Find out how Osama e-mail his colleagues without being caught

With all the news about Osama circulating the internet, it’s kind of hard to find anything that does not have to do with his death, but one of the main things that always intrigued me was the way he communicated.

In a nutshell, when Seal Team 6 and their Dog went into his compound, they found a computer without internet access, no phones, and just a satellite dish receiving signal to his home. Outside of that, there was no other source of communication between the outside world, and his compound… that is until they found his SneakerNet.

When Seal Team 6 departed the compound they took with them 100 flash memory drives, hard drives, note,s and a whole bunch of other stuff. Inside the drives, they found a number of e-mails between him and his cohorts, so how did he do it? and what is a Sneaker Net? a report published by the Associated Press: could not have described it better.

“Holed up in his walled compound in northeast Pakistan with no phone or Internet capabilities, bin Laden would type a message on his computer without an Internet connection, then save it using a thumb-sized flash drive. He then passed the flash drive to a trusted courier, who would head for a distant Internet cafe.

At that location, the courier would plug the memory drive into a computer, copy bin Laden’s message into an email and send it. Reversing the process, the courier would copy any incoming email to the flash drive and return to the compound, where bin Laden would read his messages offline”

And that is called a Sneaker Net. it’s the pony-express of modern e-mail technology – a manual method of sharing files in which a file is copied from a computer to USB, transported to a second computer by a person Walking using “Sneakers” & using “Sneaky” methods, to a second computer, and manually transferring the file from the USB to the second computer. And this process repeats it’s self over and over again. Incredibly simple technology, that managed to beat the highest technology for the longest time…

Low-Tech Maxim: Low-tech attacks work, even against high tech devices and systems.~D. Walker

Via: Yahoo