Escolar Documentos
Profissional Documentos
Cultura Documentos
Cyber jihadis make significant use of the Internet as a resource for communication and
for community building. They are using the Internet as a platform to quickly and
effortlessly export their brand of extremist propaganda that radicalizes Islam in their view
using the Internet as a virtual training camp. The Internet is used as both a transport and
tool by these groups and can also be used as a weapon. Virtual dead drops are marked by
online code words embedded in propaganda found in online communities or hidden in
images. This strategy follows early use by jihadis in using Western infrastructure as
weapons against us.
Current activities on the Internet include the publishing of many documents relative to
their efforts. Some of these documents include:
The Mujahideen Poisons Handbook
The Technical Mujahid
The alQaeda Training Manual
Over the past several years, what was once easy to find on the Internet has been driven to
online communities requiring userid and password verification for access. Proper vetting
takes unknown twists and turns and you never know if you may be allowed access into
these sites or not. Regardless, there effort has become of war of images and ideas being
waged on the Internet in online communities, chat rooms, blogs, and publications that are
easily accessible, easily transmitted and shared, and easily created. Jihadis are recruited
in chat rooms and have access to a multitude of videos (actually scores of hundreds) and
MP3s that help persuade young men to commit acts of terror or commit suicide.
Careful examination of the electronic document shows that has errors, authored by
someone without any major training in chemistry nature of
simple compounds and procedures.
The overthrow of the godless regimes and their replacement with an Islamic regime.
Other missions consist of the following:
1. Gathering information about the enemy, the land, the installations, and the
neighbors.
2. Kidnaping enemy personnel, documents, secrets, and arms.
3. Assassinating enemy personnel as well as foreign tourists.
4. Freeing the brothers who are captured by the enemy.
5. Spreading rumors and writing statements that instigate people against the
enemy.
6. Blasting and destroying the places of amusement, immorality, and sin; not a
vital target.
7. Blasting and destroying the embassies and attacking vital economic centers.
8. Blasting and destroying bridges leading into and out of the cities.
The al Qaeda training manual was translated in its entirety and made into an Adobe
Acrobat file prior to September 11. With some searching copies can still be found on the
Internet now making it fully available to anyone with a bit of patience.
Islamophobia
Much has been made about Islamophobia in the press as Muslims speak out against the
discrimination perceived and actual that is carried out against Islam. There are many
sides to this discussion but suffice to say this article focuses on EJ groups and their vocal
minority that paints a negative picture of Islam as a whole. Recent examples of various
phobias can be seen with the Rachel Ray incident where she an ad for Dunkin Donuts
was shelved since she was wearing a kafiyeh. Other instances of phobias even concern
Christians as evidenced by a series of events where three Christians were killed in Turkey
or the wearing of crucifixes was banned in schools in Northern Ireland. Regardless, anti-
Islam fervor increased
significantly after 9/11 and it
does exist. I do not condone
nor support discrimination of
this type in any shape or form
but only focus on the
distortions provided by the
EJs.
But in the case of the EJs, Christian made laws of war are not valid. They are not laws
made from the same religious beliefs as the final, true religion, that being Islam. It begs
the question of those in the West, Why would we believe our laws to govern those with
different beliefs?
The other view is that asymmetric warfare is not synonymous with terrorism. It is typical,
in an asymmetric conflict, for the stronger side to accuse the weaker side of being
bandits, pillagers or terrorists. These accusations are usually part of propaganda
campaigns, although they are sometimes true. Some argue that asymmetric warfare is
called "terrorism" by those wishing to deny the political aims of their weaker opponents
and to exploit the negative connotations of the word. There are those who hold the view
that "One man's terrorist is another man's freedom fighter." An example of this is over
Kashmir: the Pakistanis claim that a war of freedom for the Kashmiris is being fought
with the Indians, who in turn, label them as terrorists. The Iraqi insurgency is similarly
labeled as terrorism by its opponents and resistance by its supporters. Some would also
say that the freedom fighter Mujahideen of Afghanistan of the 80s who the United States
fully supported (Charlie Wilsons War), are now the insurgents and terrorists we fight
there today.
There are many types of Jihad that focus on struggle the root of the word. Jihad is
essential throughout all cultures; we just tend to call it different things. We struggle in
our daily lives to get ahead economically or to elect someone that fits our views. We
struggle at work to gain knowledge or get the inside track. The EJs use different forms of
Jihad for personal and organizational gains to the
end goal that being the expansion of their
extremist brand of Islam and the removal of
Western influences in Muslim lands.
Web 2.0
The use of these tools appeals to the younger masses or those we call Milennials who are
technically astute, somewhat dissillusioned and who represent the future of the
movement.
Another tool that has a unique flavor is the Electronic Jihad 3.0 program.
Demonstrating again a mature SDLC, version three offers the ability to perform a
denial of service against websites. The ability to add IP addresses, ranges or IP
addresses or strings allows for a fire and forget capability that can be triggered
from their virtual machine image while the perpetrator goes out for dinner or
coffee. The tool:
Handles different Internet speeds (so low and slow is possible)
Use proxies to override website blocking
Sets up accounts in online communities for tracking
Gives awards to those who spend most time attacking targets and have
most successful attacks (the most successful known to date was by a
gentlemen going by the handle George Bush who ran his attacks for 72
straight days)
The tool is not unique by hacker standards but the incorporation of the video
game scoring does add an attraction to the younger set.
Education
Over the past couple of decades, United States and other Western universities
have been innundated with foreign nationals seeking an education in computer
science. The EJs have
purposefully sent small
numbers of students to learn
computer science and
imparticular, computer security
and computer network attacks.
In addition, EJs have actively
recruited these students as they
return to their native countries,
many times without the
prospect of employment. The
skills learned in the Western
universities are being used by
these extremist groups to
support their efforts on the
Internet. One such instance is
the story of Irhabi 007.
Moving from North Africa with Figure 7 Electronic Jihad 3.0
his family in 2000, Younes
Tsouli enrolled in Westminster College in London. His course of study was
computer science.
In 2007 he was found
guilty of incitement to
commit acts of terrorism
(a crime introduced in
the Terrorism Act 2006)
and sentenced to 16
years in prison. His
crimes were carried out
via the internet, where
he was known by
several pseudonyms
based on variations of
Irhabi 007; "Irhabi"
being the Arabic word
for "terrorist", and
"007" a reference to the
fictional British secret
agent James Bond.
Tsouli's activities
included the setting up
of web sites and web
forums in support of al-
Qaeda, and distributing
video material filmed by
the Iraqi insurgency.
His primary co-
conspirators were
takfiris Waseem
Mughal and Tariq Al-
Daour. Their activities
were funded by Al-
Daour, who was found
to be in possession of
37,000 credit card
details, which were
linked to more than 2.5
million Euros worth of
fraudulent transactions.
Tsouli has been called
the "world's most
Figure 8 AYMAN AL-ZAWAHIRI wanted cyber-jihadist",
and his conviction was the first under British law for incitement to commit an act
of terrorism through the internet
Summary
Anyone with an internet connection can access EJ media products directly. The
delivery platform and nature of the material offered up by the EJs suggest that the
primary target audience is young, technically savvy, educated, and often middle-
class or abovea generation that will shape the future of the Arab world.
Most of the audiovisual material is packaged in forms that require a high-speed
Internet connection to download files running to several hundred megabytes
(although smaller files are also available for users with dial-up connections). And
because the bulk of audiovisual materials are available for downloading, not
viewing online, they are best accessed at home, rather than from an Internet caf,
where downloading may not be advisable (because of surveillance) or possible
(because of restrictions). Individual users can also reformat downloaded materials
as DVDs or audiocassettes for local distribution.
JSB