767: JAISH-E-MOHAMMED LAUNCHES “TUFAT AL-MUMINAT”: DIGITAL JIHAD FOR WOMEN’S RADICALISATION

 

Pakistan-based, UN-designated terror group Jaish-e-Mohammed (JeM) has launched an online jihadist training programme titled Tufat al-Muminat. The initiative targeting women serves as the foundation course for JeM’s newly announced female militant wing (Jamat ul-Muminat). The course is reportedly led by Sadiya and Samaira Azhar, sisters of JeM founder Masood Azhar, and Afreera Farooq, wife of Umar Farooq, one of the terrorists behind the April 2025 Pahalgam attack in Jammu and Kashmir.

 

According to news reports, the online sessions are scheduled to begin on 08 Nov 2025. It will be conducted for 40 minutes daily through live video platforms.​ A nominal fee of PKR 500 is being charged to each participant.  The sessions will likely focus on preaching extremist interpretations of Islam, emphasising women’s roles in jihad.

 

In the past, women played a minimal role in JeM’s activities. However, the development of a dedicated female wing and online training programs shows an increasing effort to involve women more actively. This is a significant change in JeM’s approach.  It seems JeM is taking cues from other groups like ISIS, Boko Haram, and Hamas, which have a history of recruiting women for combat and even suicide missions.

 

Digital Jihad

 

In the digital age, warfare has moved beyond physical battlefields, infiltrating the virtual realm where ideas spread faster than bullets. Digital jihad is also called “electronic jihad” or “e-jihad.” It is an online version of jihadist ideology and activities in the cyber domain. The internet, with its enormous, anonymous, and interlinked nature, is being used to disseminate extremist ideologies, attract believers, and form worldwide connections. Digital jihad is practised in the darkness of social media, encrypted applications, and AI-generated content. The process of converting extremism into a digital form is now one of the key factors influencing global terrorism.

 

Evolution of Jihad in the Digital Era. The shift from traditional insurgencies to digital jihad began in the late 1990s when extremist groups recognised the internet’s potential as both an ideological and operational tool. Al-Qaeda led this change, using basic websites for fatwas and recruitment videos after 9/11. As social media grew, this evolved into complex digital systems in which recruitment, propaganda, indoctrination, and training became borderless, efficient, and viral. By the 2010s, ISIS took it further by creating a “virtual caliphate.” Social media gave jihadist organisations—including ISIS and al-Qaeda—the opportunity to connect with a worldwide audience with minimal expenses. ISIS revolutionised digital jihad through its propaganda films, magazines (Dabiq and Rumiyah), published in multiple languages. These publications served as tools for ideological indoctrination. Recent advances include “AI jihad,” where Hamas, al-Qaeda, and ISIS use generative AI for deepfakes and memes.

 

Mechanisms of Digital Jihad. Digital jihad works on several overlapping functions: propaganda, recruitment, training, funding, and coordinating activities. The most obvious one is propaganda, which is conveyed through multimedia messages, videos, GIFs, and memes that praise martyrdom and foster a sense of belonging to the world object. Emotional and ideological vulnerabilities of isolated, susceptible youth are being targeted online for recruitment. Encrypted networks have become the preferred option for jihadists to communicate and plan. They can coordinate across continents anonymously.

 

Ideological Narratives and Online Radicalisation. The ideological axis of digital jihad blends traditional Islamic discourse with modern grievance narratives—claiming to defend the ummah (global Muslim community) against alleged Western aggression. Online preachers and influencers exploit religious symbolism to justify violence morally. Digital content idealises jihad as an empowerment or a commandment of god that builds on the feelings of alienation of most migrants and diasporic young people. This narrative warfare was institutionalised in the media jihad by ISIS, which re-packaged jihad as not only a moral imperative but as an identity of lifestyle.

 

The Role of Technology and AI in Digital Jihad. Emerging artificial intelligence-based technologies have expanded the reach of digital jihad. Extremist content is now more visible than ever before. The extremist echo chambers are self-perpetuating, bombarding people with extremist content. The jihadist groups are utilising video editing software, bot networks, and data encryption to disguise operations within legitimate cyber traffic. The deep web and dark web serve as the extremist underworld—used for secure communications, recruitment screening, and financial transfers via cryptocurrencies. Virtual environments now replace physical training camps, providing tactical and ideological grooming.

 

Countermeasures and Digital Counter-Jihad. So far, the global response to digital jihad has been two-pronged—technological solutions and Counter-ideology campaigns. Technology is being used to develop automated tools to remove extremist content from various platforms. Artificial intelligence is progressively able to identify terrorist “clusters,” connecting pages, posts, and users to map networks and eliminate them. Yet, these roadblocks put up by the authorities and tech companies are not foolproof solutions in themselves. Initiatives for the counter-jihad movements also include online deradicalisation campaigns and educational outreach programs.

 

Ethical, Legal, and Strategic Challenges. Balancing security and freedom of expression remains one of the most controversial issues in countering digital jihad. Since online monitoring prevents threats, it also threatens privacy and civil liberties. In addition to that, the definition of terrorist propaganda is somewhat subjective and can be used as a means to stifle legitimate dissent. Discrepancies in jurisdictional law also threaten international cooperation, as the definition of online extremism varies from country to country. This conflict between private rights and collective security makes it more challenging to regulate the internet.

 

Future Trajectory. Digital jihad is transitioning to decentralised networks of self-governing cells that use encrypted communications rather than a hierarchical command-and-control structure. Cyberspace has taken on the characteristics of the new caliphate—unconfined, unformed, and resilient ideologically. The rapid development of artificial intelligence, deepfakes, and virtual reality will encourage the use of these technologies by digital jihad for recruitment and psychological operations. Consequently, governments need to consider the internet as an ever-changing battlefield that requires constant, flexible, and cooperative strategies among all state and non-state actors.

 

Conclusion

“Digital jihad” refers to the use of digital technologies and cyberspace by extremist groups to further their agenda. Dealing with digital jihad requires finding a delicate balance between using technology and applying legal measures, without infringing on human rights. The victory over digital jihad will be achieved through the application of more technologies and also through combating the causes of radicalisation worldwide that globalisation has brought about.

 

Please Add Value to the write-up with your views on the subject.

 

1818
Default rating

Please give a thumbs up if you  like The Post?

 

For regular updates, please register your email here:-

Subscribe

 

 

References and credits

To all the online sites and channels.

Pics Courtesy: Internet

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from reliable and accurate sources. All copyrighted material belongs to respective owners and is provided only for wider dissemination.

 

 

References: –

  1. India Today, “Pakistan terror hypocrisy exposed again: Jaish-e-Mohammed launches online jihad course for women in Islamabad”, 22 Sep 25. https://www.indiatoday.in/world/story/jaish-e-mohammed-online-course-launch-for-women-recruitment-pakistan-terror-masood-azhar-2806662-2025-10-22
  1. Tom O’Connor, “Generating jihad: How ISIS could use AI to plan its next attack”, Newsweek, 19m Sep 2025. https://www.newsweek.com/isis-ai-terrorism-al-qaeda-attack-2132143
  1. Soumya Awasthi, “Jihadi use of artificial intelligence: A growing threat in the digital age”, Observer Research Foundation, 18 Aug 2025. https://www.orfonline.org/expert-speak/jihadi-use-of-artificial-intelligence-a-growing-threat-in-the-digital-age
  1. Ben Makuch, “AI-Generated Extremism: How Terror Groups Exploit New Tech” The Guardian, 08 July 2024.
  1. Lakomy M, “In Mapping Digital Jihad: Understanding the Structure and Evolution of al-Qaeda’s Information Ecosystem on the Surface Web”, Perspectives on Terrorism, 18(2), 82–99, 2024.
  1. Siegel D, “AI jihad: Deciphering Hamas, Al-Qaeda and Islamic State’s generative AI digital arsenal”, Global Network on Extremism and Technology (GNET), 2024.
  1. Foreign Affairs, “The Cyber Caliphate Lives On”, Foreign Affairs, March 2024.
  1. Montasari R, “Analysing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism”, (pp. 123–145), Springer, 2024.
  1. Siegel D & Chandra B, “The digital weaponry of radicalisation: AI and the recruitment nexus”, Global Network on Extremism and Technology (GNET), 2024.

757: War of Words Post Op Sindoor

 

 

Had an Interesting discussion on the Latest War of Words Post

OP Sindoor with Vishnu Som

on the “Left, Right and Center” Program on NDTV.

 

 

Constructive comments and  views on the subject

are most welcome.

 

1818
Default rating

Please give a thumbs up if you  like The Post?

 

For regular updates, please register your email here:-

Subscribe

 

 

References and credits

To all the online sites and channels.

Pics Courtesy: Internet

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from reliable and accurate sources. All copyrighted material belongs to respective owners and is provided only for wider dissemination.

 

722: Discussion on OP Sindoor (Post CAS Talk) on NDTV

 

Discussion on OP Sindoor with Vishnu Som on NDTV

 

 

Please Add Value with your views on the subject.

1818
Default rating

Please give a thumbs up if you  like The Post?

 

For regular updates, please register your email here:-

Subscribe

 

 

References and credits

To all the online sites and channels.

Pics Courtesy: Internet

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from reliable and accurate sources. All copyrighted material belongs to respective owners and is provided only for wider dissemination.

 

English हिंदी