The New Terrorism pp 85-115 | Cite as
New Technology in the Hands of the New Terrorism
Abstract
This chapter examines the technological opportunities of the digital age and the Internet for a multidirectional exchange of Jihadi ideas, ideology, strategy and tactics. Myriads of social networks on the Internet serve as platforms for Jihadi disputes, which shows that the Internet and telecommunication technology of the twenty-first century are of central importance for new terrorism. Currently, the World Wide Web and its numerous media channels are the most important and most commonly and frequently used communication and propaganda platforms of the Islamist and Jihadi milieu. The Internet allows free cross-border and real-time communication and interaction as well as the reception of (supposedly authentic) reports on the fate of individual Jihadis and developments in far-off conflict regions. These technological achievements of the twenty-first century have enabled the (imagined) worldwide Umma to interconnect and pose a historically new potential for Jihadi actors of new terrorism to mobilise and radicalise Muslims on a global scale.
References
- Aboudi, S. (2015). Al Qaeda claims French attack, Derides Paris Rally. Reuters, 14.01.2015. Retrieved January 15, 2019, from http://www.reuters.com/article/2015/01/14/us-franceshootingaqapi-dUSKBN0KN0VO20150114
- Al Awlaki, A. (2009). 44 Ways to support Jihad, no. 29. Nefa Foundation. Retrieved January 15, 2019, from http://www.anwar-alawlaki.com; www.nefafoundation.org/miscellaneous/FeaturedDocs/nefaal-Awlaki44wayssupportJihad.pdf
- Al Awlaki, A. (2011). Western Jihad is here to stay. Blogspot. Retrieved January 15, 2019, from http://anwar-awlaki.blogspot.co.uk/2011/10/western-Jihad-is-here-to-stay.html
- Al Qaeda. (2010). Al Qaeda training manual: Military studies in the Jihad against the Tyrants. Saffron Walden: Books Express Publishing.Google Scholar
- Al Shehri, A. (2014). Al-Qaeda uses Twitter to Mobilize Saudi Youth. Al-Monitor, 09.04.2014. Retrieved January 15, 2019, from http://www.al-monitor.com/pulse/security/2014/04/al-qaeda-twitter-mobilize-saudiyouth.html
- Al Suri, A. (2013). The Jihadi experiences: The strategy of deterring with terrorism. INSPIRE, Issue 10.Google Scholar
- Archetti, C. (2015, February). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1). http://www.terrorismanalysts.com/pt/index.php/pot/article/view/401/html
- Arquilla, J., & Ronfeldt, D. (1996). The advent of Netwar. Santa Monica, CA: RAND Corporation.Google Scholar
- Atayf, M. (2012). Scholars speak out in favour of electronic Jihad against the enemy. Al Arabiya News, 30.01.2012. Retrieved January 15, 2019, from http://english.alarabiya.net/articles/2012/01/29/191307.html
- Bardoloi, S. (2004). Money not always honey! Information Management, 20.01.2004. Retrieved January 15, 2019, from http://www.information-management.com/specialreports/20040120/7996-1.html
- Barrett, D., & Mendick, R. (2014). Mainstream charities have donated thousands to Islamic group fronted by terror suspect. Sunday Telegraph, 02.03.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10670120/Mainstream-charities-have-donated-thousandsto-Islamic-group-fronted-by-terror-suspect.html
- Behrens, C., & Goertz, S. (2016). Radikalisierungsprozesse von Islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11, 686–693.Google Scholar
- Berger, J., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. Washington, DC: The Brookings Institution.Google Scholar
- Berger, J., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: King’s College, International Centre for the Study of Radicalisation and Political Violence.Google Scholar
- Bertram, S., & Ellison, K. (2014). Sub Saharan African terrorist groups’ use of the Internet. Journal of Terrorism Research, 5(1), 5–26.Google Scholar
- Brandon, J. (2008). Virtual caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion.Google Scholar
- Brandon, J. (2010). Terrorists targeting children via Facebook, Twitter. Fox News, 15.03.2010. Retrieved January 15, 2019, from www.foxnews.com/tech/2010/03/15/terrorists-targeting-children-via-facebook-twitter.html
- Brooking, E. (2015). The ISIS propaganda machine is horrifying and effective: How does it work? Council on Foreign Relations, Retrieved August 21, 2015.Google Scholar
- Bundesamt für Verfassungsschutz. (2013). BfV-Newsletter 1/2013, Thema 6.Google Scholar
- Bundesamt für Verfassungsschutz. (2016). BfV-Newsletter 3/2016, Thema 1.Google Scholar
- Bundeskriminalamt/Bundesamt für Verfassungsschutz. (2016). Analyse der Radikalisie- rungshintergründe und -verläufe der Personen, die aus Islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin.Google Scholar
- Burger, R. (2016). Anschlag auf Sikh-Tempel: Jetzt stehen die Dschihadisten vor Gericht. Frankfurter Allgemeine Zeitung. 07.12.2016. Retrieved January 15, 2019, from http://www.faz.net/aktuell/politik/kampf-gegen-den-terror/prozess-beginn-um-terror-anschlag-auf-sikh-tempel-in-essen-14562221.html
- Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.Google Scholar
- Conway, M. (2006, April). Terrorism and the Internet: New media – New threat? Parliamentary Affairs, 59(2), 283–298.Google Scholar
- Corman, S. (2011). Understanding the role of narratives in extremist strategic communications. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 36–43). Wright-Patterson Air Force Base, OH: AF Research Laboratory.Google Scholar
- Cornish, P., Lindley-French, J., & Yorke, C. (Eds.). (2011). Strategic communication and national strategy: A Chatham House report. London: Royal Institute of International Affairs.Google Scholar
- Directorate for External Policies, Policy Department. (2013). The involvement of Salafism/Wahhabism in the support and supply of arms to rebel groups around the world. Brussels: European Parliament.Google Scholar
- Eck, K., & Hultmann, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal Peace Resolution, 44, 233–246.Google Scholar
- EUROPOL. (2009). TE-SAT 2009: EU terrorism situation and trend report. Den Haag. External Operations Reconnaissance Team (2014).Google Scholar
- Farwell, J. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.Google Scholar
- Fink, N., & Barclay, J. (2013). Mastering the narrative: Counterterrorism strategic communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation.Google Scholar
- Fisher, A. (2016). Swarmcast: How Jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–19.Google Scholar
- Freeman, M., & Ruehsen, M. (2013). Terrorism financing methods: An overview. Perspectives on Terrorism, 7(4), 6–26.Google Scholar
- Gambetta, D., & Hertog, S. (2010). Engineers of Jihad. Sociology working paper 2007–10. Oxford: Department of Sociology, University of Oxford.Google Scholar
- Gendron, A. (2006). Militant Jihadism: Radicalization, conversion, recruitment. Trends in terrorism series (Vol. 4). Ottawa: Integrated Threat Assessment Centre.Google Scholar
- Gendron, A., & Rudner, M. (2012). Assessing cyber threats to Canadian infrastructure. Canadian security intelligence service occasional paper. Ottawa: Canadian Security Intelligence Service.Google Scholar
- General Intelligence and Security Service of the Netherlands. (2012). Jihadism on the web: A breeding ground for Jihad in the modern age. Zoetermeer: Algemene Inlichtingenen Veiligheidsdienst.Google Scholar
- Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei, 26–30.Google Scholar
- Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: C.F.Müller.Google Scholar
- Goertz, S., & Holst, M. (2016). Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von Jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform, 6, 1–14.Google Scholar
- Gulsby, K., & Desa, A. (2014). The new Al-Qaeda: Decentralization and recruitment. Security and Intelligence Studies Journal, 1(2), 53–62.Google Scholar
- Hannigan, R. (2014). The web is a terrorist’s command-and-control network of choice. Financial Times, 03.11.2014. Retrieved January 15, 2019, from https://www.ft.com/content/c89b6c58-6342-11e4-8a63-00144feabdc0
- Harris-Hogan, S. (2012). Australian neo-Jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.Google Scholar
- Hofman, B. (2006). The use of the Internet by Islamic extremists. CT-262-1, May 2006, Testimony presented to the house permanent select committee on intelligence, on May 4, 2006. Testimony series. Santa Monica, CA: RAND Corporation. Retrieved January 15, 2019, from https://www.rand.org/content/dam/rand/pubs/testimonies/2006/RAND_CT262-1.pdf
- Ilardi, G. (2013). Interviews with Canadian radicals. Studies in Conflict & Terrorism, 36(9), 713–738.Google Scholar
- Ilyas, M. (2013). Islamist groups in the UK and recruitment. Journal of Terrorism Research, 4(2), 37–48.Google Scholar
- International Monetary Fund, Legal Department. (2003). Suppressing the financing of terrorism: A handbook for legislative drafting. Washington, DC: International Monetary Fund.Google Scholar
- Irshaid, F. (2014). How ISIS is spreading its message online. BBC News, 19.06.2014. Retrieved January 15, 2019, from http://www.bbc.co.uk/news/world-middle-east-27912569
- Jacobson, M. (2010). Terrorist financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.Google Scholar
- Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 11, 243–285.Google Scholar
- Kaya, A. (2010). Individualization and institutionalization of Islam in Europe in the age of securitization. Insight Turkey, 12(1), 47–63.Google Scholar
- Khosrokhavar, F. (2009). Inside Jihadism: Understanding Jihadi movements worldwide. London: Routledge.Google Scholar
- Kjuka, D. (2013). Digital Jihad: Inside Al-Qaeda’s social networks. The Atlantic, 06.03.2013. Retrieved January 15, 2019, from www.theatlantic.com/international/archive/2013/03/digital-Jihad-inside-al-qaedas-social-networks/273761/
- Klausen, J. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.Google Scholar
- Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.Google Scholar
- Koplowitz, H. (2013). US formally admits killing Anwar Al-Awlaki, 3 other citizens, in drone strikes. International Business Times, 23.05.2013. Retrieved January 15, 2019, from www.ibtimes.com/us-formally-admits-killing-anwar-al-awlaki-3-other-citizens-drone-strikes-full-text-1275805
- Lemieux, A., & Nill, R. (2011). The role and impact of music in promoting (and countering) violent extremism. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 143–152). Wright-Patterson Air Force Base, OH: AF Research Laboratory.Google Scholar
- Levitt, M. (2004). Charitable organizations and terrorist financing: A war on terror status-check. Paper presented at the workshop “The Dimensions of Terrorist Financing,” 19.03.2004. University of Pittsburgh. https://www.washingtoninstitute.org/policy-analysis/view/charitable-organizations-and-terrorist-financing-a-war-on-terror-status-che
- Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training: Part 1. Terrorism Monitor, 5(1), 1–4.Google Scholar
- Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542.Google Scholar
- Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication, 19(1), 75–86.Google Scholar
- Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s socially mediated civil war. Blogs and Bullets III. Peaceworks 91, January 2014. Washington, DC: United States Institute for Peace.Google Scholar
- Mackey, R. (2014). The case for ISIS, made in a British accent. New York Times, 20.06.2014. Retrieved January 15, 2019, from http://www.nytimes.com/2014/06/21/world/middleeast/the-case-for-isis-made-ina-british-accent.html
- Masciandaro, D. (2004). Global financial crime: Terrorism, money laundering and offshore centres. Burlington, VT: Ashgate.Google Scholar
- Moon, D. (2010). Anwar al-Awlaki: Translator of Jihad. Asia Times, 07.01.2010. Retrieved January 15, 2019, from http://www.atimes.com/atimes/Middle_East/LA07Ak05.html
- Musawi, M. (2010). Cheering for Osama: How Jihadists use Internet discussion forums. London: Quilliam Foundation.Google Scholar
- Nacos, B. (2006). Communication and recruitment of terrorists. In J. Forest (Ed.), The making of a terrorist: Recruitment, training and root causes. Westport, CT: Praeger Security International.Google Scholar
- NDR. (2016). Die Geschichte der Safia S. 18.10.2016. Norddeutscher Rundfunk. Retrieved January 15, 2019, from http://www.ndr.de/nachrichten/niedersachsen/hannover_weser-leinegebiet/Die-Geschichte-der-Safia-S,safias102.html
- Nelson, F. (2014). Terrorism in the UK: Social media is now the biggest Jihadi training camp of them all. Daily Telegraph, 25.04.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10786205/Terrorism-in-the-UK-Social-media-is-now-the-biggest-Jihadi-training-camp-of-them-all.html
- Nesser, P. (2004). Jihad in Europe: A survey of the motivations for Sunni Islamist terrorism in post-millennium Europe FFI report. Oslo: Norwegian Institute for Defence Research.Google Scholar
- Neumann, P. (2016). Radicalized: New Jihadists and the threat to the west. London: I.B. Tauris.Google Scholar
- Nissen, T. (2014). Terror.com: IS’s social media warfare in Syria and Iraq. Contemporary conflicts: Military Studies, 2(2). Copenhagen: Royal Danish Defence College.
- Phares, W. (2005). Future Jihad: Terrorist strategies against the West. New York: Palgrave Macmillan.Google Scholar
- Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Köln: Wolters Kluver Luchterhand.Google Scholar
- Roy, O. (2004). Globalised Islam: The search for a New Ummah. London: Hurst & Co.Google Scholar
- Rudner, M. (2013). Al Qaeda’s twenty-year strategic plan: The current phase of global terror. Studies in Conflict & Terrorism, 36(12), 953–980.Google Scholar
- Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 40(1), 10–23.Google Scholar
- Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.Google Scholar
- Senator für Inneres Freie Hansestadt Bremen. (2016). Verfassungsschutzbericht 2015. Bremen.Google Scholar
- Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3(3), 373–387.Google Scholar
- SITE. (2017). Media units of Jihadi groups. Retrieved January 15, 2019, from https://ent.siteintelgroup.com/mediagroups.html
- Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global Jihad. Washington, DC: Georgetown University Press.Google Scholar
- Sydow, C. (2012). German Islamists target youth on the Internet. Der Spiegel, 01.11.2012. Retrieved January 15, 2019, from http://www.spiegel.de/international/germany/german-Jihadists-target-youthon-the-internet-study-finds-a-864797.html
- Syrian Observatory for Human Rights (SOHR). More than 2000 Syrian civilians executed by IS during 18 months since declaring its alleged caliphate. 29.12.2015. Retrieved January 15, 2019, from http://www.syriahr.com/en/?p=41663
- Taylor, M., & Ramsay, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter? In E. Kessels (Ed.), Countering violent extremist narratives (pp. 94–111). Den Haag: National Coordinator for Counterterrorism.Google Scholar
- The Netherlands Office of the Coordinator for Counterterrorism. (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.Google Scholar
- Theohary, C., & Rollins, J. (2011). Terrorist use of the Internet: Information operations in cyberspace. Washington, DC: Congressional Research Service Report for Congress.Google Scholar
- U.K. House of Commons, Home Affairs Committee. (2012). Roots of violent radicalization. London: The Stationery Office.Google Scholar
- Ulph, S. (2006). The next stage in counter-terrorism: Analysing Jihadist radicalization on the web. The Jamestown Foundation. Retrieved January 15, 2019, from www.jamestown.org/docs/JR-Slides.pdf. 23.10.2006
- Ungerleider, N. (2013). How Al-Shabaab uses the Internet to recruit Americans. Fast Company, 26.9.2013. Retrieved January 15, 2019, from http://www.fastcompany.com/3018339/how-al-shabaab-uses-the-internet-to-recruit-americans?partnerDrss&utm_sourceDfeedburner&utm_mediumD-feed&utm_campaignDFeed%3ACfastcompany%2FheadlinesC%28FastCCompany%29
- Vidino, L. (2006). Al Qaeda in Europe: The new battleground of international Jihad. Amherst, NY: Prometheus Books.Google Scholar
- Weimann, G. (2006). Terror on the Internet: The new agenda, the new challenges. Washington, DC: United States Institute of Peace.Google Scholar
- Weimann, G. (2011). Cyber-Fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.Google Scholar
- Whitehead, T. (2014). Self styled ‘father of terrorism’ facing jail. Daily Telegraph, 05.07.2014. Retrieved January 15, 2019, from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10947387/Self-styledfather-of-terrorism-facing-jail.html
- Zelin, A. (2013). Foreign Jihadists in Syria: Tracking recruitment networks. The Washington Institute for Near East Policy, Policywatch 2186, 19.12.2013. Retrieved January 15, 2019, from https://www.washingtoninstitute.org/policy-analysis/view/foreign-jihadists-in-syria-tracking-recruitment-networks
- Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In B. Said & H. Fouad (Eds.), Salafismus: Auf der Suche nach dem wahren Islam (pp. 320–349). Freiburg: Herder.Google Scholar
- Zelin, A., & David, S. (2013). Up to 11,000 foreign fighters in Syria; Steep rise among Western Europeans. ICSR Insight, 17.12.2013. The Washington Institute for Near East Policy. Retrieved January 15, 2019, from https://www.washingtoninstitute.org/policy-analysis/view/up-to-11000-foreign-fighters-in-syria-steep-rise-among-western-europeans
- Zipkin, N. (2014). Have 1,000 followers? You’re in the 96th percentile of Twitter users. Entrepreneur, 19.12.2014. Retrieved 07.04.2017, from http://www.entrepreneur.com/article/230487
- Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 3, 12–16.Google Scholar