The future of cyber- jihad in Europe
These operations appeared at the beginning when many of Osama
bin Laden's information material, and much of the contents of the kidnapping
and slaughter of Western hostages, were shown to be an important element in the
strategy of extremist organizations in Europe.
In addition, these electronic battalions penetrated several
sites belonging to the American administration, and spread the order to
penetrate many Canadian and Israeli institutions and electronic marketing of
al-Qaeda in Mesopotamia, and is considered "begging" the first to
introduce the idea of electronic army on the Internet.
The son of a Moroccan diplomat, educated in the most
sophisticated schools, belongs to an affluent family. He traveled to London and
studied information technology. The reason for his nickname is 007, compared to
James Bond.
The first was when he saw the "beggar", many of the
images that showed scenes from the war on Iraq; he then launched a center that
hosts and helps Islamic extremists to work with al-Qaeda.
Tasouli also helped many Mujahideen in how to penetrate
websites, through the Forum of Sincerity and the Ansar al-Islam Forum. He
published many pages that explain how to hack websites, not only education and
training, but also spreading and distributing the products of the base.
Cyber Jihad
Not only did terrorist groups stand at the boundaries of
traditional jihad, known for their types and entrances, but also benefited from
globalization.
Recently, many media outlets, sites that were interested in
promoting extremist ideas and trying to spread them to all social media outlets
as a tool in the crowd Intellectual and financial.
The use of cyberspace by these groups is relatively recent in
terms of the modernity of the Enlightenment and globalization movement. The
first use of this feature was in terrorist operations in 1996 to serve their
objectives and deliver their messages more safely and quickly. Many terrorist entities,
And "ISIS" and walk in their orbit.
This has been an important platform, and one of the pillars
upon which terrorist organizations rely on states to penetrate. Many data have
been published about many prominent figures in the US administration, for
example, as well as individuals to enhance their fear, known as cyber-attacks.
These groups have also adapted their uses in line with their
objectives, such as official websites and intellectual forums such as:
Al-Ikhlas forum and Ansar al-Islam forum; it is a platform for publishing and
circulating cyber experiences, and another wing related to the grassroots
confrontation and the community structure of the target countries.
These groups worked to develop and protect their
correspondence and conceal information. The war was no longer using
conventional weapons, but in the era of globalization it became psychological
and cultural wars.
These extremist groups have achieved many successes in this
cyberspace. They have developed the content of the material provided by Google
to video, documentaries or intellectual lessons. Technology has also provided
the fertile ground for influencing large segments of social networking members
and users.
Transnational Jihad
These groups use the concept of "cross-border jihad"
to export themselves in the form of those with many penetrating capabilities;
rather than being able to communicate with many individuals and pass their
intellectual content.
These organizations soon developed electronic games in an
attempt to confront children and adolescents in order to mobilize them
according to content appropriate to their age group, and sometimes extended to
the recruitment of the mentally disabled, criminal mafias and organized crime
networks.
The absence of Mujahedeen 007 on the information network was
not as many expected to block this phenomenon, especially after the arrest of
the "beggar" by the British authorities in 2004 and then sentenced to
16 years in prison for promoting jihadist ideas and supporting terrorist
operations in the country.
But despite the arrest of the 007 leader, this movement has
issued many articles and addresses that help them secure their information,
acquire piracy skills, and enable jihadists to pass on their intellectual and
informational content. This is the first step to the emergence of other
movements such as Mujahedeen 007.
Many countries have realized how dangerous these extremist
groups are to use technology, especially after the arrest of many people who
have been in contact with jihadist groups, as well as the increasing number of
terrorist attacks and individual wolves, which has been a practical application
that illustrates the extent of these ideas, and thus made governments a
priority, securing these spaces, legalizing many of the legislation that
increase the level of electronic security, and control the expansion of these
ideas, rather than developing their systems to counter piracy attacks.