Thu 28 May 2015 01:01:32 AM CDT : This site is about to be upgraded to a new software release. If you are in the process of entering information, please complete it in the next few minutes and then log off, to ensure that you are not interrupted. If you were about to start entering details, please wait until this message is removed. You may continue to browse content on the site during the upgrade if you wish. We apologize for any inconvenience this may cause.
Please note, by purchasing a MEMRI JTTM Report you are agreeing to MEMRI's Copyright information.
The existing published research pertaining to the world of virtual jihad has focused mostly on the content published in jihadist websites and forums. For the most part, scholars and investigators have followed the news posted on jihadist forums, analyzed the various ideological views reflected in theme, and scrutinized jihadists' writings regarding their operational intentions and capabilities. Little if any research has centered on the technical aspects of virtual jihad. The purpose of this article is to allow the public a glimpse behind the scenes of the shadowy world of virtual jihad. More specifically, the article will study seven jihadi forums, with a strong focus on one of them, and analyze the ways in which jihad forums/websites are created, maintained, managed, secured, and, possibly, funded.ly.