Skip to main content

Die Effektivität von Counter-Terrorismus am Beispiel des Bundestrojaners: Möglichkeiten kontrafaktischer Analyse

  • Chapter
Terrorismusforschung in Deutschland
  • 3105 Accesses

Zusammenfassung

Die Evaluierung der Effektivität von Counter-Terrorismus (CT) ist eine methodische und theoretische Herausforderung. Traditionelle Ansätze wie Zeitreihen analysieren Ereignisse aus der Vergangenheit, können aber keine Aussagen über die Wirksamkeit von Gegenmaßnahmen über einen längeren Zeitraum in der Zukunft geben. In diesem Beitrag wird argumentiert, dass kontrafaktische Analyse einen Mehrwert bei der Antizipierung von Substitutions-und Innovationseffekten bietet und damit die Konsequenzen terroristischen Verhaltens besser abbildet. Anhand des Beispiels des Bundestrojaners als CT-Instrument wird gezeigt, dass diese Maßnahme terroristisches Verhalten zwar kurzfristig behindert, terroristische Akteure längerfristig aber Mittel und Wege finden werden, um den Bundestrojaner zu umgehen. Die Überwachung terroristischer Aktivitäten wird damit erschwert und nicht erleichtert.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  • Abrahms, M. (2008). What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy. International Security, 32(4), 78–105.

    Article  Google Scholar 

  • APA/Reuters/red. (2010). Saudi-Arabien verhandelt noch über Blackberry-Messenger. derStandard.at, 6.8.2010. www.derstandard.at/1280984148441/Zensur-Saudi-Arabienverhandelt-noch-ueber-Blackberry-Messenger. Zugegriffen: 06.08.2010.

  • Arce, D. G. & Sandler, T. (2003). Counterterrorism: A Game-Theoretic Analysis. www.usccis.org/tools/software/original/public/fileforward.php?Id=3233. Zugegriffen: 22.07.2008.

  • Atran, S. (2006). A Failure of Imagination (Intelligence, WMDs, and ‘Virtual Jihad’). Studies in Conflict & Terrorism, 29(3), 285–300.

    Article  Google Scholar 

  • Barros, C. P. (2003). An Intervention Analysis of Terrorism: The Spanish ETA Case. Defence and Peace Economics, 14(6), 401–412.

    Article  Google Scholar 

  • Brandt, P. T. & Sandler, T. (2010). What Do Transnational Terrorists Target? Has It Changed? Are We Safer? Journal of Conflict Resolution, 54(2), 214–236.

    Article  Google Scholar 

  • Breslauer, G. W. (1996). Counterfactual Reasoning in Western Studies of Soviet Politics and Foreign Relations. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 71–94). Princeton: Princeton University Press.

    Google Scholar 

  • Brophy-Baermann, B. & Conybeare, J. A. C. (1994). Retaliating against Terrorism: Rational Expectations and the Optimality of Rules versus Discretion. American Journal of Political Science, 38(1), 196–210.

    Article  Google Scholar 

  • Bueno de Mesquita, B. (1996). Counterfactuals and International Affairs: Some Insights from Game Theory. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 211–229). Princeton: Princeton University Press.

    Google Scholar 

  • Bundesministerium des Inneren. (2008). Entwurf eines Gesetzes zur Abwehr von Gefahren des internationalen Terrorismus durch das Bundeskriminalamt, 04.05.2008. www.bmi.bund.de/Internet/Content/Common/Anlagen/Gesetze/Entwurf__BKAG,templateId=raw,property=publicationFile.pdf/Entwurf_BKAG.pdf. Zugegriffen: 10.07.2010.

  • Burnham, P., Gilland, K., Grant, W. #x0026; Layton-Henry, Z. (2008). Research Methods in Politics

    Google Scholar 

  • BVerfG. (27 Feb. 2008). 1 BvR 370/07. www.bverfg.de/entscheidungen/rs20080227_1bvr037007.html. Zugegriffen: 1. Jul 2008.

  • Byman, D. (2003a). Measuring the Effectiveness of the War on Terrorism: A First Look. Beitrag präsentiert auf 2003 Annual Meeting of the American Political Science Association. www.allacademic.com/one/prol/prol01/index.php?cmd=Download+Document&key=unpublished_manuscript&file_index=1&pop_up=true&no_click_key=true&attachment_style=attachment&PHPSESSID=13eb134ab4167c575684cd3699721997. Zugegriffen: 28.02. 2008.

  • Byman, D. (2003b). Measuring the War on Terrorism: A First Appraisal. Current History, 102(668), 411–416.

    Google Scholar 

  • Byman, D. (2003c). Scoring the War on Terrorism. The National Interest, 2(48), 75–84.

    Google Scholar 

  • Cauley, J. & Im, E. I. (1998). Intervention Policy Analysis of Skyjackings and Other Terrorist Incidents. American Economic Review, 78(2), 27–31.

    Google Scholar 

  • Combs, R. A. & Ayers, C. E. (2006). Assessing Strategic Effectiveness in the War on Terrorism. Carlisle Barracks: U.S. Army War College.

    Google Scholar 

  • Conway, M. (2002). What Is Cyberterrorism? Current History, 101(659), 436–442.

    Google Scholar 

  • Crenshaw, M. (2006). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice. In R. D. Howard & R. L. Sawyer (Hrsg.), Terrorism and counterterrorism: Understanding the new security environment, Readings & interpretations, 2. Ausgabe (S. 54–66). Dubuque: McGraw-Hill.

    Google Scholar 

  • Elster, J. (1978). Logic and Society: Contradictions and Possible Worlds. Chister et al.: John Wiley & Sons.

    Google Scholar 

  • Enders, W. & Sandler, T. (1993). The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis. American Political Science Review, 87(4), 829–844.

    Article  Google Scholar 

  • Enders, W. & Sandler, T. (1999). Transnational Terrorism in the Post-Cold War Era. International Studies Quarterly, 43(2), 145–167.

    Article  Google Scholar 

  • Enders, W. & Sandler, T. (2002). Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates. International Studies Quarterly, 46(2), 145–165.

    Article  Google Scholar 

  • Enders, W. & Sandler, T. (2004). What Do We Know About the Substitution Effect in Transnational Terrorism? In A. Silke (Hrsg.), Research on Terrorism: Trends, Achievements and Failures(S. 119–137). London: Frank Cass.

    Chapter  Google Scholar 

  • Faria, J. R. (2006). Terrorist Innovations and Anti-Terrorist Policies. Terrorism and Political Violence, 18(1), 47–56.

    Article  Google Scholar 

  • Fearon, J. D. (1991). Counterfactuals and Hypothesis in Political Science. World Politics, 43(2), 169–195.

    Article  Google Scholar 

  • Fearon, J. D. (1996). Causes and Counterfactuals in Social Science: Exploring an Analogy between Cellular Automata and Historical Processes. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 39–67). Princeton: Princeton University Press.

    Google Scholar 

  • Feinstein, J. S. & Kaplan, E. H. (2010). Analysis of a Strategic Terror Organization. Journal of Conflict Resolution, 54(2), 281–302.

    Article  Google Scholar 

  • Freedman, L. (2007). Terrorism as a Strategy. Government and Opposition,42(3), 314–339.

    Article  Google Scholar 

  • Frisch, H. (2009). Strategic Change in Terrorist Movements: Lessons from Hamas. Studies in Conflict & Terrorism, 32(12), 1049–1065.

    Article  Google Scholar 

  • Gordon, P. H. (2007). Can the War on Terror Be Won? Foreign Affairs, 86(6), 53–66.

    Google Scholar 

  • Hafez, M. M. & Hatfield, J. M. (2006). Do Targeted Assassinations Work? A Multivariate Analysis of Israel's Controversial Tactic during Al-Aqsa Uprising. Studies in Conflict & Terrorism, 29(4), 359–382.

    Article  Google Scholar 

  • Hewitt, C. (1984). The Effectiveness of Anti-Terrorist Policies. London: University Press of America.

    Google Scholar 

  • Hinnen, T. M. (2004). The Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet. The Columbia Science and Technology Law Review, V, 1–42.

    Google Scholar 

  • Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.

    Google Scholar 

  • Horowitz, M. (2010). Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism. International Organization, 64(1), 33–64.

    Article  Google Scholar 

  • Ilardi, G. J. (2008). Al Qaeda's Operational Intelligence: A Key Prerequisite to Action. Studies in Conflict & Terrorism, 31(12), 1072–1102.

    Article  Google Scholar 

  • Ilardi, G. J. (2009). The 9/11 Attacks: A Study of Al Qaeda's Use of Intelligence and Counterintelligence. Studies in Conflict & Terrorism, 32(3), 171–187.

    Article  Google Scholar 

  • Jacobson, M. (2010). Terrorist Financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.

    Article  Google Scholar 

  • Jenkins, B. M. (1986). Defense Against Terrorism. Political Science Quarterly, 101(5), 773–786.

    Article  Google Scholar 

  • Kaiser, S., Rosenbach, M. & Stark, H. (2007). Operation Alberich. Der Spiegel, 37, 10.09.2007. www.spiegel.de/spiegel/print/d-52909281.html. Zugegriffen: 17.09.2007.

  • King, G. & Zeng, L. (2007). When Can History Be Our Guide? The Pitfalls of Counterfactual Inference. International Studies Quarterly, 51(1), 183–210.

    Article  Google Scholar 

  • Kirby, A. (2007). The London Bombers as ‘Self-Starters’: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques. Studies in Conflict and Terrorism, 30(5), 415–428.

    Article  Google Scholar 

  • Kydd, A. H. & Walter, B. F. (2006). The Strategies of Terrorism. International Security, 31(1), 49–80.

    Article  Google Scholar 

  • Lake, D. A. (2002). Rational Extremism: Understanding Terrorism in the Twenty-first Century. Dialog-IO, 1(1), 15–28.

    Google Scholar 

  • Lebow, R. N. (2010). Forbidden Fruit: Counterfactuals and International Relations. Princeton: Princeton University Press.

    Google Scholar 

  • Lia, B. & Hegghammer, T. (2004). Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings. Studies in Conflict & Terrorism, 27(5), 355–375.

    Article  Google Scholar 

  • Lum, C., Kennedy, L. W. & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Copenhagen: Nordisk Campbell Center.

    Google Scholar 

  • McCartan, L. M., et al. (2008). The Logic of Terrorist Target Choice: An Examination of Chechen Rebels Bombings from 1997–2003. Studies in Conflict & Terrorism, 31(1), 60–79.

    Article  Google Scholar 

  • McCormick, G. H. (2003). Terrorist Decision Making. Annual Review of Political Science, 6(1), 473–507.

    Article  Google Scholar 

  • Morag, N. (2005). Measuring Success in Coping with Terrorism: The Israeli Case. Studies in Conflict and Terrorism, 28(4), 307–320.

    Article  Google Scholar 

  • Nesser, P. (2008). How did Europe's Global Jihadis Obtain Training for their Militant Causes? Terrorism and Political Violence, 20(2), 234–256.

    Article  Google Scholar 

  • Neumann, P. & Rogers, B. (2008). Recruitment and Mobilisation for the Islamist Militant Movement in Europe. www.icsr.info/files/ICSR%20EU%20Research%20Report_Proof%201.pdf. Zugegriffen: 11.10.2008.

  • Pape, R. A. (2003). The Strategic Logic of Suicide Terrorism. American Political Science Review, 97(3), 343–361.

    Article  Google Scholar 

  • Parker, T. (2007). Fighting an Antaean Enemy: How Democratic States Unintentionally Sustain the Terrorist Movements They Oppose. Terrorism and Political Violence, 19(2), 155–179.

    Article  Google Scholar 

  • Perl, R. (2007). Combating Terrorism: The Challenge of Measuring Effectiveness(RL33160). Washington D.C.: Congressional Research Service.

    Google Scholar 

  • Probst, P. S. (2005). Measuring Success in Countering Terrorism: Problems and Pitfalls. In P. Kantor, G. Muresan, F. Roberts, et al. (Hrsg.), Intelligence and Security Informatics.S. 316–321. Berlin: Springer.

    Chapter  Google Scholar 

  • Ranstorp, M. (2007). Introduction: Mapping Terrorism Research – Challenges and priorities. In M. Ranstorp (Hrsg.), Mapping terrorism research: state of the art, gaps and future direction. S. 1–28. London: Routledge.

    Google Scholar 

  • Redaktion (2010). FBI beißt sich an verschlüsselten Festplatten die Zähne aus. derStandard.at., 27.06.2010. www.derstandard.at/1277336831638/FBI-beisst-sich-an-verschluesselten-Festplatten-die-Zaehne-aus. Zugegriffen: 27.06.2010.

  • Rosenthal, J. A. (Hrsg.) (2006). State of the Struggle: Report on the Battle against Global Terrorism. Washington DC: Council on Global Terrorism.

    Google Scholar 

  • Rumsfeld, D. (2003). Global War on Terrorism: Memo to Gen. Dick Myers, Paul Wolfowitz, Gen. Pete Pace, and Doug Feith. www.fas.org/irp/news/2003/10/rumsfeld101603.pdf. Zugegriffen: 10.10.2008.

  • Russett, B. (1996). Counterfactuals about War and Its Absence. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 171–186). Princeton: Princeton University Press.

    Google Scholar 

  • Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.

    Google Scholar 

  • Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty-first century. Philadelphia.: University of Pennsylvania Press.

    Google Scholar 

  • Sandler, T. & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.

    Article  Google Scholar 

  • Schneider, G., Gleditsch, N. P. & Carey, S. C. (2010). Exploring the Past, Anticipating the Future: A Symposium. International Studies Review, 12(1), 1–7.

    Article  Google Scholar 

  • Silke, A. (2007). The Impact of 9/11 on Research on Terrorism. In M. Ranstorp (Hrsg.), Mapping terrorism research: state of the art, gaps and future direction, (S. 76–93). London: Routledge.

    Google Scholar 

  • Sjoberg, G., Gill, E. A. & Cain, L. D. (2003). Countersystem Analysis and the Construction of Alternative Futures. Sociological Theory, 21(3), 210–235.

    Article  Google Scholar 

  • Spencer, A. (2006). The Problems of Evaluating Counter-Terrorism. UNISCI Discussion Papers, 12, 179–201.

    Google Scholar 

  • Stenersen, A. (2008). The Internet: A Virtual Training Camp? Terrorism and Political Violence, 20(2), 215–233.

    Article  Google Scholar 

  • Tetlock, P. E. & Belkin, A. (1996). Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 3–38). Princeton: Princeton University Press.

    Google Scholar 

  • Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of “Cyberplanning”. Parameters, 33(1), 112–123.

    Google Scholar 

  • Tsfati, Y. & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 25(5), 317–332.

    Google Scholar 

  • Ullman, H. (2006). Is the US winning or losing the global war on terror and how do we know? Australian Journal of International Affairs, 60(1), 29–41.

    Article  Google Scholar 

  • Walker, D. H. (2005). Developing Metrics in the Global War on Terrorism. Newport: Naval War College.

    Google Scholar 

  • Weber, M. (1968). Objektive Möglichkeit und adäquate Verursachung in der historischen Kausalbetrachtung. In J. Winckelmann (Hrsg.), Gesammelte Aufsätze zur Wissenschaftlehre von Max Weber(S. 266–290). Tübingen: J.C.B. Mohr.

    Google Scholar 

  • Weimann, G. (2004). www.terror.net : How Modern Terrorism Uses the Internet. Washington, DC: United States Institute of Peace.

  • Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28(2), 129–149.

    Article  Google Scholar 

  • Whine, M. (1999a). Cyberspace-A New Medium for Communication, Command, and Control by Extremists. Studies in Conflict & Terrorism, 22(3), 231–245.

    Article  Google Scholar 

  • Whine, M. (1999b). Islamist organizations on the Internet. Terrorism and Political Violence, 11(1), 123–132.

    Google Scholar 

  • Wilner, A. S. (2010). Targeted Killings in Afghanistan: Measuring Coercion and Deterrence in Counterterrorism and Counterinsurgency. Studies in Conflict & Terrorism, 33(4), 307–329.

    Article  Google Scholar 

  • Wolfendale, J. (2007). Terrorism, Security, and the Threat of Counterterrorism. Studies in Conflict and Terrorism, 30(1), 75–92.

    Google Scholar 

  • Zussman, A. & Zussman, N. (2006). Assassinations: Evaluating the Effectiveness of an Israeli Counterterrorism Policy Using Stock Market Data. Journal of Economic Perspectives, 20(2), 193–206.

    Article  Google Scholar 

Download references

Authors

Editor information

Alexander Spencer Alexander Kocks Kai Harbrich

Rights and permissions

Reprints and permissions

Copyright information

© 2011 VS Verlag fur Sozialwissenschaften ist eine Marke von Springer Fachmedien

About this chapter

Cite this chapter

Eder, F. (2011). Die Effektivität von Counter-Terrorismus am Beispiel des Bundestrojaners: Möglichkeiten kontrafaktischer Analyse. In: Spencer, A., Kocks, A., Harbrich, K. (eds) Terrorismusforschung in Deutschland. VS Verlag für Sozialwissenschaften. https://doi.org/10.1007/978-3-531-93040-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-531-93040-4_11

  • Publisher Name: VS Verlag für Sozialwissenschaften

  • Print ISBN: 978-3-531-17729-8

  • Online ISBN: 978-3-531-93040-4

  • eBook Packages: Humanities, Social Science (German Language)

Publish with us

Policies and ethics