Advertisement

Neue technologische Mittel des neuen Terrorismus

  • Stefan GoertzEmail author
Chapter

Zusammenfassung

Seit Beginn des 21. Jahrhunderts besteht innerhalb der sozialwissenschaftlichen Forschung der Konsens, dass die technologischen Möglichkeiten des Internets von vitaler Bedeutung für den islamistischen Terrorismus sind (Corman 2011; Cornish& Lindley-French&Yorke 2011; Fink&Barclay 2013). Verschiedene Studien bewerten die Existenz des Internets gar als Voraussetzung dafür, dass eine terroristische Organisation wie Al Qaida bereits länger als 20 Jahre existiert, während empirisch betrachtet terroristische Gruppen durchschnittlich weniger als ein Jahr lang bestehen (Archetti 2015; Theohary&Rollins 2011). Ebenso unbestritten ist, dass der „Islamische Staat“ (IS) ohne die Existenz des Internets und der sozialen Medien nicht solch dramatisch viele europäische und westliche Anhänger für seinen Jihad in Syrien und im Irak und für terroristische Anschläge in westlichen Staaten hätte gewinnen können (Goertz 2016; Brooking 2015).

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Aboudi, S. (2015). Al Qaeda Claims French Attack, Derides Paris Rally. Reuters, 14.1.2015. http://www.reuters.com/article/2015/01/14/us-franceshootingaqapidUSKBN0KN0VO20150114. Zugegriffen: 30.11.2015.
  2. Al Awlaki, A. (2011). Western Jihad is Here to Stay. http://anwar-awlaki.blogspot.co.uk/2011/10/western-jihad-is-here-to-stay.html. Zugegriffen: 11.12.2016.
  3. Al Awlaki, A. (2009). 44 Ways to Support Jihad, no. 29. http://www.anwar-alawlaki.com; http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefaal-Awlaki44wayssupportjihad.pdf. Zugegriffen: 5.4.2017.
  4. Al Kanadi, A. (2004). Der islamische Rechtsspruch über Musik und Gesang im Licht des Qur’an, der Sunnah und der übereinstimmenden Meinung unserer religiösen Vorfahren. o.O.Google Scholar
  5. Al Qaeda (2010). Al Qaeda Training Manual: Military Studies in the Jihad Against the Tyrants. Saffron Walden: Books Express Publishing.Google Scholar
  6. Al Shehri, A. (2014). Al-Qaeda Uses Twitter to Mobilize Saudi Youth. Al-Monitor, 9.4.2014; http://www.al-monitor.com/pulse/security/2014/04/al-qaeda-twitter-mobilizesaudiyouth.html. Zugegriffen: 30.11.2015.
  7. Al Suri, A. (2013). The Jihadi Experiences: The strategy of deterring with terrorism. INSPIRE, Ausgabe 10.Google Scholar
  8. Andrew, C. (2009). The Defence of the Realm. The Authorized History of MI5. Toronto: Viking Canada.Google Scholar
  9. Archetti, C. (2015). Terrorism, Communication and New Media: Explaning Radicalization in the Digital Age. Perspectives on Terrorism, 9/1, Februar 2015.Google Scholar
  10. Arquilla, J.&Ronfeldt, D. (1996). The Advent of Netwar. RAND Corporation.Google Scholar
  11. Atayf, M. (2012). Scholars Speak Out in Favour of Electronic Jihad against the Enemy.Google Scholar
  12. Al Arabiya News, 30.1.2012. http://english.alarabiya.net/articles/2012/01/29/191307.html Zugegriffen: 4.3.2017.
  13. Bardoloi, S. (2004). Money Not Always Honey! Information Management, 20.1.2004. http://www.information-management.com/specialreports/20040120/7996-1.html. Zugegriffen: 29.3.2017.
  14. Barrett, D.&Mendick, R. (2014). Mainstream Charities have Donated Thousands to Islamic Group Fronted by Terror Suspect. Sunday Telegraph, 2.3.2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10670120/Mainstream-charities-have-donated-thousandsto-Islamic-group-fronted-by-terror-suspect.html. Zugegriffen: 30.11.2015.
  15. Behrens, C./Goertz, S. (2016). Radikalisierungsprozesse von islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11/2016, S. 686–693.Google Scholar
  16. Berger, J.&Morgan, J. (2015). The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. Washington, DC: The Brookings Institution.Google Scholar
  17. Berger, J.&Strathearn, B. (2013). Who Matters Online: Measuring Influence, Evaluating Content and Countering Violent Extremism in Online Social Networks. London: International Centre for the Study of Radicalisation and Political Violence. King’s College.Google Scholar
  18. Bertram, S.&Ellison, K. (2014). Sub Saharan African Terrorist Groups’ Use of the Internet. Journal of Terrorism Research 5(1), S. 5–26.Google Scholar
  19. Brandon, J. (2010). Terrorists Targeting Children Via Facebook, Twitter. Fox News, 15.3.2010. www.foxnews.com/tech/2010/03/15/terrorists-targeting-children-via-facebook-twitter.html. Zugegriffen: 7.4.2017.
  20. Brandon, J. (2008). Virtual Caliphate. Islamic Extremists and Their Websites. London: Centre for Social Cohesion.Google Scholar
  21. Brooking, E. (2015). The ISIS Propaganda Machine is Horrifying and Effective. How Does it Work? Council on Foreign Relations, 21.8.2015.Google Scholar
  22. Bundesamt für Verfassungsschutz (2016). BfV-Newsletter 3/2016, Thema 1.Google Scholar
  23. Bundesamt für Verfassungsschutz (2013). BfV-Newsletter 1/2013, Thema 6.Google Scholar
  24. Bundeskriminalamt/ Bundesamt für Verfassungsschutz (2016). Analyse der Radikalisierungshintergründe und -verläufe der Personen, die aus islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. BerlinGoogle Scholar
  25. Carter, J.&Maher, S.&Neumann, P. (2014). #Greenbirds: Measuring Importance andInfluence in Syrian Foreign Fighter Networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.Google Scholar
  26. Conway, M. (2006). Terrorism and the Internet. New Media – New Threat? Parliamentary Affairs 59/2, April 2006.Google Scholar
  27. Corman, S. (2011). Understanding the Role of Narratives in Extremist Strategic Communications. In Fenstermacher, L./ Leventhal, T.(Hrsg.). Countering Violent Extremism: Scientific Methods and Strategies, AF Research Laboratory, S. 36–43.Google Scholar
  28. Cornish, P./Lindley-French, J./ Yorke, C. (2011) (Hrsg.). Strategic Communication and National Strategy. London: A Chatham House Report, Royal Institute of International Affairs.Google Scholar
  29. Directorate for External Policies, Policy Department (2013). The Involvement of Salafism/ Wahhabism in the Support and Supply of Arms to Rebel Groups Around the World. Brüssel: Europäisches Parlament.Google Scholar
  30. Eck, K.&Hultmann, L. (2007). One-sided violence against civilians in war: Insights from New fatality data. Journal Peace Resolution, 44, S. 233–246.Google Scholar
  31. EUROPOL (2009). TE-SAT 2009: EU Terrorism Situation and Trend Report. Den Haag.Google Scholar
  32. External Operations Reconnaissance Team (2014). OSJ [Open Source Jihad] Special: Field Tactics. Inspire Magazine, Ausgabe 13, S. 108–111.Google Scholar
  33. FAZ (2016). Anschlag auf Sikh-Tempel Jetzt stehen die Dschihadisten vor Gericht. http://www.faz.net/aktuell/politik/kampf-gegen-den-terror/prozess-beginn-um-terror-anschlag-auf-sikh-tempel-in-essen-14562221.html. Zugegriffen: 18.12.2016.
  34. Farwell, J. (2014). The Media Strategy of ISIS. Survival, 56:6, S. 49–55.Google Scholar
  35. Fink, N./ Barclay, J. (2013). Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations. Washington D.C.: Center on Global Counterterrorism Cooperation.Google Scholar
  36. Fisher, A. (2016). Swarmcast: How Jihadist Networks Maintain A Persistent Online Presence. Perspectives on Terrorism, 9/3, S. 3–19.Google Scholar
  37. Freeman, M.&Ruehsen, M. (2013). Terrorism Financing Methods: An Overview. Perspectives on Terrorism 7(4), S. 6–26.Google Scholar
  38. Gambetta, D.&Hertog, S. (2010). Engineers of Jihad. Department of Sociology, University of Oxford, Sociology Working Paper 2007–10.Google Scholar
  39. Gendron, A.&Rudner, M. (2012). Assessing Cyber Threats to Canadian Infrastructure. Canadian Security Intelligence Service Occasional Paper. Ottawa: Canadian Security Intelligence Service.Google Scholar
  40. General Intelligence and Security Service of the Netherlands (2012). Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. Zoetermeer: Algemene Inlichtingen-en Veiligheidsdienst.Google Scholar
  41. Gendron, A. (2006). Militant Jihadism: Radicalization, Conversion, Recruitment. Trends in Terrorism Series, Vol. 4. Ottawa: Integrated Threat Assessment Centre.Google Scholar
  42. Gertz, B. (2013). Islamist Terrorists Shifting from Web to Social Media. The Washington Free Beacon. 23.10.2013. http://freebeacon.com/islamist-terrorists-shifting-from-webto- social-media/. Zugegriffen: 13.3.2017.
  43. Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: Kriminalistik/C.F.Müller.Google Scholar
  44. Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei. S. 26–30.Google Scholar
  45. Goertz, S./Holst, M. (2016): Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform 6/2016. S. 1–14.Google Scholar
  46. Gulsby, K.&Desa, A. (2014). The New Al-Qaeda: Decentralization and Recruitment. Security and Intelligence Studies Journal 1(2), S. 53–62.Google Scholar
  47. Hannigan, R. (2014). The web os a terrorist’s command-and-control network of choice. FT.com, 3.11.2014; http://on.ft.com/1qm2QJ Zugegriffen: 9.3.2017.
  48. Harris-Hogan, S. (2012). Australian Neo-Jihadist Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence. Studies in Conflict and Terrorism 35(4), S. 298–314.Google Scholar
  49. Hofman, B. (2006). The Use of the Internet by Islamic Extremists. Rand Corporation Testimony Series. 4.5.2006.Google Scholar
  50. Ilardi, G. (2013). Interviews with Canadian Radicals. Studies in Conflict & Terrorism 36(9), S. 713–738.Google Scholar
  51. Ilyas, M. (2013). Islamist Groups in the UK and Recruitment. Journal of TerrorismResearch 4(2), S. 37–48.Google Scholar
  52. International Monetary Fund, Legal Department (2003). Suppressing the Financing of Terrorism: A Handbook for Legislative Drafting. Washington, D.C.: International Monetary Fund.Google Scholar
  53. Irshaid, F. (2014). How ISIS is Spreading its Message Online’, BBC News, 19.6.2014.http://www.bbc.co.uk/news/world-middle-east-27912569. Zugegriffen: 4.3.2017.
  54. Jacobson, M. (2010). Terrorist Financing and the Internet. Studies in Conflict & Terrorism 33(4), S. 353–363.Google Scholar
  55. Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 1999, 11, S. 243–285.Google Scholar
  56. Kaya, A. (2010). Individualization and Institutionalization of Islam in Europe in the Age of Securitization. Insight Turkey 12(1), S. 47–63.Google Scholar
  57. Khosrokhavar, F. (2009). Inside Jihadism. Understanding Jihadi Movements Worldwide. London: Routledge.Google Scholar
  58. Kjuka, D. (2013). Digital Jihad: Inside Al-Qaeda’s Social Networks. The Atlantic, 6.3.2013. www.theatlantic.com/international/archive/2013/03/digital-jihad-inside-al-qaedas-social-networks/273761/. Zugegriffen: 4.3.2017.
  59. Klausen, J. (2015). Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38:1, S. 1–22.Google Scholar
  60. Koplowitz, H. (2013). US Formally Admits Killing Anwar Al-Awlaki, 3 Other Citizens, in DroneStrikes. International Business Times, 23.5.2013. www.ibtimes.com/us-formally-admits-killing-anwar-al-awlaki-3-other-citizens-drone-strikes-full-text-1275805. Zugegriffen: 12.3.2017.
  61. Klausen, J. (2012). The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’sPropaganda Campaign. Perspectives on Terrorism 6(1), S. 36–53.Google Scholar
  62. Lemieux, A.&Nill, R. (2011). The Role and Impact of Music in Promoting (and Countering) Violent Extremism. In Fenstermacher L.&Leventhal, T. (Hrsg). Countering Violent Extremism: Scientific Methods and Strategies. AF Research Laboratory.Google Scholar
  63. Levitt, M. (2004). Charitable Organizations and Terrorist Financing: A War on Terror Status- Check. In The Dimensions of Terrorist Financing. University of Pittsburgh.Google Scholar
  64. Lia, B. (2009). Architect of Global Jihad: The Life of Al Qaeda Strategist Abu Musab Al Suri. London: Hurst.Google Scholar
  65. Lia, B. (2008). Doctrines for Jihadi Terrorist Training. Terrorism and Political Violence 20(4), S. 518–542.Google Scholar
  66. Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training – part 1. Terrorism, Monitor, 5(1), S. 1–4.Google Scholar
  67. Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication 19/1., S. 75–86.Google Scholar
  68. Lynch, M.&Freelon, D.&Aday, S. (2014). Syria’s socially mediated civil war. United States Institute for Peace, 91.1, S. 1–35.Google Scholar
  69. Mackey, R. (2014). The Case for ISIS, Made in a British Accent, New York Times, 20.6.2014. http://www.nytimes.com/2014/06/21/world/middleeast/the-case-for-isis-made-ina-british-accent.html. Zugegriffen: 4.2.2017.
  70. Masciandaro, D. (2004). Global Financial Crime: Terrorism, Money Laundering and OffshoreCentres. Burlington, VT: Ashgate.Google Scholar
  71. Moon, D. (2010). Anwar al-Awlaki: Translator of jihad. Asia Times, 7.1.2010. http://www.atimes.com/atimes/Middle_East/LA07Ak05.html. Zugegriffen: 4.4.2017.
  72. Musawi, M. (2010). Cheering for Osama. How Jihadists Use Internet Discussion Forums. London: Quilliam Foundation.Google Scholar
  73. Nacos, B. (2006). Communication and Recruitment of Terrorists. In Forest, J. (Hrsg.). The Making of a Terrorist: Recruitment, Training and Root Causes. Westport, CT: Praeger Security International.Google Scholar
  74. Nelson, F. (2014). Terrorism in the UK: Social Media is Now the Biggest Jihadi Training Camp of Them All. Daily Telegraph, 25.4. 2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10786205/Terrorism-in-the-UK-Social-media-is-now-thebiggest-jihadi-training-camp-of-them-all.html. Zugegriffen: 30.11.2015.
  75. Nesser, P. (2004). Jihad in EuropeA Survey of the Motivations for Sunni Islamist Terrorism inPost-Millennium Europe FFI Report. Oslo: Norwegian Institute for Defence Research.Google Scholar
  76. Neumann, P. (2016). Radicalized. New Jihadists and the Threat to the West. London: I.B. Tauris.Google Scholar
  77. Nissen, T. (2014). Terror.com – IS’s Social Media Warfare in Syria and Iraq. Contemporary Conflicts vol. 2, no. 2.Google Scholar
  78. NDR (2016). Die Geschichte der Safia S. 18.10.2016. http://www.ndr.de/nachrichten/niedersachsen/hannover_weser-leinegebiet/Die-Geschichte-der-Safia-S,safias102.html. Zugegriffen: 9.2.2017.
  79. Phares, W. (2005). Future Jihad: Terrorist Strategies against the West. New York: Palgrave Macmillan.Google Scholar
  80. Rieger, D.&Frischlich&Bente (2013). Propaganda 2.0: Psychological Effects of Right- Wing and Islamic Extremist Internet Videos. Köln: Wolters Kluver Luchterhand.Google Scholar
  81. Roy, O. (2004). Globalised Islam. The Search for a New Ummah. London: Hurst & Co.Google Scholar
  82. Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s Catalyst for Global Terror, Studies in Conflict & Terrorism, 40:1, S. 10–23.Google Scholar
  83. Rudner, M. (2013). Al Qaeda’s Twenty-Year Strategic Plan: The Current Phase of Global Terror. Studies in Conflict & Terrorism 36(12), S. 953–980.Google Scholar
  84. Seymour, B. (2008). Global Money Laundering. Journal of Applied Security Research 3(3), S. 373–387.Google Scholar
  85. Senator für Inneres Freie Hansestadt Bremen (2016). Verfassungsschutzbericht 2015. Bremen.Google Scholar
  86. Schmid, A. (2005). Terrorism as PsychologicalWarfare. Democracy and Security 1(2). Google Scholar
  87. SITE (2017). Media Units of Jihadi Groups. https://ent.siteintelgroup.com/mediagroups.html. Zugegriffen: 26.3.2017.
  88. Springer, D.&Regens, J.&Edger, D. (2009). Islamic Radicalism and Global Jihad. Washington D.C.: Georgetown University Press.Google Scholar
  89. Sydow, C. (2012): German Islamists Target Youth on the Internet. Der Spiegel, 1.11.2012. http://www.spiegel.de/international/germany/german-jihadists-target-youthon-the-internet-study-finds-a-864797.html. Zugegriffen: 18.2.2017.
  90. Syrian Observatory for Human Rights (SOHR). More than 2000 Syrian civilians executed by IS during 18 months since declaring its alleged caliphate. 29.12.2015, online: http://www.syriahr.com/en/?p=41663; (18.11.2016).
  91. Taylor, M.&Ramsay, G. (2010). Violent Radical Content and the Relationship between Ideologyand Behaviour. in Kessels, E. (Hrsg.). Countering Violent Extremist Narratives. Den Haag: National Coordinator for Counterterrorism.Google Scholar
  92. The Netherlands Office of the Coordinator for Counterterrorism (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.Google Scholar
  93. Theohary, C./Rollins, J. (2011). Terrorist Use of the Internet: Information Operations in Cyberspace. Washington D.C.: Congressional Research Service Report for Congress.Google Scholar
  94. U.K. House of Commons, Home Affairs Committee (2012). Roots of Violent Radicalization. London: The Stationery Office.Google Scholar
  95. Ulph, S. (2006). The Next Stage in Counter-Terrorism: Analysing Jihadist Radicalization onthe Web. www.jamestown.org/docs/JR-Slides.pdf. Zugegriffen: 8.3.2017.
  96. Vidino, L. (2006). Al Qaeda in Europe: The New Battleground of International Jihad. Amherst, NY: Prometheus Books.Google Scholar
  97. Weimann, G. (2011). Cyber-Fatwas and Terrorism. Studies in Conflict & Terrorism 34(10), S. 765–781.Google Scholar
  98. Weimann, G. (2006). Terror on the Internet: The New Agenda, The New Challenges. Washington D.C.: United States Institute of Peace.Google Scholar
  99. Whitehead, T. (2014). Self Styled ‘Father of Terrorism’ Facing Jail. Daily Telegraph, 5.7.2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10947387/Self-styledfather-of-terrorism-facing-jail.html. Zugegriffen: 13.3.2017.
  100. Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In: Said, B./Fouad, H. (Hrsg.). Salafismus. Auf der Suche nach dem wahren Islam. S. 320–349. Freiburg: Herder.Google Scholar
  101. Zelin, A. (2013). Foreign Jihadists in Syria: Tracking Recruitment Networks. The WashingtonInstitute for Near East Policy, 19.12.2013. http://www.washingtoninstitute.org/policy-analysis/view/foreign-jihadists-in-syria-tracking-recruitment-networks. Zugegriffen: 30.11.2015.
  102. David, Sami/Zelin, A. (2013). Up to 11,000 Foreign Fighters in Syria; Steep Rise among Western Europeans. ICSR Insights, 17.12.2013. http://icsr.info/2013/12/icsr-insight-11000-foreign-fighters-syria-steep-riseamong-western-europeans/. Zugegriffen: 30.11.2015.
  103. Zipkin, N. (2014). Have 1,000 Followers? You’re in the 96th Percentile of Twitter Users. Entrepreneur 19.12.2014. http://www.entrepreneur.com/article/230487. Zugegriffen: 7.4.2017.
  104. Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, Nr. 3 (2015), S. 12–16.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2018

Authors and Affiliations

  1. 1.Fachbereich BundespolizeiHochschule des BundesLübeckDeutschland

Personalised recommendations