Zusammenfassung
Die Evaluierung der Effektivität von Counter-Terrorismus (CT) ist eine methodische und theoretische Herausforderung. Traditionelle Ansätze wie Zeitreihen analysieren Ereignisse aus der Vergangenheit, können aber keine Aussagen über die Wirksamkeit von Gegenmaßnahmen über einen längeren Zeitraum in der Zukunft geben. In diesem Beitrag wird argumentiert, dass kontrafaktische Analyse einen Mehrwert bei der Antizipierung von Substitutions-und Innovationseffekten bietet und damit die Konsequenzen terroristischen Verhaltens besser abbildet. Anhand des Beispiels des Bundestrojaners als CT-Instrument wird gezeigt, dass diese Maßnahme terroristisches Verhalten zwar kurzfristig behindert, terroristische Akteure längerfristig aber Mittel und Wege finden werden, um den Bundestrojaner zu umgehen. Die Überwachung terroristischer Aktivitäten wird damit erschwert und nicht erleichtert.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
Abrahms, M. (2008). What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy. International Security, 32(4), 78–105.
APA/Reuters/red. (2010). Saudi-Arabien verhandelt noch über Blackberry-Messenger. derStandard.at, 6.8.2010. www.derstandard.at/1280984148441/Zensur-Saudi-Arabienverhandelt-noch-ueber-Blackberry-Messenger. Zugegriffen: 06.08.2010.
Arce, D. G. & Sandler, T. (2003). Counterterrorism: A Game-Theoretic Analysis. www.usccis.org/tools/software/original/public/fileforward.php?Id=3233. Zugegriffen: 22.07.2008.
Atran, S. (2006). A Failure of Imagination (Intelligence, WMDs, and ‘Virtual Jihad’). Studies in Conflict & Terrorism, 29(3), 285–300.
Barros, C. P. (2003). An Intervention Analysis of Terrorism: The Spanish ETA Case. Defence and Peace Economics, 14(6), 401–412.
Brandt, P. T. & Sandler, T. (2010). What Do Transnational Terrorists Target? Has It Changed? Are We Safer? Journal of Conflict Resolution, 54(2), 214–236.
Breslauer, G. W. (1996). Counterfactual Reasoning in Western Studies of Soviet Politics and Foreign Relations. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 71–94). Princeton: Princeton University Press.
Brophy-Baermann, B. & Conybeare, J. A. C. (1994). Retaliating against Terrorism: Rational Expectations and the Optimality of Rules versus Discretion. American Journal of Political Science, 38(1), 196–210.
Bueno de Mesquita, B. (1996). Counterfactuals and International Affairs: Some Insights from Game Theory. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 211–229). Princeton: Princeton University Press.
Bundesministerium des Inneren. (2008). Entwurf eines Gesetzes zur Abwehr von Gefahren des internationalen Terrorismus durch das Bundeskriminalamt, 04.05.2008. www.bmi.bund.de/Internet/Content/Common/Anlagen/Gesetze/Entwurf__BKAG,templateId=raw,property=publicationFile.pdf/Entwurf_BKAG.pdf. Zugegriffen: 10.07.2010.
Burnham, P., Gilland, K., Grant, W. #x0026; Layton-Henry, Z. (2008). Research Methods in Politics
BVerfG. (27 Feb. 2008). 1 BvR 370/07. www.bverfg.de/entscheidungen/rs20080227_1bvr037007.html. Zugegriffen: 1. Jul 2008.
Byman, D. (2003a). Measuring the Effectiveness of the War on Terrorism: A First Look. Beitrag präsentiert auf 2003 Annual Meeting of the American Political Science Association. www.allacademic.com/one/prol/prol01/index.php?cmd=Download+Document&key=unpublished_manuscript&file_index=1&pop_up=true&no_click_key=true&attachment_style=attachment&PHPSESSID=13eb134ab4167c575684cd3699721997. Zugegriffen: 28.02. 2008.
Byman, D. (2003b). Measuring the War on Terrorism: A First Appraisal. Current History, 102(668), 411–416.
Byman, D. (2003c). Scoring the War on Terrorism. The National Interest, 2(48), 75–84.
Cauley, J. & Im, E. I. (1998). Intervention Policy Analysis of Skyjackings and Other Terrorist Incidents. American Economic Review, 78(2), 27–31.
Combs, R. A. & Ayers, C. E. (2006). Assessing Strategic Effectiveness in the War on Terrorism. Carlisle Barracks: U.S. Army War College.
Conway, M. (2002). What Is Cyberterrorism? Current History, 101(659), 436–442.
Crenshaw, M. (2006). The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice. In R. D. Howard & R. L. Sawyer (Hrsg.), Terrorism and counterterrorism: Understanding the new security environment, Readings & interpretations, 2. Ausgabe (S. 54–66). Dubuque: McGraw-Hill.
Elster, J. (1978). Logic and Society: Contradictions and Possible Worlds. Chister et al.: John Wiley & Sons.
Enders, W. & Sandler, T. (1993). The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis. American Political Science Review, 87(4), 829–844.
Enders, W. & Sandler, T. (1999). Transnational Terrorism in the Post-Cold War Era. International Studies Quarterly, 43(2), 145–167.
Enders, W. & Sandler, T. (2002). Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates. International Studies Quarterly, 46(2), 145–165.
Enders, W. & Sandler, T. (2004). What Do We Know About the Substitution Effect in Transnational Terrorism? In A. Silke (Hrsg.), Research on Terrorism: Trends, Achievements and Failures(S. 119–137). London: Frank Cass.
Faria, J. R. (2006). Terrorist Innovations and Anti-Terrorist Policies. Terrorism and Political Violence, 18(1), 47–56.
Fearon, J. D. (1991). Counterfactuals and Hypothesis in Political Science. World Politics, 43(2), 169–195.
Fearon, J. D. (1996). Causes and Counterfactuals in Social Science: Exploring an Analogy between Cellular Automata and Historical Processes. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 39–67). Princeton: Princeton University Press.
Feinstein, J. S. & Kaplan, E. H. (2010). Analysis of a Strategic Terror Organization. Journal of Conflict Resolution, 54(2), 281–302.
Freedman, L. (2007). Terrorism as a Strategy. Government and Opposition,42(3), 314–339.
Frisch, H. (2009). Strategic Change in Terrorist Movements: Lessons from Hamas. Studies in Conflict & Terrorism, 32(12), 1049–1065.
Gordon, P. H. (2007). Can the War on Terror Be Won? Foreign Affairs, 86(6), 53–66.
Hafez, M. M. & Hatfield, J. M. (2006). Do Targeted Assassinations Work? A Multivariate Analysis of Israel's Controversial Tactic during Al-Aqsa Uprising. Studies in Conflict & Terrorism, 29(4), 359–382.
Hewitt, C. (1984). The Effectiveness of Anti-Terrorist Policies. London: University Press of America.
Hinnen, T. M. (2004). The Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet. The Columbia Science and Technology Law Review, V, 1–42.
Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.
Horowitz, M. (2010). Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism. International Organization, 64(1), 33–64.
Ilardi, G. J. (2008). Al Qaeda's Operational Intelligence: A Key Prerequisite to Action. Studies in Conflict & Terrorism, 31(12), 1072–1102.
Ilardi, G. J. (2009). The 9/11 Attacks: A Study of Al Qaeda's Use of Intelligence and Counterintelligence. Studies in Conflict & Terrorism, 32(3), 171–187.
Jacobson, M. (2010). Terrorist Financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.
Jenkins, B. M. (1986). Defense Against Terrorism. Political Science Quarterly, 101(5), 773–786.
Kaiser, S., Rosenbach, M. & Stark, H. (2007). Operation Alberich. Der Spiegel, 37, 10.09.2007. www.spiegel.de/spiegel/print/d-52909281.html. Zugegriffen: 17.09.2007.
King, G. & Zeng, L. (2007). When Can History Be Our Guide? The Pitfalls of Counterfactual Inference. International Studies Quarterly, 51(1), 183–210.
Kirby, A. (2007). The London Bombers as ‘Self-Starters’: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques. Studies in Conflict and Terrorism, 30(5), 415–428.
Kydd, A. H. & Walter, B. F. (2006). The Strategies of Terrorism. International Security, 31(1), 49–80.
Lake, D. A. (2002). Rational Extremism: Understanding Terrorism in the Twenty-first Century. Dialog-IO, 1(1), 15–28.
Lebow, R. N. (2010). Forbidden Fruit: Counterfactuals and International Relations. Princeton: Princeton University Press.
Lia, B. & Hegghammer, T. (2004). Jihadi Strategic Studies: The Alleged Al Qaida Policy Study Preceding the Madrid Bombings. Studies in Conflict & Terrorism, 27(5), 355–375.
Lum, C., Kennedy, L. W. & Sherley, A. J. (2006). The Effectiveness of Counter-Terrorism Strategies. Copenhagen: Nordisk Campbell Center.
McCartan, L. M., et al. (2008). The Logic of Terrorist Target Choice: An Examination of Chechen Rebels Bombings from 1997–2003. Studies in Conflict & Terrorism, 31(1), 60–79.
McCormick, G. H. (2003). Terrorist Decision Making. Annual Review of Political Science, 6(1), 473–507.
Morag, N. (2005). Measuring Success in Coping with Terrorism: The Israeli Case. Studies in Conflict and Terrorism, 28(4), 307–320.
Nesser, P. (2008). How did Europe's Global Jihadis Obtain Training for their Militant Causes? Terrorism and Political Violence, 20(2), 234–256.
Neumann, P. & Rogers, B. (2008). Recruitment and Mobilisation for the Islamist Militant Movement in Europe. www.icsr.info/files/ICSR%20EU%20Research%20Report_Proof%201.pdf. Zugegriffen: 11.10.2008.
Pape, R. A. (2003). The Strategic Logic of Suicide Terrorism. American Political Science Review, 97(3), 343–361.
Parker, T. (2007). Fighting an Antaean Enemy: How Democratic States Unintentionally Sustain the Terrorist Movements They Oppose. Terrorism and Political Violence, 19(2), 155–179.
Perl, R. (2007). Combating Terrorism: The Challenge of Measuring Effectiveness(RL33160). Washington D.C.: Congressional Research Service.
Probst, P. S. (2005). Measuring Success in Countering Terrorism: Problems and Pitfalls. In P. Kantor, G. Muresan, F. Roberts, et al. (Hrsg.), Intelligence and Security Informatics.S. 316–321. Berlin: Springer.
Ranstorp, M. (2007). Introduction: Mapping Terrorism Research – Challenges and priorities. In M. Ranstorp (Hrsg.), Mapping terrorism research: state of the art, gaps and future direction. S. 1–28. London: Routledge.
Redaktion (2010). FBI beißt sich an verschlüsselten Festplatten die Zähne aus. derStandard.at., 27.06.2010. www.derstandard.at/1277336831638/FBI-beisst-sich-an-verschluesselten-Festplatten-die-Zaehne-aus. Zugegriffen: 27.06.2010.
Rosenthal, J. A. (Hrsg.) (2006). State of the Struggle: Report on the Battle against Global Terrorism. Washington DC: Council on Global Terrorism.
Rumsfeld, D. (2003). Global War on Terrorism: Memo to Gen. Dick Myers, Paul Wolfowitz, Gen. Pete Pace, and Doug Feith. www.fas.org/irp/news/2003/10/rumsfeld101603.pdf. Zugegriffen: 10.10.2008.
Russett, B. (1996). Counterfactuals about War and Its Absence. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 171–186). Princeton: Princeton University Press.
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.
Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty-first century. Philadelphia.: University of Pennsylvania Press.
Sandler, T. & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20(2), 301–316.
Schneider, G., Gleditsch, N. P. & Carey, S. C. (2010). Exploring the Past, Anticipating the Future: A Symposium. International Studies Review, 12(1), 1–7.
Silke, A. (2007). The Impact of 9/11 on Research on Terrorism. In M. Ranstorp (Hrsg.), Mapping terrorism research: state of the art, gaps and future direction, (S. 76–93). London: Routledge.
Sjoberg, G., Gill, E. A. & Cain, L. D. (2003). Countersystem Analysis and the Construction of Alternative Futures. Sociological Theory, 21(3), 210–235.
Spencer, A. (2006). The Problems of Evaluating Counter-Terrorism. UNISCI Discussion Papers, 12, 179–201.
Stenersen, A. (2008). The Internet: A Virtual Training Camp? Terrorism and Political Violence, 20(2), 215–233.
Tetlock, P. E. & Belkin, A. (1996). Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives. In P. E. Tetlock & A. Belkin (Hrsg.), Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives(S. 3–38). Princeton: Princeton University Press.
Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of “Cyberplanning”. Parameters, 33(1), 112–123.
Tsfati, Y. & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 25(5), 317–332.
Ullman, H. (2006). Is the US winning or losing the global war on terror and how do we know? Australian Journal of International Affairs, 60(1), 29–41.
Walker, D. H. (2005). Developing Metrics in the Global War on Terrorism. Newport: Naval War College.
Weber, M. (1968). Objektive Möglichkeit und adäquate Verursachung in der historischen Kausalbetrachtung. In J. Winckelmann (Hrsg.), Gesammelte Aufsätze zur Wissenschaftlehre von Max Weber(S. 266–290). Tübingen: J.C.B. Mohr.
Weimann, G. (2004). www.terror.net : How Modern Terrorism Uses the Internet. Washington, DC: United States Institute of Peace.
Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28(2), 129–149.
Whine, M. (1999a). Cyberspace-A New Medium for Communication, Command, and Control by Extremists. Studies in Conflict & Terrorism, 22(3), 231–245.
Whine, M. (1999b). Islamist organizations on the Internet. Terrorism and Political Violence, 11(1), 123–132.
Wilner, A. S. (2010). Targeted Killings in Afghanistan: Measuring Coercion and Deterrence in Counterterrorism and Counterinsurgency. Studies in Conflict & Terrorism, 33(4), 307–329.
Wolfendale, J. (2007). Terrorism, Security, and the Threat of Counterterrorism. Studies in Conflict and Terrorism, 30(1), 75–92.
Zussman, A. & Zussman, N. (2006). Assassinations: Evaluating the Effectiveness of an Israeli Counterterrorism Policy Using Stock Market Data. Journal of Economic Perspectives, 20(2), 193–206.
Editor information
Rights and permissions
Copyright information
© 2011 VS Verlag fur Sozialwissenschaften ist eine Marke von Springer Fachmedien
About this chapter
Cite this chapter
Eder, F. (2011). Die Effektivität von Counter-Terrorismus am Beispiel des Bundestrojaners: Möglichkeiten kontrafaktischer Analyse. In: Spencer, A., Kocks, A., Harbrich, K. (eds) Terrorismusforschung in Deutschland. VS Verlag für Sozialwissenschaften. https://doi.org/10.1007/978-3-531-93040-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-531-93040-4_11
Publisher Name: VS Verlag für Sozialwissenschaften
Print ISBN: 978-3-531-17729-8
Online ISBN: 978-3-531-93040-4
eBook Packages: Humanities, Social Science (German Language)