What They're Looking For Inside Osama's Thumb Drives

U.S. forces picked up more than a hundred thumb drives, hard drives, computers, and discs from Osama bin Laden’s compound. Now that the gear is in the hands of American intelligence, what are they looking for? Some of the more pressing questions that are likely being asked right now: Who was he talking to? Whether […]

U.S. forces picked up more than a hundred thumb drives, hard drives, computers, and discs from Osama bin Laden's compound. Now that the gear is in the hands of American intelligence, what are they looking for? Some of the more pressing questions that are likely being asked right now:

__Who was he talking to? __Whether or not bin Laden had internet access -- and there are growing signs he did -- the man needed some kind of contact database (the world’s most wanted customer relationship management app ever). It most certainly includes names, nicknames or aliases of al-Qiada allies and operatives. These guys are probably already known to U.S. intelligence, but having this data may shed new light on the relative importance of individuals and the role they play in AQ. Forensic tools that allow for the use of keyword lists – useful for a language like Arabic where a name could have many spelling variations – would come in useful.

What was he reading or watching? Bin Laden inevitably got information from the outside world. There is a fair chance that some of that material came in via CDs, DVDs, or thumb drives. This gives us some insight into what his cohorts were writing to him, and what issues he was interested in, etc. USB sticks are particularly useful, since a PC will record the serial number of a thumb drive in its registry. Pictures taken with a digital camera will contain data that can indicate where they were taken and when. We may be able to correlate where certain documents or files came from or who created them, giving further insight into the inner-workings of the organization.

What was he thinking? Unless one writes fiction for a living, what someone puts into their computer tends to be the most focused and factual data available. Since we can’t actually read bin Laden’s mind (at least not anymore), the next best thing is reading and trying to make sense of the ideas he put down on (virtual) paper.

What didn’t he want us to know? It’s a safe bet that bin Laden didn’t want anything of this to fall into the hands of U.S. forces. But unless he had a forensically-sound data erasure tool, almost anything bin Laden simply deleted is probably available to be recovered. That includes plots and ideas considered and discarded, orders issued, you name it. The use of encryption could complicate matters, but as with many security mechanisms, encryption is only useful if it is employed soundly and every time. Any system that was on at the time of the raid could contain encryption keys or pass phrases that could in turn be used to unlock any encryption mechanism.

How sophisticated is his crew? We may be able to determine a bit about AQ's technological capabilities based on file formats and the presence of specialized software. Data files with file extensions from engineering or CAD/CAM programs, for example. But even if there are so signs of anything that advanced, don't miscalculate: the al-Qaida's element may still be able to inflict damage. The faster and more completely we make sense of what bin Laden was doing on his computer the better off everyone who may be in al-Qaida’s crosshairs will be.

Photo: DoD

See Also: - Aviation Geeks Scramble to ID bin Laden Raid’s Mystery Copter