E-JIHAD. INFORMATION FIGHT AL-QAEDA AND THE ISLAMIC STATE ON THE «PATH OF GOD»: SELECTED EXAMPLES
DOI:
https://doi.org/10.29038/2524-2679-2020-01-80-93Keywords:
E-jihad, jihad, cyberjihad, ISIS, Al-QaidaAbstract
The article deals with the issue of e-jihad (cyber-jihad) as conducting jihad using information tools. It is noted that the Warsaw University Observatory registered the word "cyber-jihad" in 2016; The Polish dictionary says that it is "actions against non-believers and followers of other religions by Islamic fundamentalists on the Internet", however, this definition is very inaccurate and even partially incorrect. Jihad is a very blurred and complex concept. The history of Jihadists‟ use of the Internet by authors is divided into three main periods. The first stage took place before the attack on the World Trade Center on September 11, 2001). First, the Internet was not yet a widespread tool, and secondly, Islamists were only growing in strength. The beginning of the al-Qaeda and Taliban conflict with the United States began the second phase. The third stage is the current situation that has changed since the emergence of the Islamic State (ISIS). E-jihad is an concept that has been accepted and in use in science for some time. The purpose of the article is to check whether the activities of the Islamic State (ISIS, Daesh) and Al-Qaida on the internet are in accordance with the concept of jihad. Due to this, the concept of jihad was clarified and confronted with selected examples of activity. The authors argue that the Islamic State and A-Qaida uses new technologies for broadly understood jihad, including fighting (kital).
References
Al-I’tisam Media Foundation, https://khilafatimes.wordpress.com/i3tisam/; I’tisaamMediaFoundation,https://ent.siteintelgroup.com/index.php?option=com_customproperties&v iew=search&task=tag&tagid=607&itemid=820. [dostęp: 01.05.2019].
Al-I’tisam Media Foundation, https://khilafatimes.wordpress.com/i3tisam/; I’tisaam Media Foundation, https://ent.siteintelgroup.com/index.php?option=com_ customproperties&view= search&task=tag&tagid=607&itemid=820, Al-I’tiṣām Media, http://jihadology. net/category/al- iti%e1%b9%a3am-media/ [01.05.2019].
Al-I’tiṣām Media, http://jihadology.net/category/al-iti%e1%b9%a3am-media/ [01.05. 2019].
Bigo Ł., Al-Kaida i mudżahedini będą szyfrować dane, http://www.pcworld.pl/ news/Al.Kaida.i.mudzahedini.beda.szyfrowac.dane,105270.html [dostęp: 01.05.2019].
Buhari, 1:2:24, Kair 2004.
Callimachi R., A News Agency With Scoops Directly From ISIS, and a Veneer of Objectivity. https://www.nytimes.com/2016/01/15/world/middleeast/a-news-agency-with-scoops- directly-from-isis-and-a-veneer-of-objectivity.html [01.05.2019].
Conway M., Parker J., Looney S., Online Jihadi Instructional Content: The Role of Magazines,” [in:] M. Conway, L. Jarvis, O. Lehane, S. Macdonald, L. Nouri (ed.) Terrorists’ Use of the Internet: Assessment and Response 136 (Amsterdam: IOS Press, 2017).
Faour N. Al, Hjelmgaard K., Hughes T., Shesgreen D., The making of an American terrorist: Hoda Muthana joined ISIS. Now she can’t come back, https://eu.usatoday.com/ story/news/world /2019/04/06/hoda-muthana-married-isis-fighters-so-trump-wont-let-her-back- usa/3350233002/, [01.05.2019].
https://archive.org/stream/GuideBookHijrah2015-ToTheIslamicState/7-Hijrah 2015-ToThe IslamicStated jvu.txt [01.05.2019].
https://archive.orgstream/GuideBookHijrah2015-totheIslamicState/7-Hijrah 2015-
ToTheIslamicState_djvu.txt [01.05.2019].
https://www.youtube.com/watch?v=_A4ah-OI5pI [01.05.2019].
ISIS: Portrait of a Jihadi Terrorist Organization, November 2014, p. 203, http://www.crethiplethi. com/files/cp_0115.pdf, [01.05.2019].
Islamiści grożą zamachami w Polsce. Ich celem są żołnierze uczestniczący w manewrach Dragon-15, https://wpolityce.pl/spoleczenstwo/269312-islamisci-groza-zamachami-w-polsce-ich- celem-sa-zolnierze-uczestniczacy-w-manewrach-dragon-15, [01.05. 2019].
Khadduri M., War and Peace in the Law of Islam, The Lawbook Exchange, Ltd.; Clark
Kohlman E. F., Prominent Jihad Media Organization in Central Asia, https://www.cia.
gov/library/abbottabad-compound/F3/F3C107E83E79035F7728F2 6322A1B25nefa iham edia0309.pdf, [01.05.2019].
Kościelniak K., Dżihad święta wojna w islamie, Wydawnictwo «M», Kraków 2002.
Kościelniak K., Rozumienie wojny w źródłowych tekstach islamu [w:] Kościół i dar pokoju, (red.) M. Chojnacki, J. Morawa, A.A. Napiórkowski, Wydawnictwo Salwator, Kraków 2016.
Le Monde, AFP, Un fondateur d’Aamaq, l’agence de propagande de l’EI, tué en Syrie, https://www.lemonde.fr/syrie/article/2017/05/31/un-fondateur-d-aamaq-l-agence-de-propagande-
de-l-ei-tue-en-syrie_5136836_1618247.html [dostęp: 01.05.2019].
Lemieux F., Brachman J. M., Levitt J., Wood J., Inspire Magazine: A Critical Analysis of Its Significance and Potential Impact Through the Lens of the Information, Motivation, and Behavioral Skills Model, «Terrorism and Political Violence» 2014, no. 26(2).
Lichfield J., TV5Monde hack: ‘Jihadist’ cyber attack on French TV station could have Russian link, https://www.independent.co.uk/news/world/europe/tv5 monde-hack-jihadist-cyber- attack-on-french-tv-station-could-have-russian-link-10311213.html [01.05.2019].
Mazur P., E-dżihad, soft power radykalizmu islamskiego [w:] Walka informacyjna: uwarunkowania, incydenty, wyzwania: monografia poświęcona Profesorowi Zbigniewowi Kwiasowskiemu z okazji Jubileuszu 50-lecia pracy zawodowej H. Batorowska (red.), Uniwersytet Pedagogiczny im. Komisji Edukacji Narodowej. Instytut Bezpieczeństwa i Edukacji Obywatelskiej. Katedra Kultury Informacyjnej i Zarządzania Informacją, Kraków 2017.
Morag N., The Global Jihadi Threat, Center for Homeland Defense and Security Dept. of National Security Affairs Naval Postgraduate School, https://www.chds.us/coursefiles/comp/lectures/comp_global_jihadi_threat_mod02_v2/The_Global_Jihadi_Threat_Module_2.pdf [01.05.2019].
Nakashima E., Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies, „Washington Post” Friday, March 19, 2010.
Paz R., The Credibility of Jihadi Web Sites, «Wilberforce Quarterly», 2006, no. 1.
Reinares F., The Madrid Bombings and Global Jihadism, “Survival 52”, 2010, no. 2
Rocket Kit Ten: a campaign with 9 lives, Check Point Software Technologies, https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten- report.pdf [01.05.2019].
Russon M.-A., Islamic State: Fake version of Isis Amaq news app is spying on its supporters, https://www.ibtimes.co.uk/islamic-state-fake-version-isis-news-app-amaq-android- spying-its-supporters-1563313 [dostęp: 01.05.2019].
Sageman M., Sieci terroru, (przeł.) M. Król, Wydawnictwo UJ, Kraków 2008.
Sarat H., St. Peter, “Make a Bomb in the Kitchen of Your Mom”. Jihadist Tactical Technical Communication and the Everyday Practice of Cooking, «Technical Communication Quarterly», January 2017, 26(1).
Steinberg G., Die Globale Islamische Medienfront (GIMF) und ihre Nachfolger, [in:]
Jihadismus und Internet: Eine deutsche Perspektive, (red.) G. Steinberg, SWP, Berlin 2012.
Term of the week: Tajheez al-Ghazi, https://moneyjihad.wordpress.com/tag/ al-jihad-bi- al-mal/ [01.05.2019].
The Desert Falcons, Https://Www.Kaspersky.Com/Resource-Center/ Threats/Desert- Falcons-Malware [01.05.2019].
Torres-Soriano M. R., Between the Pen and the Sword: The Global Islamic Media Front in the West, November 2012, «Terrorism and Political Violence» 24(5).
US Central Command Twitter account hacked to read ‘I love you Isis’, https://www.theguardian.com/us-news/2015/jan/12/us-central-command-twitter-account-hacked- isis-cyber-attack [01.05.2019].
Vademecum bezpieczeństwa, R. Klepka, R. Kopeć, O. Wasiuta (red.), Libron, Kraków
Vidino L., Hughes S., ISIS in America: From Retweets to Raqqa, https://cchs.gwu.edu/
sites/cchs.gwu.edu/files/downloads/ISIS%20in%20America%20-%20Full%20Report_0.pdf, [01.05.
.
Wasiuta O., Wasiuta S., Mazur P, Państwo Islamskie ISIS: nowa twarz ekstremizmu, Difin, Warszawa 2018.
Wejkszner A., E-dżihad. Wirtualne pole aktywności dżihadystów, http:// sudiatrate iczne.amu.edu.pl/category/blog-strategiczny/blog-artur-wejkszner/?Ca t=9 [dostęp: 01.05. 2019].
Wejkszner A., Globalna sieć Al-Kaidy. Nowe państwo islamskie?, Difin, Warszawa 2016
Whitlock C., Al-Qaeda’s Growing Online Offensive, http://www.washington post.com/ wp-dyn/content/article/ 2008/06/23/AR2008062302135.html [01.05.2019].
Winter C., Media Jihad. The Islamic State’s Doctrine for Information Warfare, ICSR King‟s, College London, London 2017
Zamach w San Bernardino, https://www.tvn24.pl/raporty/zamach-w-san-bernardino, 1033 [01.05.2019].
Zdanowski J., Bracia Muzułmanie i inni, Wydawnictwo „Glob”, Szczecin 1986.