The Internet has enabled a global jihad based on a loose, decentralized network of Mujahideen transcending the limitations of face-to-face interaction. Terrorists are making the most of the vast information available on the Internet to coordinate, to communicate, and to find essential data in order to wage anti-social, violent operations.
Most jihadi websites have several sections. Most important is usually the religious section, which features Quranic references to jihad, the different ways jihad can be expressed, aspects of martyrdom, fatawa explaining who can be targeted legitimately, and online doctrinal consultations with religious sages. In the jihad section, would-be recruits are encouraged to join the battle. Some general advice is given, e.g., the best routes into war zones as well as names and locations of sympathetic mosques. Galleries of martyr portraits are accompanied by their last testaments, often in a video clip. Most sites have IT section where contributors are urged to share their knowledge and develop new ways of using cyberspace to further jihad.
Many jihadi sites have a women’s section where wives and mothers are urged to support their men in jihad and help them in the psychological battle against what one site described as that disease, the weakness which loves life and hates death. Some show women mourn their dead loved ones.
– Information technology has enabled terrorist organizations to receive and share knowledge globally. Terrorists can easily obtain information on sensitive targets and their potential weaknesses; public transport timetables; building sites, their opening times and their layout. Al-Qaida maintains an extensive database that contains information about potential American targets.
Hamas uses a network of websites targeting many populations. Its official Website, the Palestinian Information Center (www.palestine-info.com), appears in eight languages. It provides propaganda and updates the Palestinian take on the news.Propaganda and Indoctrination
– Most radical and terrorist organizations use the Internet as a vehicle for ideological indoctrination. Hizb ut-Tahir (http://www.hizb-ut-tahrir.info/info/english.php/category_en/categ_415), an Islamist extremist group, offers music and computer games to introduce their ideology and to attract young supporters. As Islam is under attack, Muslims have a personal duty to fight. There is also an immense amount of how-to material: cell phone detonators, how to make flamethrowers and napalm bombs together with violent and terrorist propaganda.
Al-Qaida’s network has been successful in its use of multimedia propaganda, producing pre-recorded videotapes and audiotapes, CD-ROMs, DVDs, photographs, and written documents. Islamist zealots are developing computer games and promoting hip-hop artists in order to spread radical ideology and to reach sympathizers within adversarial populations. Nearly every insurgency operation in Iraq was filmed and posted on a number of sites and bulletin boards accompanied by jihadi songs. The bloodshed was presented as heroic and glorious, and the accompanying text promoted jihad.
Al-Qaeda in the Arabian Peninsula (AQAP) publishes its English language jihadist magazine Inspire. The magazine, known for its high production standards, is aimed to radicalize English-speaking Muslims, encouraging them to engage in militant activity. Inspire encourages jihadist to mount attacks where they live. Inspire number 11 (2013) is a special issue devoted to the prime enemy, the USA. In it you find a message to the American nation, another message to American Muslims, comment on the Boston Marathon bombings, and a column on “America’s Bitter Harvest.”
The military wing of Hamas, the Ezzedin al Qassam Brigades, has its own Website (http://www.qassam.ps/). It provides report on current affairs, glorifies martyrs, offers interviews with Palestinians and intellectuals who support the armed struggle against Israel, provides information about their prisoners, and offers a comprehensive photo gallery. One of Hamas’s Websites was designed to target children: the site presented, in comic-book style, stories that encouraged children to engage in jihad and to become martyrs”.
- The Internet can help bridge the gap from the isolated potential mujahid to the global jihad. Connection between people may start on social networking sites such as Facebook, Twitter and Vibe and then may continues on more obscure forums.
The dark Internet is a home to illicit jihadi information and communication. Jihadi websites allow isolated young Muslims to engage with a worldwide network of like-minded people striving against what they perceive as a common enemy and with a singular unity of purpose. The forums, where people seem to care for each other, provide them with friends and support. The forums prove the existence of the ummah, or imagined Muslim nation.
– Al-Qaida regularly publishes videos that are designed to evoke fear. Violence plays a key role in the psyche of jihadists. The majority of all videos distributed on jihadi forums feature explicit violence.Fund raising
– Some terrorist groups raise funds via the Internet by five primary methods:
By making appeals via e-mail or directly through their websites. Hamas has circulated appeal letters to various newsgroups. Hezbollah supplied bank account information to those who solicit the group by e-mail and it posted its bank account information directly on several of its websites.
By selling goods. Many sites offer online “gift shops”: visitors can purchase or download free posters, books, videos, pictures, audiocassettes and discs, stickers, badges, symbols, and calendars.
Through side businesses that are not identified as group-owned but are nevertheless associated. There are links between terrorism and organized crime, especially in spheres concerning illegal migration, corruption, economic crime, illicit drugs, arms trafficking and money laundering. The Hezbollah had coordinated the transportation, distribution, and sale of multi-ton bulk shipments of cocaine from South America. Large cash money was smuggled to Lebanon, and several Lebanese exchange houses utilized accounts at the Beirut-based Lebanese Canadian Bank (LCB). The proceeds were laundered through various methods which included the sale of used cars in the United States to African nations, mixing legitimate business with drug money which eventually found its way to the Hezbollah.
Through online organizations that resemble humanitarian charity groups. Some charity organizations in the USA were in the service of Hamas and the Hezbollah until they were closed down. Charities are legitimate front organizations which enable to raise money from across the globe.
Through fraud, gambling, or online brokering. According to the United Kingdom’s Financial Services Authority (FSA), terrorist groups launder their money through online firms. Online brokerage and spread-betting firms are particularly vulnerable to exploitation by terrorist groups because they are under-regulated and do not perform thorough checks on their investors. Younes Tsouli, Waseem Mughal and Tariq Al-Daour, based in London, worked for al-Qaida in Iraq. They stole money through online gambling sites. With different Trojan viruses, the three terrorists managed to raise more than 3.5 million dollars to buy web hosting services in order to show more influential videos of al-Qaida.
– Instructions and online manuals – Multiple password-protected forums refer to extensive literature on explosives. There are tutorials in viruses, hacking stratagems, the use of secret codes, encryption methods, Tor and other anonymity tools. Bomb-making knowledge is available on jihadi websites in the form of very detailed step-by-step video instructions showing how to build improvised explosive devices. There is strong evidence that such online instructions played a critical role in the March 2004 Madrid bombings, the April 2005 Khan al-Khalili bombings in Cairo, the July 2006 failed attempt to bomb trains in Germany, and the June 2007 plot to bomb London’s West End and Glasgow.Recruitment
– There are numerous cases of normal, often non-religious citizens becoming radicalized by jihadist websites, leaving them vulnerable to terrorist recruitment. The content of such propaganda usually consists of enemy demonization, justification of violence, and a general background of the jihadi group, its platform and objectives. The sites try to be effective as they compete with each other on the attention of potential followers. Interactive technology is used to connect with those who seem receptive to the jihadi messages and ideology.
Planning of activities and coordination
– The Internet has proven to be an excellent vehicle by which information about travel, training, targets, tactics and a host of other useful organization details is displayed. Data, instructions, maps, diagrams, photographs, tactical and technical details are often sent in this exchange, often in encrypted format, using onion routers such as Tor that hide the Internet Protocol (IP) address.
Al-Qaida members used the Internet in planning and coordinating the attacks of September 11, 2001. Mary E. Galligan, FBI Chief Inspector who supervised PENTTBOM, the FBI’s investigation of the attacks, studied closely the incident that brought about the global war on terror. She said that clearly the Internet was a vital channel for coordination of those attacks. Galligan asserted that al-Qaida terrorists learned the methods used by the US to combat terrorism; they studied the American soft spots and targets. Al-Qaida activists refrained from using cell phones, as they knew cell phones could be traced. Instead, they used the Internet, prepaid phone cards, and face-to-face meetings in Spain. Email was used to transmit messages between the terrorists. Al-Qaida activists were looking for American flight schools on the Internet, while they were in Germany. The terrorists used public libraries terminals for communications and data. At many public libraries, people can simply walk up to a terminal and access the Internet without presenting any form of identification. Within two weeks of the 9/11 attacks, the US had located hundreds of e-mails linked to the hijackers, in English and Arabic, sent before September 11, some of which included operational details of the planned terrorist assault.
Combating terrorism is an
enormous task. It demands resources and capabilities that most of us – normal
citizens – do not have. The prime responsibilities lie with the ISPs, with
nations of the free world, and with the international community at large. As
terrorism is a global phenomenon, it is necessary to fight against it globally
via diligent cross-country cooperation.
ISP RESPONSIBILITY Like in any
other forum and industry, there is a need to assure a certain security level on
the Internet. American Internet Service Providers hosted terrorist sites and
helped the cause of jihad. Some did it knowingly while others did it
InfoCom Corporation in Texas, for instance, hosted
websites for numerous clients in the Middle East. It served more than 500 Saudi
Internet sites and notable Palestinian Hamas organizations, including the
Islamic Association for Palestine and the Holy Land Foundation for Relief and
InfoCom also served to launder money. Large amounts of money
came from Saudi Arabia and the Gulf states to sponsor Hamas
InfoCom was founded by Mousa Abu Marzook, one of the leaders
While InfoCom directors knew exactly what they were doing,
Fortress ITX unwittingly hosted a jihadi site that urged attacks against
American and Israeli targets. Among the web pages were “The Art of Kidnapping,”
“Military Instructions to the Mujahideen,” and “War Inside the
This informative site was shut down when Fortress learned about
the content from a reporter.
Undoubtedly, not playing into the hands of
terrorists requires oversight and proactive steps. ISPs are reluctant to monitor
their servers for economic reasons. American ISPs do not see monitoring as part
of their service.
They often claim they do not wish to compromise their
customers’ First Amendment rights.
If an ISP hosts a terrorist site, the
owner can be charged with conspiracy and aiding and abetting terrorism. But
unfortunately, many of the terrorist websites are still hosted by servers in the
Intermediaries, such as ISPs and Web- Hosting Services
(WHSs), can play a useful role in offering the public a regulating or
authenticating service. That is, ISPs and WHSs can market their Internet access
software by promising to include certain kinds and quality of content and
ISPs and WHSs would compete with each other on the basis
of the cluster of options they offer as well as over their software-based
Codes of conduct should be adopted to ensure that
Internet content and service providers act in accord with the law and with
principles of social responsibility. These codes should meet community concerns
and industry needs, operating as an accountability system that guarantees a high
level of credibility and quality.
To be effective, these codes of conduct
should be the product of and be enforced by self-regulatory
Because of the transnational nature of Internet communications,
coordinated activity among such agencies in different jurisdictions needs to be
an essential element of self-regulation.
STATE ACTION One of the prime
responsibilities a state has to its citizens is to provide them with the ability
to lead their lives in peace, free of existential threats and violence. Caution
and reasonableness are prerequisites to address violent, anti-social challenges
sensibly and cautiously, without evoking unnecessary panic.
realizing that some boundaries need to be introduced to liberty and tolerance in
order to maintain a responsible Internet, we should be careful not to exaggerate
The course of action needs to be measured, without
silencing individuals and organizations. Evoking fear only plays into the hands
INTERNATIONAL COOPERATION Follow the money is a good
advice for the combat of terrorism. The ability to stop the flow of funds via
the Internet to terrorist organizations is difficult and time-consuming. Sites
and accounts are closed and re-opened under different names very
As many terrorist organizations have set up charities in the
real as well the virtual worlds, multilateral bodies such as the Financial
Action Task Force (FATF), which was established to combat money laundering and
terrorist financing, are instrumental in sharing information about the global
charitable sector, improving oversight of national and international charities,
devising methodologies for detecting terrorists masquerading as charities, and
establishing international standards to combat such abuse.
8, 2006, the United Nations adopted a Global Counter- Terrorism Strategy. The
strategy, in the form of a resolution and an annexed Plan of Action
(A/RES/60/288), is a global instrument designed to enhance national, regional
and international efforts to counter terrorism.
This was the first time
that all Member States agreed to a common strategic approach to combat
terrorism, sending a clear message that terrorism is unacceptable in any form
and also resolving to take practical steps to fight it. Those practical steps
range from strengthening state capacity to better coordinating UN
European Union states share monitoring of
militant websites, including sites linked to al-Qaida. Keeping track of jihadi
sites requires vigilance as statements and videos by individuals and groups may
appear only for a short period of time. The Internet increases in volume each
and every day, and its security is difficult to maintain.
In Part I, I
mentioned the links between terrorism and organized crime. Narcoterrorism, the
confluence between drugs and terrorism that simultaneously advances distinct and
mutual interests of terrorists and criminals, is a real concern. The cooperation
between unlawful elements is designed to facilitate their respective activities
and is instrumental in devising ways to overcome national and international
efforts to stifle them.
The EU police agency, Europol, has built an
information portal to allow exchange of information on militant website
monitoring. The portal includes a list of links of monitored websites,
statements by terrorists, and information designed to fight down
The Internet is the single most important factor in
transforming largely local jihadi concerns and activities into the global
network that characterizes al-Qaida today. The Internet is ubiquitous,
interactive, fast and decentralized. The ease of access, low cost and high
speed, its chaotic structure (or lack of structure), the anonymity which
individuals and groups may enjoy, and the international character of the
Internet furnish all kinds of individuals and organizations with an easy and
effective arena for their partisan interests.
throughout the world can learn from each other and cooperate in the fight
against illicit and anti-social activities online. Indeed, there are many
similarities between counter-online terrorism activities, counter-online child-pornography activities and counter-online racism activities.
years pass, there is growing awareness of the threats, and of the need to
provide social security. Ignorance, whether circumstantial or normative, cannot
serve as an excuse.
With the right cooperation, the international
community has the capabilities to address the formidable challenges and provide
Indeed, to have effective results in fighting down
terrorism, cooperation is vital. Failure to do so is inexcusable.
responsible cooperation, Internet abusers will prevail, and our children will
Nations and responsible Netcitizens are obliged to ensure that
future generations will be able to develop their autonomy, their individuality
and their capabilities in a secure environment, both offline and
online.The author is chair in politics at the University of Hull, UK.
Among his books are
Speech, Media and Ethics (2001, 2005), The Scope of
Tolerance (2006, 2007) and
The Democratic Catch (Hamilkud Hademokrati, 2007,