The capture of 
                        alleged al-Qaeda computer expert Mohamed Naem Noor Khan 
                        by the Pakistani authorities in July brought with it an 
                        unprecedented haul of high-tech intelligence. 
                      Speaking in London last 
                        month, America's homeland security chief Tom Ridge said 
                        the volume of potential information was "the largest 
                        we've ever seen - I mean potentially millions and millions 
                        of pages of information", and revealed that intelligence 
                        officers had yet to decipher it all. 
                       Communications have always 
                        been an essential part of al-Qaeda's strategy, but the 
                        internet and email have become even more important in 
                        recent years. 
                      They have provided the 
                        terror network with new possibilities - but, as the Khan 
                        case illustrates, fresh vulnerabilities too. 
                      WHY THE WEB? 
                      "The terrorists have 
                        fully exploited the modernisation of communications to 
                        their advantage," says Sajjan Gohel of the Asia-Pacific 
                        Foundation.
                        
                        The al-Qaeda ideology can be very well served on the internet. 
                        It is able to purport its agenda, goals and ideology probably 
                        better on the internet than any other means." 
                      As the core of the al-Qaeda 
                        leadership has been put under pressure, the organisation 
                        has been forced to evolve and become more decentralised 
                        - a structure to which the internet is perfectly suited. 
                        
                      The web offers a way for 
                        like-minded people located in different communities to 
                        interact - especially important when operatives may be 
                        isolated and having to lie low. 
                      Denied a physical place 
                        to meet and organise, al-Qaeda has increasingly sought 
                        to create a virtual community through these chat rooms 
                        and websites to spread its propaganda, teaching and training. 
                        
                      "They lost their base 
                        in Afghanistan, they lost their training camps, they lost 
                        a government that allowed them do what they want within 
                        a country. Now they're surviving on internet to a large 
                        degree. It is really their new base," says terrorism 
                        expert Peter Bergen. 
                      Those who watch the issue 
                        closely believe that it would be unlikely for al-Qaeda 
                        to use websites to communicate about the most sensitive 
                        matters, preferring to use it for general debate, the 
                        exchange of views and attempts to spread its thinking. 
                        
                      The propagation of a jihadist 
                        ideology has always been a central goal of al-Qaeda and 
                        the internet provides the broader jihadist movement with 
                        an effective vehicle to do this. 
                      But it is not without liabilities, 
                        as it can prove a useful way of tracking down the network 
                        and closing in on cells. Khan's 
                        laptop contained a great deal of information - including 
                        a huge number of names. Some reports claim that Khan was 
                        in fact working against al-Qaeda - sending messages out 
                        to the network and monitoring their response to track 
                        down members, although this has not been confirmed.
                        
                        SPREADING FEAR 
                      One of the most important 
                        weapons in Al-Qaeda's armoury is its ability to generate 
                        fear. Jihadist groups in general use videos and still 
                        images of attacks - and especially gruesome attacks like 
                        beheadings - as part of psychological warfare.
                        
                        These videos and messages have the dual impact of spreading 
                        anxiety among enemies while simultaneously boosting morale 
                        for sympathisers and like minded groups. 
                      As well as videos, messages 
                        purporting to be from al-Qaeda or al-Qaeda related groups 
                        also make frequent appearances on certain sites. These 
                        often involve warnings against countries coupled with 
                        the threat of imminent attacks. 
                      Some of these are undoubtedly 
                        false, others probably real. And while some of the messages 
                        are directed internally, in a number of cases - the messages, 
                        like the images - are designed to scare. 
                      
                      COMMUNICATING 
                        OBJECTIVES 
                      Analysts believe that in 
                        some cases, messages are issued to set broad strategic 
                        objectives or target lists of places and people who should 
                        be subject to attack with the hope that independent cells, 
                        individuals and networks will then act on these in their 
                        own way. 
                      They sometimes display 
                        a high degree of political awareness. One important paper 
                        entitled "Jihadi Iraq: Hopes and Dangers", spotted 
                        in Norway in December, looks at how members of the coalition 
                        occupying Iraq could be peeled off through terrorist attacks. 
                        
                      Spain is identified as 
                        presenting a particular opportunity given the general 
                        election that was then a few months off. It could, of 
                        course, be a coincidence that Madrid was then targeted 
                        just days before its election, but no one is sure. 
                      There is less evidence 
                        of the internet being used by the Al Qaeda core for issuing 
                        specific orders or operational commands, or even for fundraising. 
                        
                      Email is used more often, 
                        but al-Qaeda operatives are trained to avoid detection, 
                        only using cyber-cafes briefly and using an email account 
                        for only one message before abandoning it. 
                      Complex but publicly available 
                        encryption could also be used, but using this technology 
                        could draw attention - rendering regular message boards 
                        and groups a safer way of operating. 
                      The 9/11 hijackers communicated 
                        through internet chat rooms, often using codenames and 
                        codewords for their plans. There is also some debate over 
                        a technique called steganography, which involves embedding 
                        secret messages within publicly available files and images 
                        on the internet, but there is little evidence so that 
                        al-Qaeda has used this. 
                      Similarly there is some 
                        debate over whether messages from Osama Bin Laden and 
                        his deputy Ayman Al-Zawahiri contain any kind of message 
                        triggering groups around the world to attack. Again here 
                        the evidence is mixed. 
                      DISCUSSING TACTICS 
                        
                      As well as propaganda and 
                        ideological material, jihadist sites seem to be heavily 
                        used for practical training, important since the loss 
                        of Afghan training camps. 
                      Sites like Al Battar contain 
                        hugely detailed information on how to kidnap VIPs, conduct 
                        surveillance and fire rocket propelled grenades.Careful 
                        instructions were recently posted on one jihadist website 
                        on how to use mobile phones as detonators for explosives, 
                        as was used in Madrid.  
                      
                      Al-Qaeda's "Encyclopaedia of 
                        Jihad" which runs to thousands of pages has also 
                        been distributed over the internet. 
                      The internet can also be a place 
                        on which terrorists can research information and find 
                        details of potential targets for attack, often known as 
                        'cyberplanning'. Al Qaeda training manuals have emphasised 
                        the usefulness of publicly available information about 
                        its enemy. Huge amount of reconnaissance material and 
                        files have been found on captured computers. 
                      Arguments also rage in chat rooms 
                        over what tactics and methods of violence are valid - 
                        whether hostage taking, beheading or the role of innocent 
                        - sometimes Muslim - casualties, in attacks. 
                      The aftermath of the Russian school 
                        siege was interesting because many messages condemning 
                        what had happened were posted on sites which usually carry 
                        gruesome pictures and videos. 
                      RECRUITMENT  
                      
                      
Recruitment, often through 
                        chat rooms, may take place, and there is some evidence 
                        that people have been given instructions on how to get 
                        involved in Iraq. 
                      This summer, a new online 
                        publication seeking specifically to encourage women to 
                        take part in Jihad appeared. 
                      Researchers have also noted 
                        a rise of participants in radical Islamic forums who write 
                        in English or using the Latin alphabet, possibly reflecting 
                        a rise of interest in Muslims in the West in these sites. 
                        
                       SHIFTING SITES 
                        
                      Many Western governments 
                        have tried to respond to the communications challenge, 
                        using numerous methods that include monitoring traffic 
                        on the net and exchanges in chat rooms, using "sniffers" 
                        - programs that check e-mails for suspicious material, 
                        and blocking access to certain websites which contain 
                        sensitive information, according to Gabriel Weimann of 
                        Haifa University, who has extensively researched the subject. 
                        
                      The posting of videos is 
                        an especially important sign to counterterrorism analysts 
                        as it suggests that a particular website must have access 
                        or be used by those who actually carry out acts of violence. 
                        
                      An elaborate game of cat 
                        and mouse is often played out as websites move URLs regularly, 
                        changing address to avoid being shut down by ISPs and 
                        hackers. The more organised tend to have mirror sites. 
                        Alneda.com which has been thought to be al-Qaeda's primary 
                        website, keeps moving, often by embedding itself within 
                        innocent websites. 
                      "As the technology 
                        develops, the terrorists keep ahead of the pace as well," 
                        warns Sajjan Gohel of the Asia-Pacific Foundation. 
                      Apart from the occasional 
                        video and audio tape, there is less evidence for Osama 
                        Bin Laden himself using high-tech methods. During the 
                        1990s he did communicate through a satellite phone before 
                        the fact that the US could listen in was leaked. 
                      Since then, analysts believe 
                        that he mainly communicates through human couriers.