Internet Jihad And Cyber Jihad

Read Complete Research Material

Internet Jihad and Cyber Jihad

Internet Jihad and Cyber Jihad



Internet Jihad and Cyber Jihad

Introduction

The terrorists are engaged in a jihad in line, characterized by the use of the Internet to raise funds, distribute messages and directives, recruit and proselytize. It is impossible to close the entire presence of terrorists on the Internet, but this article details a proposal that can have a marked impact on the presence of terrorists on the Internet. Using existing laws, it is possible to regionalize terrorist sites, limiting them to an extremely limited number of countries from which they can receive Internet services. After the terrorist message is limited to a particular area, amending the current law could allow an embargo on cyber jihadist sites and their supporters. These efforts, coupled with diplomatic cooperation is still the effort to reduce the impact of jihadist websites, while simultaneously increasing the capacity of governments to control these sites and, if necessary, shut them down.

The "Here you have" worm is spreading like wildfire across computer networks, consolidate servers, e-mail down and would disrupt important American organizations, including Disney, Procter & Gamble, Wells Fargo and NASA (National Aeronautics and Space Administration). She is known as "Here you have" because it is sometimes the subject line of messages used to distribute malware.

Much of the worm's code is identical to an earlier piece of malware that was published last month, and both refer to a hacker who uses the Libyan resistance behalf of Iraq, which has been trying to form a group of hackers called the Brigades of Tariq ibn Ziyad, said Joe Stewart, director of malware research with SecureWorks.

"Either this one-by-one is committed with this virus, or someone likes to accept as factual that the assembly that individual is engaged in this virus," Stewart said. "There are many pointers to this group."

The purpose of Tariq ibn Ziyad is to "penetrate U.S. bureaus belonging to the U.S. Army," opposition in Iraq said, according to a Google translation of his posted letters affirming the group.

Resistance Iraq has not responded to an e-mail sent to his Yahoo seeking comment.

It is not clear why the first version of the worm does not spread widely last month - security provider Symantec rated "low" risk - but Stewart said that the people behind it might be more victims spammed initial this time. "Here you have" can also include new elements that have caused spread more effectively.

The worm used the August e-mail Iraq_resistance@yahoo.com, and Resistance in Iraq words appear in the binary code of the latest version of the software. In addition, a back door component of the worm - which could be used by designers to connect remotely on an infected system - trying to connect to a computer that uses the name of Tariq ibn Ziyad. Other components of the worm - a password stealer and e-mail sending software - were written by programmers in Arabic, another indication that the resistance in Iraq might be behind the worm.

Security researchers initially thought that the worm did little ...
Related Ads
  • Jihad Role In Islam
    www.researchomatic.com...

    Describe your understanding of the true role of Jiha ...

  • Internet Jihad
    www.researchomatic.com...

    Internet jihad , cyber terrorism, money ...

  • Jihad Vs. Mcworld
    www.researchomatic.com...

    First, Jihad is a retribalization of large sw ...

  • Islamic Jihad Union
    www.researchomatic.com...

    Jihad is one of the most misunderstood and most dist ...

  • Mc World And Jihad
    www.researchomatic.com...

    Mc World And Jihad, Mc World And Jihad Research Pape ...