Posts tagged ‘Twitter’

YouTube & Muslims Against Crusades – another match made in hell

A friend alerted me to a fantastic article that continues to connect the violent jihadi movement to YouTube.  (H/T Andrea.)  The article is very thorough, and details how the terrorists use YouTube to spread their cult of violence and what types of groups are using it.  This nugget, to me, was extremely interesting…

From MEMRI via Tolerant No More ~ Counter Jihad Knights:

 

November 2011: MAC Banned In U.K., MAC Website and Twitter Accounts Are Shut Down – But MAC YouTube Channels Continues

On November 9, 2011, the U.K. Home Office banned MAC; membership, holding meetings, or wearing clothing or “articles” to show support for the organization are now criminal offenses punishable by up to 10 years in jail. The official announcement of the ban, on the Home Office website, read: “Terror organisation proscribed: The Home Secretary Theresa May today laid an Order proscribing Muslims Against Crusades effective from midnight tonight. She said: ‘I have today laid an Order which will proscribe Muslims Against Crusades from midnight tonight. This means being a member of or supporting the organisation will be a criminal offence. I am satisfied Muslims Against Crusades is simply another name for an organisation already proscribed under a number of names including Al Ghurabaa, The Saved Sect, Al Muhajiroun and Islam4UK. The organisation was proscribed in 2006 for glorifying terrorism and we are clear it should not be able to continue these activities by simply changing its name. ”

Following this official announcement, the MAC’s website and Twitter account were shut down. However, the MAC YouTube page (youtube.com/user/MACrusaders) as well as the YouTube page of its leader Anjem Choudary (youtube.com/user/anjemchoudary) remain active.(emphasis mine)

Now how is it that Twitter can act so quickly to shut down the terrorists, but Google/YouTube just pussyfoots around the subject? Maybe Twitter needs to teach the folks over at Google/YouTube a thing or two.

I’m also curious as to where MAC’s website was hosted.  Surely not Blogger or it would most likely still be around as well.  According to the Jawa Report, it was hosted in Canada – we may all Stable Hand & the Jawa Report readers to thank for the fact that MAC’s site is no longer there rather than the U.K.’s Home Office.  But who’s keeping score?

Infiltrate this!

The morons over at  Shura al Mujahideen fee Junubu Afarika (South Africa) are all a-twitter over their “brother” Jose’s arrest on terrorism charges and the implications it might — and should — have for muslims “speaking the truth” on social networking forums.  Of course the well-documented transgressions committed by poor ol’ Jose are all false.   *insert ginormous eye roll here.*  Of COURSE they are always innocent!  LOL!

As a result they are looking to “infiltrate” and “keep an eye on” anyone who is countering their BS – specifically mentioning Internet Hagannah and Operation YouTube Smackdown.

When they gather information on the supporters of the mujahideen, be it about their youtube channels and friends, blogger profiles and blogs or their facebook accounts, they share it among themselves by posting it on their forum (forum.internet-haganah.com). If any brother or sister is to come across this, make sure that you inform those who are being spied on so they may delete their accounts and start up new ones or at least so they may be more cautious.

Oh nooooooes!  They are gonna watch us!  Run for the hills!  Hey boneheads – if we didn’t want you to see it, you wouldn’t know it was there — just sayin’!

Funny that they are all worried about the implications of the arrest.  Probably because they are guilty of promoting terrorism at their site as well.  And who do you think helps them out?  Yep!  You got it!  Google/YouTube.  Their blog is on Blogger — the free Google blogsite.

And their videos, linked and embedded at their Blogger site are hosted, of course, at YouTube.  Here’s a connect-the-dots series of screen caps so you can see for yourself.  Clicking this link on their sidebar:

Will take you here:

Not surprisingly, it’s a video hosted at none other that YouTube.

And yes – you can see on the statistics for the video that it was unloaded on 11/26/11 and embedded on 11/28/11.

You can also see the search topics by which people using YouTube found the video — which means that presumably YouTube/Google should be able to use their own search filters to find it as well.  And if they were truly serious about removing terrorist videos from YouTube, they would.  The hypocrisy is stunning! Google really needs to change their slogan.

Zach’s Twitter Fan Club

They sure do luv him!

South Park creators threatened by radical muslim website owner

Our little wannabe terrorist friend Zach from over at themujahidblog and revolutionmuslim is getting a little big for his britches. What is it with these idiots who make death threats because of cartoons, for crying out loud? Oh wait – it wasn’t a threat, it was a warning, right Zach? Semantics. When you put up a picture of Theo Van Gogh’s murder scene and ask if Matt Stone and Trey Parker (the creators of South Park) remember that, you are issuing a threat.

For the record, here’s the cartoon….

Here’s the threat…er….warning:

To Zach — hey, you mental midget, a cartoon is entertainment and the very fact that you are threatening death to it’s makers completely confirms the point of the cartoon! Irony much? That backpack you carried around GMU must have been just another prop.

The face of a terrorist? Maybe. More likely a traitor. But more than that it’s the face of a spoiled brat American kid who is gaming the system.

….

The Jawa Report has a bunch more.

H/T to Celebrimbor who found this yesterday, but none of use got around to checking it out and posting about it until today. You rock, dude!

The Internet as a Terrorist’s Tool: An Emerging Battlefield

As we are reeling from the revelation of yet another attempted plot to assassinate Lars Vilks for his cartoon image of Mohammed as a dog, the media would have us believe that such “radical” and “extreme” violence is something new – something that has evolved in Islam over time.  Conversely, according to IslamWatch, “Muhammad’s life is a testament of ceaseless raids and plundering expeditions of highway caravans and waging wars against the infidel” in which “he himself had orchestrated more than one hundred raids, plundering expeditions and wars.”  In the days of Muhammed, groups of men required to meet together physically to plan and carry out their offensives.  From those fledgling days of congregated warfare, to yesterday’s small groups who trained together in order to execute their missions, to today’s “lone wolf,” the terrorists have shown an amazing ability to adapt to changing technologies.  The terrorist of the future will find the tools of the internet increasingly important for their “open source jihad.”  If we do not meet the terrorists on this internet battlefield, it will be at our own expense.

Mohammed had to hold planning meetings with his advisors, recruit men to follow him, institute training camps, and then follow through with his raids. Because of the lack of technology, all of these things demanded real, physical proximity. Fast forward to 1983.  An organization known as “Islamic Jihad” claims responsibility for the bombings of the Marine barracks in Beirut. Planning meetings for this were allegedly held in Damascus – a physical meeting place. In 1993, the first World Trade Center bombing was conducted by Ramzi Yousef and others.  Ramzi had spent time in Al Qaeda training camps in Afghanistan and received explosives training there.  His uncle, Khalid Sheikh Mohammed who funded the mission, began his jihad training in his youth and was also trained by Al Qaeda after personally meeting Afghan mujahid Abdul Rasul Sayyaf.  Khalid Sheik Mohammed went on to plan other terrorist attacks and eventually to mastermind the World Trade Center and Pentagon attacks of 2001.  In 1998, the US Embassy bombings in Tanzania, Nairobi and Dar es Salaam were pulled off by 21 people associated with Egyptian Islamic Jihad – including Osama bin Laden and Ayman al-Zawahiri.  The operatives for this attack had trained together at Hezbollah training camps in Lebanon.  While these groups were becoming increasingly efficient, there was still a need for centralized planning and human interaction in order to ensure success.

Today we are finding that the evolving state of terrorism is trending toward a “lone wolf” scenario.  On November 5, 2009, Nidal Hassan acted alone when he opened fire at Ft. Hood and killed 13 people and wounded 30 more.  It later turned out that Hasan had been in email contact with radical Islamic cleric Anwar al Awlaki, who is widely believed to be an al Qaeda recruiter.  In December of 2009, five American youths from Virginia were arrested in Islamabad, Pakistan, where they had tried to contact terrorist groups to volunteer for Jihad after having made email contact with Taliban organizations beforehand.  On Christmas Day of 2009, Nigerian-born Farouk Abdulmutallab, who had been in contact with Anwar al Awlaki in Yemen, tried to bring down an airliner over Detroit, but succeeded only in giving himself some nasty burns on his upper thighs, thereby earning himself the derisive nickname “the underwear bomber.”  Al Awlaki admitted when interviewed that he had “kept in contact” with Abdulmtallab.  Most recently, the YouTube hirabist Colleen “Jihad Jane” LaRose, whose  downward spiral was documented by members of Operation YouTube Smackdown, The Jawa Report, Quoth The Raven, Internet Anthropologist Think Tank and others, began an online relationship with terrorists, traveling to Europe to allegedly marry a foreign national in order to commit the murder of Lars Vilks of Sweden, hoping ultimately to become a martyr. She used internet chat rooms and emails to help organize the plan and recruit others into it.  In each of these cases, the internet has played an vital role in bringing together easily manipulated individuals and terrorist mentors.

As we look to the future, the trend away from centralization and toward individuals acting, seemingly on their own, is likely to continue.  Rather than converging en masse to strategize with one’s followers, a mentor now only requires a simple laptop and internet access or internet active cell phone whereby he may send instructions to would-be jihadis.  The terrorist blog mujahidblog.com (link anonymized) calls this “open source jihad” and explains that it benefits violent jihad because, among other things, it can be accessed anywhere with no physical gathering space necessary, people who are not very well educated can be easily motivated to fight, and that because of the nature of the internet it provides “amplified propaganda capabilities.”  Indeed, Anwar Al Alwiki, who had been in contact with both Nidal Hasan, the Ft. Hood shooter, and Farouk Abdulmutullab, the Christmas Day epic fail bomber, has produced a pamphlet outlining “44 Ways to Support Jihad,” (also found here and here on YouTube.)  Along with the admonitions of fundraising for the Mujahideen and encouraging others to fight in Jihad, number 29 is an item which he lists as “WWW Jihad.”  He calls these people the “internet mujahideen” and encourages them to establish discussion forums related to Jihad, to establish email lists, to post or email Jihad literature and news, and to set up websites related to Jihad.  These admonitions play directly into the activity we have seen on the internet, and will continue to do so in the future.

From the time of Muhammed, Islamic jihad has featured violence against non-believers which demanded tangible presence to be executed.   As terrorist movements become increasingly characterized by “lone wolf” scenarios and as radical Islamic clerics call for even greater use of technology to both join them together and also to spread propaganda, terrorist’s use of forums such as YouTube, Twitter, MySpace, LiveLeak and Facebook and any other internet technologies which evolve to encite and train their followers will become that much more important to their ability to conduct the business of terrorism.

These uses of technology and the internet must be taken seriously if we wish to impede the spread of terrorism. To disregard threats posed over the internet, which is emerging as a vital terrorist tool for battle, is to seal our own fate.

————–

Contributions to this article were made by Andrea, Jer and bartender.