A new chapter in the relationship of terrorist groups to technology and information, and another type of jihad, called e-jihad or cyberspace, and “cyberspace” is simply a description of any activity or action through cyberspace that would pass on an idea, Issue.
These operations appeared at the beginning when many of Osama bin Laden’s information material, and much of the contents of the kidnapping and slaughter of Western hostages, were shown to be an important element in the strategy of extremist organizations in Europe.
In addition, these electronic battalions penetrated several sites belonging to the American administration, and spread the order to penetrate many Canadian and Israeli institutions and electronic marketing of al-Qaeda in Mesopotamia, and is considered “begging” the first to introduce the idea of electronic army on the Internet.
The son of a Moroccan diplomat, educated in the most sophisticated schools, belongs to an affluent family. He traveled to London and studied information technology. The reason for his nickname is 007, compared to James Bond.
The first was when he saw the “beggar”, many of the images that showed scenes from the war on Iraq; he then launched a center that hosts and helps Islamic extremists to work with al-Qaeda.
Tasouli also helped many Mujahideen in how to penetrate websites, through the Forum of Sincerity and the Ansar al-Islam Forum. He published many pages that explain how to hack websites, not only education and training but also spreading and distributing the products of the base.
Cyber Jihad
Not only did terrorist groups stand at the boundaries of traditional jihad, known for their types and entrances, but also benefited from globalization.
Recently, many media outlets sites that were interested in promoting extremist ideas and trying to spread them to all social media outlets as a tool in the crowd Intellectual and financial.
The use of cyberspace by these groups is relatively recent in terms of the modernity of the Enlightenment and globalization movement. The first use of this feature was in terrorist operations in 1996 to serve their objectives and deliver their messages more safely and quickly. Many terrorist entities, And “ISIS” and walk in their orbit.
This has been an important platform, and one of the pillars upon which terrorist organizations rely on states to penetrate. Many data have been published about many prominent figures in the US administration, for example, as well as individuals to enhance their fear, known as cyber-attacks.
These groups have also adapted their uses in line with their objectives, such as official websites and intellectual forums such as: Al-Ikhlas forum and Ansar al-Islam forum; it is a platform for publishing and circulating cyber experiences, and another wing related to the grassroots confrontation and the community structure of the target countries.
These groups worked to develop and protect their correspondence and conceal information. The war was no longer using conventional weapons, but in the era of globalization it became psychological and cultural wars.
These extremist groups have achieved many successes in this cyberspace. They have developed the content of the material provided by Google to video, documentaries or intellectual lessons. Technology has also provided the fertile ground for influencing large segments of social networking members and users.
Transnational Jihad
These groups use the concept of “cross-border jihad” to export themselves in the form of those with many penetrating capabilities; rather than being able to communicate with many individuals and pass their intellectual content.
These organizations soon developed electronic games in an attempt to confront children and adolescents in order to mobilize them according to content appropriate to their age group, and sometimes extended to the recruitment of the mentally disabled, criminal mafias and organized crime networks.
The absence of Mujahedeen 007 on the information network was not as many expected to block this phenomenon, especially after the arrest of the “beggar” by the British authorities in 2004 and then sentenced to 16 years in prison for promoting jihadist ideas and supporting terrorist operations in the country.
But despite the arrest of the 007 leader, this movement has issued many articles and addresses that help them secure their information, acquire piracy skills, and enable jihadists to pass on their intellectual and informational content. This is the first step to the emergence of other movements such as Mujahedeen 007.
Many countries have realized how dangerous these extremist groups are to use technology, especially after the arrest of many people who have been in contact with jihadist groups, as well as the increasing number of terrorist attacks and individual wolves, which has been a practical application that illustrates the extent of these ideas, and thus made governments a priority, securing these spaces, legalizing many of the legislation that increase the level of electronic security, and control the expansion of these ideas, rather than developing their systems to counter piracy attacks.
admin in: How the Muslim Brotherhood betrayed Saudi Arabia?
Great article with insight ...
https://www.viagrapascherfr.com/achat-sildenafil-pfizer-tarif/ in: Cross-region cooperation between anti-terrorism agencies needed
Hello there, just became aware of your blog through Google, and found ...