222467to222472
222467to222472
222467to222472
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The Multi-faceted Roles of Women Inside Al-Qaeda<br />
majority of al-Qaeda’s women operate in a way that is invisible to the public eye,<br />
they have a strong impact on the current and next generation of terrorists and the<br />
organizations. It should be noted that the intensity of the involvement of women<br />
inside terrorist organizations varies based on specific geographical regions.<br />
The growth of women’s involvement in the al-Qaeda movement can be divided in<br />
three waves. The first wave took place 10 years ago when women married to<br />
Europe’s militant Islamists followed their husbands to Taliban-ruled Afghanistan.<br />
The second one occurred when women started encouraging their male relatives to<br />
follow the “right” interpretation of Islam, began to facilitate the operational work<br />
of the organization, and organized themselves into “sisterhoods”. While the second<br />
wave continues to grow, the opening of the third wave was heralded by the suicide<br />
attacks of Sajida Mubaraark al-Rishawi, Dilnoza Holmuradova and Muriel<br />
Degauque.<br />
Following the argument that successful counter-terrorism should address both the<br />
motivation and the operational capabilities of a terrorist organization, there is an<br />
essential need to identify and develop measures and policies specifically tailored<br />
for women.<br />
Notes<br />
1 He was killed by Saudi security forces in May 2003.<br />
2 Document on Jihadist Message Board Calls for Women to Take Active Role in<br />
Jihad, retrieved 16.10.2005 SITE Institute,<br />
http://siteinstitute.org/bin/printerfriendly/pf.cgi.<br />
3 They use the Internet to deliver threats and disseminate multimedia content designed to<br />
create fear and panic, as seen in Iraq. Nearly all insurgent groups in Iraq have media<br />
teams posting statements and creating videos and web broadcasts.<br />
4 They use a sophisticated array of open-source technologies, including search engines and<br />
website analytics, to collect intelligence on enemies and potential recruitment and<br />
funding sources.<br />
5 They leverage Internet user demographics and online front groups to execute aggressive<br />
funding drives, collecting vast amounts of money through difficult-to-track online<br />
payment systems.<br />
6 The Internet and advanced technology provide them with powerful tools for recruiting<br />
and mobilizing members through integrated communications.<br />
157