* tmc * in patientia vestra habetis animam vestram * tmc *

Dear Reader,

(including all its subsidiary (and/or sister) pages on "coombs.anu.edu.au" server) has permanently ceased its publishing operations on Friday 21st January 2011.

All of the online resources reported here have been thoroughly checked at the time of their listing. However, it is possible that, with the with the passage of time, many of the originally reported materials might have been removed from the Internet, or changed their online address, or varied the scope and quality of their contents.

Fortunately, in several cases it is possible to access many of the older versions of the resources listed in the MONITOR. This can be easily done via the free services of the "The Internet Archive" http://web.archive.org/, a remarkable brainchild of Brewster Kahle, San Francisco, CA.

- with warm regards -

Editor, Dr T. Matthew Ciolek.

Canberra, 21 January 2011.

27 February 2007

Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad


27 Feb 2007

The Middle East Media Research Institute (MEMRI), Washington, DC, US

"Inquiry and Analysis Series - No. 329 - Jihad and Terrorism Studies, February 27, 2007. Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad - By E. Alshech."

"Electronic jihad is a phenomenon whereby 'mujahideen' use the Internet to wage economic and ideological warfare against their enemies. Unlike other hackers, those engaged in electronic jihad are united by a common strategy and ideology which are still in a process of formation. This paper aims to present the phenomenon of electronic jihad and to characterize some of its more recent developments." - E. Alshech.

Site contents:
1. Organized Electronic Jihad; 2. The Ideology and Ethical Boundaries of Electronic Jihad; 3. The Objectives of Electronic Jihad; 3.1. Eliminating Websites That Harm Islam; 3.2. Avenging the Death of Martyrs and the Suffering of Muslims and Imprisoned 'Mujahideen' Worldwide; 3.3. Inflicting Economic Damage on the West and Damaging its Morale; 3.4. Bringing About the Total Collapse of the West; 4. Actual Attacks and Their Effects; 4.1. Attack Strategies; 4.2. Coordination of Attacks; 4.3. Instructions for Attack Coordinators; 4.4. Announcement of a Ping Attack Against a Website That Harms Islam; 4.5. A General Call to Participate in a Virus Attack; 5. Electronic Jihad: A Nuisance or a Real Threat? 6. References & Notes.

Earlier MEMRI articles on related topics include:
* Islamist Websites as an Integral Part of Jihad: A General Overview (February 21, 2007)
* Islamist Forum Participants Discuss Threat to Islamist Sites and Ways to Avoid Exposure On-Line (February 14, 2007) http://memri.org/bin/articles.cgi?Page=subjects&Area=jihad&ID=SP146207

[The author, Dr. Alshech is the Director of the Jihad and Terrorism Studies Project at MEMRI. - ed. ]

URL http://memri.org/bin/articles.cgi?Page=subjects&Area=jihad&ID=IA32907

Internet Archive (www.archive.org) - the paper was not archived at the time of this abstract. However, in a few weeks time it will be available at http://web.archive.org/web/*/http://www.memri.org/jihad.html - ed.

Link reported by: T. Matthew Ciolek (tmciolek--at--coombs.anu.edu.au)

* Resource type [news - documents - study - corporate info. - online guide]:
* Publisher [academic - business - government - library/museum - NGO - other]:
* Scholarly usefulness [essential - v.useful - useful - interesting - marginal]:
* External links to the resource [over 3,000 - under 3,000 - under 1,000
- under 300 - under 100 - under 30]: under 30

Please note that the above details were correct on the day of their publication. To suggest an update, please email the site's editor at tmciolek@ciolek.com