Abstract
This chapter examines the technological opportunities of the digital age and the Internet for a multidirectional exchange of Jihadi ideas, ideology, strategy and tactics. Myriads of social networks on the Internet serve as platforms for Jihadi disputes, which shows that the Internet and telecommunication technology of the twenty-first century are of central importance for new terrorism. Currently, the World Wide Web and its numerous media channels are the most important and most commonly and frequently used communication and propaganda platforms of the Islamist and Jihadi milieu. The Internet allows free cross-border and real-time communication and interaction as well as the reception of (supposedly authentic) reports on the fate of individual Jihadis and developments in far-off conflict regions. These technological achievements of the twenty-first century have enabled the (imagined) worldwide Umma to interconnect and pose a historically new potential for Jihadi actors of new terrorism to mobilise and radicalise Muslims on a global scale.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Court of Quebec, District of Montreal, Criminal and Penal Division, HM The Queen vs. Said Namouh, no. 500–73–002831-077 and 500–73–002965-081, 1.10.2009.
- 3.
- 4.
BfV-Newsletter No. 3/2016 – Thema 1.
- 5.
Definition of netwar: “Lower-intensity conflict at the societal end of the spectrum in which a combatant is organised along networked lines or employs networks for operational control and other communications” (Arquilla & Ronfeldt, 1996, p. vii). For Internet as a “command and control” platform see Hannigan (2014).
References
Aboudi, S. (2015). Al Qaeda claims French attack, Derides Paris Rally. Reuters, 14.01.2015. Retrieved January 15, 2019, from http://www.reuters.com/article/2015/01/14/us-franceshootingaqapi-dUSKBN0KN0VO20150114
Al Awlaki, A. (2009). 44 Ways to support Jihad, no. 29. Nefa Foundation. Retrieved January 15, 2019, from http://www.anwar-alawlaki.com; www.nefafoundation.org/miscellaneous/FeaturedDocs/nefaal-Awlaki44wayssupportJihad.pdf
Al Awlaki, A. (2011). Western Jihad is here to stay. Blogspot. Retrieved January 15, 2019, from http://anwar-awlaki.blogspot.co.uk/2011/10/western-Jihad-is-here-to-stay.html
Al Qaeda. (2010). Al Qaeda training manual: Military studies in the Jihad against the Tyrants. Saffron Walden: Books Express Publishing.
Al Shehri, A. (2014). Al-Qaeda uses Twitter to Mobilize Saudi Youth. Al-Monitor, 09.04.2014. Retrieved January 15, 2019, from http://www.al-monitor.com/pulse/security/2014/04/al-qaeda-twitter-mobilize-saudiyouth.html
Al Suri, A. (2013). The Jihadi experiences: The strategy of deterring with terrorism. INSPIRE, Issue 10.
Archetti, C. (2015, February). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1). http://www.terrorismanalysts.com/pt/index.php/pot/article/view/401/html
Arquilla, J., & Ronfeldt, D. (1996). The advent of Netwar. Santa Monica, CA: RAND Corporation.
Atayf, M. (2012). Scholars speak out in favour of electronic Jihad against the enemy. Al Arabiya News, 30.01.2012. Retrieved January 15, 2019, from http://english.alarabiya.net/articles/2012/01/29/191307.html
Bardoloi, S. (2004). Money not always honey! Information Management, 20.01.2004. Retrieved January 15, 2019, from http://www.information-management.com/specialreports/20040120/7996-1.html
Barrett, D., & Mendick, R. (2014). Mainstream charities have donated thousands to Islamic group fronted by terror suspect. Sunday Telegraph, 02.03.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10670120/Mainstream-charities-have-donated-thousandsto-Islamic-group-fronted-by-terror-suspect.html
Behrens, C., & Goertz, S. (2016). Radikalisierungsprozesse von Islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11, 686–693.
Berger, J., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. Washington, DC: The Brookings Institution.
Berger, J., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: King’s College, International Centre for the Study of Radicalisation and Political Violence.
Bertram, S., & Ellison, K. (2014). Sub Saharan African terrorist groups’ use of the Internet. Journal of Terrorism Research, 5(1), 5–26.
Brandon, J. (2008). Virtual caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion.
Brandon, J. (2010). Terrorists targeting children via Facebook, Twitter. Fox News, 15.03.2010. Retrieved January 15, 2019, from www.foxnews.com/tech/2010/03/15/terrorists-targeting-children-via-facebook-twitter.html
Brooking, E. (2015). The ISIS propaganda machine is horrifying and effective: How does it work? Council on Foreign Relations, Retrieved August 21, 2015.
Bundesamt für Verfassungsschutz. (2013). BfV-Newsletter 1/2013, Thema 6.
Bundesamt für Verfassungsschutz. (2016). BfV-Newsletter 3/2016, Thema 1.
Bundeskriminalamt/Bundesamt für Verfassungsschutz. (2016). Analyse der Radikalisie- rungshintergründe und -verläufe der Personen, die aus Islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin.
Burger, R. (2016). Anschlag auf Sikh-Tempel: Jetzt stehen die Dschihadisten vor Gericht. Frankfurter Allgemeine Zeitung. 07.12.2016. Retrieved January 15, 2019, from http://www.faz.net/aktuell/politik/kampf-gegen-den-terror/prozess-beginn-um-terror-anschlag-auf-sikh-tempel-in-essen-14562221.html
Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.
Conway, M. (2006, April). Terrorism and the Internet: New media – New threat? Parliamentary Affairs, 59(2), 283–298.
Corman, S. (2011). Understanding the role of narratives in extremist strategic communications. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 36–43). Wright-Patterson Air Force Base, OH: AF Research Laboratory.
Cornish, P., Lindley-French, J., & Yorke, C. (Eds.). (2011). Strategic communication and national strategy: A Chatham House report. London: Royal Institute of International Affairs.
Directorate for External Policies, Policy Department. (2013). The involvement of Salafism/Wahhabism in the support and supply of arms to rebel groups around the world. Brussels: European Parliament.
Eck, K., & Hultmann, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal Peace Resolution, 44, 233–246.
EUROPOL. (2009). TE-SAT 2009: EU terrorism situation and trend report. Den Haag. External Operations Reconnaissance Team (2014).
Farwell, J. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.
Fink, N., & Barclay, J. (2013). Mastering the narrative: Counterterrorism strategic communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation.
Fisher, A. (2016). Swarmcast: How Jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–19.
Freeman, M., & Ruehsen, M. (2013). Terrorism financing methods: An overview. Perspectives on Terrorism, 7(4), 6–26.
Gambetta, D., & Hertog, S. (2010). Engineers of Jihad. Sociology working paper 2007–10. Oxford: Department of Sociology, University of Oxford.
Gendron, A. (2006). Militant Jihadism: Radicalization, conversion, recruitment. Trends in terrorism series (Vol. 4). Ottawa: Integrated Threat Assessment Centre.
Gendron, A., & Rudner, M. (2012). Assessing cyber threats to Canadian infrastructure. Canadian security intelligence service occasional paper. Ottawa: Canadian Security Intelligence Service.
General Intelligence and Security Service of the Netherlands. (2012). Jihadism on the web: A breeding ground for Jihad in the modern age. Zoetermeer: Algemene Inlichtingenen Veiligheidsdienst.
Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei, 26–30.
Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: C.F.Müller.
Goertz, S., & Holst, M. (2016). Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von Jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform, 6, 1–14.
Gulsby, K., & Desa, A. (2014). The new Al-Qaeda: Decentralization and recruitment. Security and Intelligence Studies Journal, 1(2), 53–62.
Hannigan, R. (2014). The web is a terrorist’s command-and-control network of choice. Financial Times, 03.11.2014. Retrieved January 15, 2019, from https://www.ft.com/content/c89b6c58-6342-11e4-8a63-00144feabdc0
Harris-Hogan, S. (2012). Australian neo-Jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.
Hofman, B. (2006). The use of the Internet by Islamic extremists. CT-262-1, May 2006, Testimony presented to the house permanent select committee on intelligence, on May 4, 2006. Testimony series. Santa Monica, CA: RAND Corporation. Retrieved January 15, 2019, from https://www.rand.org/content/dam/rand/pubs/testimonies/2006/RAND_CT262-1.pdf
Ilardi, G. (2013). Interviews with Canadian radicals. Studies in Conflict & Terrorism, 36(9), 713–738.
Ilyas, M. (2013). Islamist groups in the UK and recruitment. Journal of Terrorism Research, 4(2), 37–48.
International Monetary Fund, Legal Department. (2003). Suppressing the financing of terrorism: A handbook for legislative drafting. Washington, DC: International Monetary Fund.
Irshaid, F. (2014). How ISIS is spreading its message online. BBC News, 19.06.2014. Retrieved January 15, 2019, from http://www.bbc.co.uk/news/world-middle-east-27912569
Jacobson, M. (2010). Terrorist financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.
Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 11, 243–285.
Kaya, A. (2010). Individualization and institutionalization of Islam in Europe in the age of securitization. Insight Turkey, 12(1), 47–63.
Khosrokhavar, F. (2009). Inside Jihadism: Understanding Jihadi movements worldwide. London: Routledge.
Kjuka, D. (2013). Digital Jihad: Inside Al-Qaeda’s social networks. The Atlantic, 06.03.2013. Retrieved January 15, 2019, from www.theatlantic.com/international/archive/2013/03/digital-Jihad-inside-al-qaedas-social-networks/273761/
Klausen, J. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.
Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.
Koplowitz, H. (2013). US formally admits killing Anwar Al-Awlaki, 3 other citizens, in drone strikes. International Business Times, 23.05.2013. Retrieved January 15, 2019, from www.ibtimes.com/us-formally-admits-killing-anwar-al-awlaki-3-other-citizens-drone-strikes-full-text-1275805
Lemieux, A., & Nill, R. (2011). The role and impact of music in promoting (and countering) violent extremism. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 143–152). Wright-Patterson Air Force Base, OH: AF Research Laboratory.
Levitt, M. (2004). Charitable organizations and terrorist financing: A war on terror status-check. Paper presented at the workshop “The Dimensions of Terrorist Financing,” 19.03.2004. University of Pittsburgh. https://www.washingtoninstitute.org/policy-analysis/view/charitable-organizations-and-terrorist-financing-a-war-on-terror-status-che
Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training: Part 1. Terrorism Monitor, 5(1), 1–4.
Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542.
Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication, 19(1), 75–86.
Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s socially mediated civil war. Blogs and Bullets III. Peaceworks 91, January 2014. Washington, DC: United States Institute for Peace.
Mackey, R. (2014). The case for ISIS, made in a British accent. New York Times, 20.06.2014. Retrieved January 15, 2019, from http://www.nytimes.com/2014/06/21/world/middleeast/the-case-for-isis-made-ina-british-accent.html
Masciandaro, D. (2004). Global financial crime: Terrorism, money laundering and offshore centres. Burlington, VT: Ashgate.
Moon, D. (2010). Anwar al-Awlaki: Translator of Jihad. Asia Times, 07.01.2010. Retrieved January 15, 2019, from http://www.atimes.com/atimes/Middle_East/LA07Ak05.html
Musawi, M. (2010). Cheering for Osama: How Jihadists use Internet discussion forums. London: Quilliam Foundation.
Nacos, B. (2006). Communication and recruitment of terrorists. In J. Forest (Ed.), The making of a terrorist: Recruitment, training and root causes. Westport, CT: Praeger Security International.
NDR. (2016). Die Geschichte der Safia S. 18.10.2016. Norddeutscher Rundfunk. Retrieved January 15, 2019, from http://www.ndr.de/nachrichten/niedersachsen/hannover_weser-leinegebiet/Die-Geschichte-der-Safia-S,safias102.html
Nelson, F. (2014). Terrorism in the UK: Social media is now the biggest Jihadi training camp of them all. Daily Telegraph, 25.04.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10786205/Terrorism-in-the-UK-Social-media-is-now-the-biggest-Jihadi-training-camp-of-them-all.html
Nesser, P. (2004). Jihad in Europe: A survey of the motivations for Sunni Islamist terrorism in post-millennium Europe FFI report. Oslo: Norwegian Institute for Defence Research.
Neumann, P. (2016). Radicalized: New Jihadists and the threat to the west. London: I.B. Tauris.
Nissen, T. (2014). Terror.com: IS’s social media warfare in Syria and Iraq. Contemporary conflicts: Military Studies, 2(2). Copenhagen: Royal Danish Defence College.
Phares, W. (2005). Future Jihad: Terrorist strategies against the West. New York: Palgrave Macmillan.
Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Köln: Wolters Kluver Luchterhand.
Roy, O. (2004). Globalised Islam: The search for a New Ummah. London: Hurst & Co.
Rudner, M. (2013). Al Qaeda’s twenty-year strategic plan: The current phase of global terror. Studies in Conflict & Terrorism, 36(12), 953–980.
Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 40(1), 10–23.
Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.
Senator für Inneres Freie Hansestadt Bremen. (2016). Verfassungsschutzbericht 2015. Bremen.
Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3(3), 373–387.
SITE. (2017). Media units of Jihadi groups. Retrieved January 15, 2019, from https://ent.siteintelgroup.com/mediagroups.html
Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global Jihad. Washington, DC: Georgetown University Press.
Sydow, C. (2012). German Islamists target youth on the Internet. Der Spiegel, 01.11.2012. Retrieved January 15, 2019, from http://www.spiegel.de/international/germany/german-Jihadists-target-youthon-the-internet-study-finds-a-864797.html
Syrian Observatory for Human Rights (SOHR). More than 2000 Syrian civilians executed by IS during 18 months since declaring its alleged caliphate. 29.12.2015. Retrieved January 15, 2019, from http://www.syriahr.com/en/?p=41663
Taylor, M., & Ramsay, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter? In E. Kessels (Ed.), Countering violent extremist narratives (pp. 94–111). Den Haag: National Coordinator for Counterterrorism.
The Netherlands Office of the Coordinator for Counterterrorism. (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.
Theohary, C., & Rollins, J. (2011). Terrorist use of the Internet: Information operations in cyberspace. Washington, DC: Congressional Research Service Report for Congress.
U.K. House of Commons, Home Affairs Committee. (2012). Roots of violent radicalization. London: The Stationery Office.
Ulph, S. (2006). The next stage in counter-terrorism: Analysing Jihadist radicalization on the web. The Jamestown Foundation. Retrieved January 15, 2019, from www.jamestown.org/docs/JR-Slides.pdf. 23.10.2006
Ungerleider, N. (2013). How Al-Shabaab uses the Internet to recruit Americans. Fast Company, 26.9.2013. Retrieved January 15, 2019, from http://www.fastcompany.com/3018339/how-al-shabaab-uses-the-internet-to-recruit-americans?partnerDrss&utm_sourceDfeedburner&utm_mediumD-feed&utm_campaignDFeed%3ACfastcompany%2FheadlinesC%28FastCCompany%29
Vidino, L. (2006). Al Qaeda in Europe: The new battleground of international Jihad. Amherst, NY: Prometheus Books.
Weimann, G. (2006). Terror on the Internet: The new agenda, the new challenges. Washington, DC: United States Institute of Peace.
Weimann, G. (2011). Cyber-Fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.
Whitehead, T. (2014). Self styled ‘father of terrorism’ facing jail. Daily Telegraph, 05.07.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10947387/Self-styledfather-of-terrorism-facing-jail.html
Zelin, A. (2013). Foreign Jihadists in Syria: Tracking recruitment networks. The Washington Institute for Near East Policy, Policywatch 2186, 19.12.2013. Retrieved January 15, 2019, from https://www.washingtoninstitute.org/policy-analysis/view/foreign-jihadists-in-syria-tracking-recruitment-networks
Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In B. Said & H. Fouad (Eds.), Salafismus: Auf der Suche nach dem wahren Islam (pp. 320–349). Freiburg: Herder.
Zelin, A., & David, S. (2013). Up to 11,000 foreign fighters in Syria; Steep rise among Western Europeans. ICSR Insight, 17.12.2013. The Washington Institute for Near East Policy. Retrieved January 15, 2019, from https://www.washingtoninstitute.org/policy-analysis/view/up-to-11000-foreign-fighters-in-syria-steep-rise-among-western-europeans
Zipkin, N. (2014). Have 1,000 followers? You’re in the 96th percentile of Twitter users. Entrepreneur, 19.12.2014. Retrieved 07.04.2017, from http://www.entrepreneur.com/article/230487
Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 3, 12–16.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Goertz, S., Streitparth, A.E. (2019). New Technology in the Hands of the New Terrorism. In: The New Terrorism. Springer, Cham. https://doi.org/10.1007/978-3-030-14592-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-14592-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14591-0
Online ISBN: 978-3-030-14592-7
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)