allow myself to be deceived.' The primary security precaution is to<br />

protect your communications with reliable programs.<br />

The mujahidin's secrets program resembles PGP in its objectives but has new features and a high level of secrecy.<br />

The mujahidin's secrets program has two versions: The People of the Frontlines [ahl al-thughur] version and the<br />

Ansar al-Jihad version.<br />

1. Encryption and Communication via the Networks:<br />

Encryption is a method to protect your communication and information against intruders and spies, and is divided<br />

into two sections: The first type is symmetric encryption, which uses a single key to encrypt and decrypt (the<br />

password), and protects information on the computers so that you do not need to copy the key or the password.<br />

Among the most famous algorithms are (Rijndael, Mars, RC6, Serpent, and Twofish). This type of encryption<br />

should not be used to transmit encrypted information via the networks as it cannot transmit the key or the password.<br />

Another type of encryption emerged, and that is known as asymmetrical encryption. It relies on two keys: a public<br />

key, for the encryption operation, and a private key used to decrypt. Among the most famous of such algorithms are<br />

RSA and ALG.<br />

[pg 51]<br />

The latter is attributed to the creator of the algorithms Dr. Tahir al-Jamal. This encryption is based on the discrete<br />

algorithm. The advantage of symmetrical encryption is that it is exceedingly fast, while the asymmetrical<br />

encryption is slow especially in decryption. This is why the communication via networks programs such as the<br />

Mujahidin's Secrets program use both types so that symmetrical encryption can be used to protect the information


and asymmetrical encryption can be used to protect the symmetrical encryption key. To compare the strength of the<br />

keys with respect to the types of encryption, it is enough to note that a key 256 bits long in a symmetrical algorithm<br />

corresponds to a 15360 bit long asymmetrical algorithm key such as RSA.<br />

With respect to communication networks, email is considered one of the most important modern methods to<br />

exchange messages, be they encrypted or not. In order to safeguard the person communicating, the following<br />

conditions must be adhered to in dealing with email used for secret issues:<br />

1. Do not use American email (Yahoo, Hotmail, etc).<br />

2. Never use your regular personal email, but set up an email specifically for the exchange of sensitive<br />

messages.<br />

3. When registering an email address for private matters, never enter accurate information. Instead, give<br />

fictitious information (name, address, date of birth, gender, etc).<br />

4. Do not log into your private email directly from your machine. A proxy must be used to reach your private<br />

email so that even if your email is being monitored, the IP address that you use to check your email will be<br />

one far away from your location. That is because every IP address in the world is registered in global<br />

databases and knowing the [IP] number used by your computer is like knowing your address. The [IP]<br />

number leads to the internet service provider and the company leads those inquiring about you, to you.<br />

2. About E-mail encryption<br />

The following is a primer on how e-mail encryption works. This encryption is based on a Public Key cryptography<br />

algorithm that requires two keys, Public and Private. The Public key is used for encrypting the data while the<br />

Private key is used for the recipient to decrypt the encrypted message. The two keys work together in what is called<br />

key-ring. Both keys are required to complete the ring.<br />

2.1 Encryption Strength:<br />

One of the main features of a strong encryption is the key length in bits. In Symmetric encryption, some countries<br />

allow only 128 bits encryption. The Unites States and Canada allow up to 256 bit encryption which is very<br />

uncommon. In Asymmetric encryption, serious information security requires a key of at least 1024 bit in length.<br />

Until now, messages encrypted with long keys are impossible to crack. A 1024 bit long RSA key, which is a key<br />

based on 309 long decimal numbers, are up to now impossible to crack based on the most recent research in<br />

computer science and prime numbers.<br />

[pg 52]<br />

A 512 bit long key required five months of continuous parallel processing of 292 powerful computers in 2000. A<br />

2048 bit key is billions of times stronger than 1024 bit key. The strength of the key also depends on an authentic<br />

key generation; this is why using foreign made software programs for key generation is very risky. Foreign<br />

companies that create programs for encryption key generation can access the private key using the public key.<br />

2.2 Public Key:<br />

After generating a public key and a private key, and protecting the private key with a "Passphrase" which we will<br />

explain later, you then need to publish the public key in a public area such as the forums, Internet websites, or<br />

servers especially provided for this purpose. Anyone interested in sending you an encrypted message is then able to<br />

simply take your public key to encrypt and send you the message. The message cannot be decrypted without the<br />

private key which is secret and only you have it. This means that you must first send your public key to any person<br />

wanting to send you an important message.<br />

2.3 Private Key


The private key is used to decrypt messages encrypted with a public key. You must protect this key in a secure<br />

location. Make copies of both the private and public key (Key-ring) and store them in a safe place, because if you<br />

lose these keys you will have no other way of recovering the encrypted data and messages. You should also<br />

generate other keys for future use.<br />

3. Mujahidin Secrets Program<br />

The program Mujahidin Secrets offers absolutely the highest encryption level in asymmetrical encryption for<br />

exchanging messages and all sorts of files over networks. It is the first Islamicly produced program to provide this<br />

kind of encryption: 256-bit symmetric encryption and highly secret 2048-bit key asymmetric encryption. The<br />

program incorporates the highest pre-encryption data compression levels for size reduction. It uses a new technology<br />

called "stealthy encryption" that enables the program to randomly change the encryption algorithm every time a file<br />

is encrypted and to produce a random session key that changes each time, thus making it possible to thwart attempts<br />

to analyze encrypted files, since each file is encrypted with a different algorithm from the list of five algorithms that<br />

the program uses. Mujahidin Secrets uses the five algorithms chosen by encryption experts in the AES algorithm<br />

selection filters. All of them have keys of 256 bits.<br />

[pg 53]<br />

Asymmetric encryption technology allows public keys to be transmitted across the network. Public keys can be<br />

posted in jihadist forums. The key's fingerprint can be used to verify the identity of the communicating party. The<br />

public key can be used to encrypt files before sending them. The keys used are themselves encrypted and cannot be<br />

used or analyzed by other programs.<br />

Diagram 1: The main page of the Mujahidin Secrets program produced by the Technical Security Unit of the GIMF


4. Features of the program<br />

• Encryption using the five best cryptographic algorithms (AES finalist algorithms)<br />

• 256-bit symmetric encryption keys (Ultra Strong Symmetric Encryption)<br />

• 2048-bit asymmetric RSA encryption keys (public and private key pair)<br />

• Incorporated data compression (highest compression levels, Zlib compression)<br />

• Variable keys and algorithms by stealthy encryption technology (Stealthy Cipher)<br />

• Auto-detection of encryption algorithm upon decryption (Cipher Auto-detection)<br />

[pg 54]<br />

• Secure file deletion technology, so that files can be deleted without possibility of recovery (Files Shredder)<br />

• Program consists of a single file needing no installation and operable from flash memory<br />

5. Keys Management<br />

When the program is started for the first time, the key database will be empty. Click on the button "Keys Manager,"<br />

and you will get the following window:<br />

Diagram 2: Encryption key management window<br />

Click on the button "Generate Keys," and you will get the following window:


Diagram 3: New Key Pair Generator window<br />

[pg 55]<br />

Fill in the fields for "Username," "Passphrase," and "Confirm Passphrase." Then click on the button "Generate<br />

Now." If your computer supports Arabic, you can use Arabic in defining the username and passphrase. Click on the<br />

writing direction buttons to select the language script (Arabic / Roman). Generation of a 2048-bit key may take<br />

between two and five minutes on a computer operating at 2.4 gigahertz (2.4 billion cycles a second).<br />

At the time of key production, the program is frozen and exploits the microprocessor at 100%. After the key pair has<br />

been generated, you can close the window. The information in "Status" will show you the amount of time that key<br />

generation has taken. After the operation is finished, there will be two new files with the format<br />

publicXXXXXXXX.akf and privateYYYYYYYY.akf, where the number XXXXXXXX represents the Key ID of<br />

the public key, and YYYYYYYY represents the Key ID of the private key. The two are saved in the same folder as<br />

the program. The two keys should be copied and moved to a secure place (e.g., a compact disk or flash memory) as<br />

a kind of reserve copy, since encrypted information cannot be retrieved by the public key without the private key.<br />

After generating the keys, you can activate them by importing them into the database of active keys. Click on the<br />

button "Import Key." You will get the following window.<br />

Diagram 4: Public and Private Key import window


Import the two keys (public and private) one after the other. When importing the private key, the program will ask<br />

you for the passphrase, because every private key is encrypted with its own passphrase. After incorporating a<br />

number of keys, the Keys Manager window will have the following appearance:<br />

[pg 56]<br />

Diagram 5: The Key Management window after importing some keys<br />

Public keys will appear in blue with a blue key icon ; private keys will appear in pink, indicated by a blue and red<br />

icon of two keys . The blue key stands for the public key; the red stands for the private key. The currently selected<br />

key will appear in yellow. Keys that are imported become active in the database located in the file AsrarKeys.db.<br />

The keys can be dispensed with after their incorporation into the database, but they must be kept in a secure place as<br />

a reserve copy.<br />

To delete a key from the database (the list of active keys), select the particular key, then click on the button<br />

"Remove Key." The key will be deleted from the database, but the original copy from which the key was imported<br />

will remain. When a public key is selected, a copy of it can be exported by clicking on the button "Export Public<br />

Key." 2048-bit keys are secure for a period of more than ten years. However, one cannot even talk about the<br />

maximum period of validity of the program's current keys, because the keys are compressed and encrypted to<br />

prevent any usage of them in other programs. Following is an example of the file of a 2048-bit key encrypted.<br />

If you get a public key in text format at a forum, you can copy the content, save it in a file with the extension ".akf,"<br />

and then use the Keys Manager in the program to incorporate it into the database of keys by means of "Import Key."<br />

[pg 57]


Upon selecting a private key, you can export a new copy of it or export the public key associated with it, because the<br />

private key contains both keys together (a key pair). If you import your private key, there is no need to import your<br />

public key also, as the public part of it is used to encrypt and the private part is used to decrypt. At the same time,<br />

only the public keys are visible to the parties with whom you correspond. You can change the passphrase that<br />

protects your private key and also protects the key pair file by means of "Change Passphrase."<br />

When you click on the Change Passphrase button for a private key, you will see the following window. You enter<br />

the current passphrase and the new passphrase, along with confirming the new passphrase. Then you click on<br />

"Apply Change," and close the window to return to the Keys Manager window.<br />

Diagram 6: How to change the password that protects the private key<br />

After changing the passphrase, do not forget to export and save a new copy of it, using "Export Private Key." The<br />

old file will be replaced by the new one after the program asks you to confirm the replacement.<br />

Diagram 7: When importing a key from the database, make sure it’s on the disk before deleting it<br />

To get information about a particular key, double click on it. If you have requested information about a public key,<br />

you will see the following windo where the picture shows that the information is about a public key and displays the<br />

fingerprint of a single key.<br />

[pg 58]


Diagram 8: Public key information<br />

You can now copy the key information by clicking on the "Copy" button and paste the information into the place<br />

you wish. This information must be published along with your key. The key's digital fingerprint is what verifies that<br />

you are the owner of a particular key. However, you must communicate this information to the party with whom you<br />

wish to correspond by several routes, so that this party can verify that you are the owner of a particular key. To<br />

compare a digital fingerprint you have obtained with the digital fingerprint currently in the Keys Manager, use the<br />

Compare Fingerprints window by clicking on the button . Copy the fingerprint and paste it into the field FPb.<br />

Diagram 9: Comparing the digital fingerprint of the keys<br />

You can also save the key information in the form of a text file by clicking on the button "Save as” (Diagram 8).<br />

If you have asked for information about a private key, you will see the following window. The picture shows that<br />

the information is about a private key and shows the picture of a key pair (private and public). Look at the following<br />

illustration:<br />

[pg 59]


Diagram 10: Information about the private key<br />

5. Secure File Deletion -- File Shredder<br />

Because the files with which you work have a private character and require complete secrecy in dealing with them,<br />

the program provides a feature for secure deletion of files with which you deal that are located on the computer's<br />

hard disk or on portable memory. The file deletion feature that the computer's operating system uses is not secure:<br />

files that you have erased using "Delete" can be recovered by using special programs known as Files Recovery. This<br />

is due to the nature of the deletion process used by the operating system.<br />

The system does not really erase the files; it merely deletes their identification in the system in order to enable<br />

writing in their location on the disk in the future. This allows the files to be recovered in many cases. When you deal<br />

with secret files, you can take advantage of the secure deletion feature that the Mujahidin Secrets program provides.<br />

It actually shreds the file. This is done between four and ten times automatically.<br />

The following window shows you the File Shredder service. After you select the folder in which the files are<br />

located, the latter appear in the list of the current folder's files. Select the files you wish to shred by pressing the Ctrl<br />

key and clicking on each file. Then drag and drop them, using the mouse, into the basket of target files for<br />

shredding. You can also double click on each file to move it to the basket or double click on it inside the basket to<br />

withdraw it from shredding. To destroy all the files in a particular folder, click on the button "Select All." After you<br />

have finished selecting the folders, click on the button "Shred Files." The program will ask for a final verification of<br />

the shredding process, after which the files will be finally destroyed. To see a refreshed file list, click on the button<br />

"Refresh." To cancel the shredding of files, delete the file list in the basket by clicking on "Clear." You can see the<br />

files of a certain type in the current file list by using "Filter Extension," which displays the files ending with a<br />

particular extension. To display all files, use the extension *.* in the file filter. While the shredding operation is in<br />

progress, the bottom strip will show the shredding operation and the number of times the files are wiped out. You<br />

use “Options” to set the number of times of secure wiping out.<br />

[pg 60]<br />

The higher the number of times, the slower the operation, especially for large files, although you will not notice the<br />

difference for small files (under a megabyte).


Diagram 11: Secure File Shredder window<br />

7. Options<br />

7.1 Data Compression<br />

You can select compression ratios before encryption. High compression ratios require some time to process the data<br />

(a few extra seconds for compression) for large files (above 10 megabytes), while compression speed is greater for<br />

small files (less than 3 megabytes). Data compression is particularly important for text files (reports, messages,<br />

communiqués, etc.). Compression ratios can reach many times. Compression speed ranges between 10 and 100<br />

megabytes a second. The program provides four options: rapid compression, medium (normal) compression, high<br />

compression (slow), as well as offering the option of turning off compression.<br />

While it is recommended to use high compression in most cases, turning off compression is preferable in the case of<br />

large video files (above 50 megabytes), because compression yields only small ratios. This is because the nature of<br />

the files is compressed originally.<br />

[pg 61]<br />

The compression ratio ranges between 0% for already compressed files and 1,000% for text files and some types of<br />

picture, and it is sometimes much greater (See the bottom of diagram 1).<br />

7.2 File Shredder<br />

Here one can select the number of wipe-out times for a file so that it cannot be recovered. The available choices are<br />

4, 6, 8, and 10 times. When options are changed and saved by clicking on the "OK" button, a file named "asrar.ini"<br />

is created with the new settings. By clicking the "Cancel" button, the current changes are ignored. The following<br />

window clarifies these options.


Diagram 12: File Compression and Secure Shredding options<br />

8. Encrypt File Using Public Key<br />

Select the file you wish to encrypt ("Select File to Encrypt"). Then double click on the public key of the party with<br />

whom you wish to correspond. The selected key will appear in "Recipient User ID." Then click on the "Encrypt"<br />

button. When you double click on a key, its color will change from yellow to red, showing that it is the key that will<br />

be used in encrypting.<br />

[pg 62]<br />

Diagram 13: Main page showing the information’s high compression rate


If you select "Stealthy Cipher," the encryption algorithm will automatically be selected randomly. On the other<br />

hand, if you turn off the Stealthy Cipher feature, you can set the encryption cipher from one of the five available<br />

algorithms. If you wish to delete the original file permanently after completing the encryption process, select "Wipe<br />

Out Original File." If you select this service by mistake, there is a final chance to back out, because the program will<br />

ask you to confirm the deletion of the original file. After you click on the button "Encrypt," a window asking you to<br />

wait will appear. The operation takes place in three stages: compression, encryption, and finally saving the<br />

encrypted data. The encrypted file is given the same name as the original file, with the addition of the extension<br />

".enc," and is saved in the same folder as the original file. Encryption speed usually is in excess of 15 megabytes a<br />

second. After encrypting a file with the public key, it cannot be decrypted without the private key.<br />

Diagram 14: Compressing the information, then encrypting and finally saving it.<br />

[pg 63]<br />

At the conclusion of the process, a message will appear, telling you that the encryption process has been<br />

successfully completed.<br />

Diagram 15: Showing that the operation was completed successfully<br />

If you request that the original file be deleted automatically after encryption, the message will be the following.<br />

Diagram 16: The Key Management window after importing several keys and indicating that the original file was<br />

permanently deleted<br />

9. Decrypt File Using Private Key


When you receive a file encrypted with your public key that has been posted in the forums, for example, you can<br />

decrypt the file using your private key. Select the encrypted file ending in the extension ".enc." Select the private<br />

key (pub/priv) by double clicking on it, so that the key's color changes from yellow (the key's current color) to red.<br />

Then click on the "Decrypt" button. The program will ask for the passphrase for the private key: decryption is<br />

impossible without the passphrase because the private key has been encrypted using the passphrase. Because the<br />

strength of encryption depends on a 256-bit algorithm, a password of length adequate to the encryption strength<br />

must be used. The length of the passphrase will range preferably between 20 and 36 letters.<br />

[pg 64]<br />

Diagram 17: When decrypting a file, the program asks you for the password that protects the private key<br />

If the passphrase is below the minimum, you expose your private key to danger if it is stolen from your computer.<br />

The real danger to your keys is the same danger that threatens your computer: spy programs that enable their owners<br />

to penetrate your internet-connected computer and steal your files.<br />

Diagram 17 [as published]: The decrypting operation<br />

When you click on Decrypt and there is a file with the same name on your computer (in the same folder), the<br />

program will inform you of it and ask you to confirm the replacement of the file bearing the same name or cancel<br />

the operation. If you do not wish to replace the file, cancel the operation. Then change the name of the affected file<br />

and repeat the decryption. This is made clear in the following picture:<br />

[pg 65]


As decryption continues, the following message will ask longer than encryption and lasts a few extra seconds.<br />

Finally, you will receive a message showing that the decryption operation has been successful. If the encrypted file<br />

does not have the ".enc" extension, the resulting file will have the extension ".dec" to distinguish it from the<br />

encrypted file. To use it, remove the extension ".dec" by hand.<br />

10. Software Files<br />

After the program is run, the following additional files are created:<br />

1. A file AsrarKeys.db: an encrypted database containing the keys activated after importation into the<br />

program. This file is created automatically after installation. It is empty until keys are imported into it using<br />

"Keys Manager -> Import Key."<br />

2. A file asrar.ini: an options file created if you change the default settings. The new choices are saved in it. If<br />

you delete it, the program will use the default settings.<br />

[pg 66]<br />

3. The public key file (publicXXXXXXXX.akf) and the private key file (privateYYYYYYYY.akf). These<br />

two files are created after the generation of a new key pair. When the private key is imported into the<br />

program and the public key is posted, these keys become reserves. Your public key need not be imported<br />

into the program, because the private key contains a copy of the public key.


To increase the secrecy of the files, you can change the names of the keys and the program and put them into the<br />

operating system folder. It is recommended that you put them into a miniature password-protected portable memory<br />

that can be easily erased when necessary.<br />

11. Conclusion<br />

The Secrets of the Mujahidin program is a high tech encryption program, which is more sophisticated than the<br />

symmetric encryption programs used internationally. It provides a new feature called the phantom encryption, by<br />

using the best five algorithms in the science of symmetric encryption. The Secrets of the Mujahidin program has<br />

several features that make it the only secure encryption system for jihad usages. The program is composed of one<br />

file that does not require saving on the computer, and can be operated through the downloaded memory. It also has<br />

the feature of secure deletion of the original files "File shredder" or what is known as the final destroyer of original<br />

files, making them impossible to retrieve, and thus you are assured of the secrecy of your files, after their deletion,<br />

God willing.


[pg 67]<br />

A Call To Participate<br />

To everyone who reads the following words:<br />

Peace and God's mercy and blessings be upon you.<br />

How often have you thought of doing something to serve this religion and assist your mujahidin brothers in the<br />

media sphere?<br />

Do you think that merely going into a forum and reading the material there without making any extra effort yourself<br />

serves this religion? Brother, when will you move from the stage of merely receiving to the stage of contributing?<br />

Has not the time come for you to exploit your potential abilities and become an active member in the media war<br />

between the mujahidin and the crusader enemies of God?<br />

Dear mujahid brother, the Technical Mujahid magazine is giving you this opportunity. The knowledge that you<br />

possess is a trust that you hold and that you must convey to other mujahidin and forum visitors. Tens of thousands of<br />

mujahidin, their supporters, and Muslims in general will read this magazine on the web. When you contribute an<br />

article, you will garner a great reward from God.<br />

My brother, the technical mujahid: Half of our battle with the enemies of God who have occupied our lands in<br />

Palestine, Afghanistan, Iraq, Chechnya, and Somalia takes place on the media. It requires enlightening the Muslims<br />

about this Crusader war against the Muslims. The jihadist media have already made huge successes. The enemies,<br />

even before our friends, have admitted this.<br />

My brother, the technical mujahid: You can begin as of today to contribute your creative work and scientific articles<br />

that interest the mujahidin and their supporters who visit the websites. We will publish your articles in our magazine<br />

so that what you write will reach tens of thousands of readers, Muslim brothers like yourself, who urgently need this<br />

knowledge. We still remember the relevant call made by Shaykh Abu-Hamzah al-Muhajir, may God preserve him.<br />

Brother mujahid, have you not heard the Hadith of the prophet, may God's prayers and peace be upon him: 'When a<br />

person dies, all his work ends except for three things: arrangement for his money to continue to be used for charity,<br />

useful knowledge that he has left behind, and a pious son who will call down God's blessings on his soul.' Do you<br />

not like for your contribution here to benefit others after you are gone?<br />

[pg 68]<br />

Dear technical mujahid brother, you shoulder responsibility to the extent that you have knowledge. Do not think that<br />

even a small contribution is not valuable. Perhaps a brief article you write will benefit a mujahid struggling in the<br />

cause of God or protect a brother from harm. You will then get a great reward, God willing.<br />

The editorial staff will be very pleased to see your articles and creative work in the service of this great religion. The<br />

fields in which we expect articles are numerous and wide and not restricted to any particular technical subject. We<br />

can benefit from any technical contribution although in these early issues we are focusing on the security aspect of<br />

using the Internet because of its great importance for the mujahidin who struggle in the cause of God. For them it is<br />

a matter of life or death.<br />

Finally, we ask God to give us and you success in our endeavor to uphold this religion.<br />

Important Notes:<br />

1. Every article that is sent to us will be reviewed by a team of experts. After it is approved for publication, it will be<br />

checked for accuracy and then published.<br />

2. The magazine will be interested in every article that reflects a great and distinguished effort and is backed by as<br />

many pictures as possible.


3. If your article is not approved for publication, this will not necessarily mean it is not suitable for publication but<br />

there might be, in the editorial staff's judgment, certain reasons to hold it back. Use will be made of it, however, and<br />

it will be passed on to the workers at other jihadist media offices.<br />

4. When you send an article, please use a pseudonym or a nickname. This will appear with the article in the<br />

magazine.<br />

5. Use all possible means to hide your real identity when you communicate with the magazine. The enemies of God<br />

are always lying in wait for the Muslims.<br />

6. Send your contributions to this address:<br />

http://teqanymag.arabform.com<br />

Peace and God's mercy and blessings be upon you.<br />

[pg 69]<br />

Coming Soon: You will be able to read in the Al-Mujahid al-Tiqani magazine:<br />

1- Jihadist <strong>Forum</strong>s and Secure Browsing<br />

2- Intelligent Weapons: Night vision and Thermal photography (Part II)<br />

3- A Spy Called Cellular Phone<br />

Your brother / Chief Editor<br />

Abu-al-Muthanna al-Najdi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!