13.01.2015 Views

222467to222472

222467to222472

222467to222472

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Multi-faceted Roles of Women Inside Al-Qaeda<br />

majority of al-Qaeda’s women operate in a way that is invisible to the public eye,<br />

they have a strong impact on the current and next generation of terrorists and the<br />

organizations. It should be noted that the intensity of the involvement of women<br />

inside terrorist organizations varies based on specific geographical regions.<br />

The growth of women’s involvement in the al-Qaeda movement can be divided in<br />

three waves. The first wave took place 10 years ago when women married to<br />

Europe’s militant Islamists followed their husbands to Taliban-ruled Afghanistan.<br />

The second one occurred when women started encouraging their male relatives to<br />

follow the “right” interpretation of Islam, began to facilitate the operational work<br />

of the organization, and organized themselves into “sisterhoods”. While the second<br />

wave continues to grow, the opening of the third wave was heralded by the suicide<br />

attacks of Sajida Mubaraark al-Rishawi, Dilnoza Holmuradova and Muriel<br />

Degauque.<br />

Following the argument that successful counter-terrorism should address both the<br />

motivation and the operational capabilities of a terrorist organization, there is an<br />

essential need to identify and develop measures and policies specifically tailored<br />

for women.<br />

Notes<br />

1 He was killed by Saudi security forces in May 2003.<br />

2 Document on Jihadist Message Board Calls for Women to Take Active Role in<br />

Jihad, retrieved 16.10.2005 SITE Institute,<br />

http://siteinstitute.org/bin/printerfriendly/pf.cgi.<br />

3 They use the Internet to deliver threats and disseminate multimedia content designed to<br />

create fear and panic, as seen in Iraq. Nearly all insurgent groups in Iraq have media<br />

teams posting statements and creating videos and web broadcasts.<br />

4 They use a sophisticated array of open-source technologies, including search engines and<br />

website analytics, to collect intelligence on enemies and potential recruitment and<br />

funding sources.<br />

5 They leverage Internet user demographics and online front groups to execute aggressive<br />

funding drives, collecting vast amounts of money through difficult-to-track online<br />

payment systems.<br />

6 The Internet and advanced technology provide them with powerful tools for recruiting<br />

and mobilizing members through integrated communications.<br />

157

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!