12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

192 10. INFORMATION THEFT ON THE TACTICAL BATTLEFIELDFIGURE 10.5Logo of the Kata’ib Hezbollah.bombing of the French and American embassies in Kuwait City as well as in theassassination attempt of the then Kuwaiti Emir in 1985 were probably meant <strong>to</strong> detersupport for Iraq during the Iran-Iraq war. He fled subsequently <strong>to</strong> Iran where he fought asa senior leader of SCIRI’s Badr Brigade against Saddam Hussain’s forces during the Iran-Iraq war. He is a citizen of both Iran and Iraq and was a senior advisor <strong>to</strong> the Al-Quds forceand served for the Shi’a United Iraqi Alliance in the Iraqi parliament in 2006. The Qudsforceis an arm of the Islamic Revolutionary Guard Corps (IRGC) and handles Iranianbackedarmed groups that operate outside of Iran. Lebanon’s Hezbollah and Shi’aanti-Saddam militias are only the most popular examples of its work. KH is thought ofAl-Quds’ surrogate in Baghdad responsible for the extensive smuggle of weapons andexplosives. From spring 2007 <strong>to</strong> summer 2008, the militant group targeted U.S. forces,which prominently featured on (Lebanon’s) Hezbollah’s media outlet Al-Manar, propelledKH in<strong>to</strong> the ranks of the most popular Shi’a armed groups. 21 He also has been known <strong>to</strong>transport weapons between the two countries as well as <strong>to</strong> create militias such as KH andJaysh al-Mahdi (JAM). 22,23 FIGURE 10.6 Logo of the Lebanese Hezbollah.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!