New Technology in the Hands of the New Terrorism

  • Stefan Goertz
  • Alexander E. Streitparth


This chapter examines the technological opportunities of the digital age and the Internet for a multidirectional exchange of Jihadi ideas, ideology, strategy and tactics. Myriads of social networks on the Internet serve as platforms for Jihadi disputes, which shows that the Internet and telecommunication technology of the twenty-first century are of central importance for new terrorism. Currently, the World Wide Web and its numerous media channels are the most important and most commonly and frequently used communication and propaganda platforms of the Islamist and Jihadi milieu. The Internet allows free cross-border and real-time communication and interaction as well as the reception of (supposedly authentic) reports on the fate of individual Jihadis and developments in far-off conflict regions. These technological achievements of the twenty-first century have enabled the (imagined) worldwide Umma to interconnect and pose a historically new potential for Jihadi actors of new terrorism to mobilise and radicalise Muslims on a global scale.


  1. Aboudi, S. (2015). Al Qaeda claims French attack, Derides Paris Rally. Reuters, 14.01.2015. Retrieved January 15, 2019, from
  2. Al Awlaki, A. (2009). 44 Ways to support Jihad, no. 29. Nefa Foundation. Retrieved January 15, 2019, from;
  3. Al Awlaki, A. (2011). Western Jihad is here to stay. Blogspot. Retrieved January 15, 2019, from
  4. Al Qaeda. (2010). Al Qaeda training manual: Military studies in the Jihad against the Tyrants. Saffron Walden: Books Express Publishing.Google Scholar
  5. Al Shehri, A. (2014). Al-Qaeda uses Twitter to Mobilize Saudi Youth. Al-Monitor, 09.04.2014. Retrieved January 15, 2019, from
  6. Al Suri, A. (2013). The Jihadi experiences: The strategy of deterring with terrorism. INSPIRE, Issue 10.Google Scholar
  7. Archetti, C. (2015, February). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1).
  8. Arquilla, J., & Ronfeldt, D. (1996). The advent of Netwar. Santa Monica, CA: RAND Corporation.Google Scholar
  9. Atayf, M. (2012). Scholars speak out in favour of electronic Jihad against the enemy. Al Arabiya News, 30.01.2012. Retrieved January 15, 2019, from
  10. Bardoloi, S. (2004). Money not always honey! Information Management, 20.01.2004. Retrieved January 15, 2019, from
  11. Barrett, D., & Mendick, R. (2014). Mainstream charities have donated thousands to Islamic group fronted by terror suspect. Sunday Telegraph, 02.03.2014. Retrieved January 15, 2019, from
  12. Behrens, C., & Goertz, S. (2016). Radikalisierungsprozesse von Islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11, 686–693.Google Scholar
  13. Berger, J., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. Washington, DC: The Brookings Institution.Google Scholar
  14. Berger, J., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: King’s College, International Centre for the Study of Radicalisation and Political Violence.Google Scholar
  15. Bertram, S., & Ellison, K. (2014). Sub Saharan African terrorist groups’ use of the Internet. Journal of Terrorism Research, 5(1), 5–26.CrossRefGoogle Scholar
  16. Brandon, J. (2008). Virtual caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion.Google Scholar
  17. Brandon, J. (2010). Terrorists targeting children via Facebook, Twitter. Fox News, 15.03.2010. Retrieved January 15, 2019, from
  18. Brooking, E. (2015). The ISIS propaganda machine is horrifying and effective: How does it work? Council on Foreign Relations, Retrieved August 21, 2015.Google Scholar
  19. Bundesamt für Verfassungsschutz. (2013). BfV-Newsletter 1/2013, Thema 6.Google Scholar
  20. Bundesamt für Verfassungsschutz. (2016). BfV-Newsletter 3/2016, Thema 1.Google Scholar
  21. Bundeskriminalamt/Bundesamt für Verfassungsschutz. (2016). Analyse der Radikalisie- rungshintergründe und -verläufe der Personen, die aus Islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin.Google Scholar
  22. Burger, R. (2016). Anschlag auf Sikh-Tempel: Jetzt stehen die Dschihadisten vor Gericht. Frankfurter Allgemeine Zeitung. 07.12.2016. Retrieved January 15, 2019, from
  23. Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.Google Scholar
  24. Conway, M. (2006, April). Terrorism and the Internet: New media – New threat? Parliamentary Affairs, 59(2), 283–298.CrossRefGoogle Scholar
  25. Corman, S. (2011). Understanding the role of narratives in extremist strategic communications. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 36–43). Wright-Patterson Air Force Base, OH: AF Research Laboratory.Google Scholar
  26. Cornish, P., Lindley-French, J., & Yorke, C. (Eds.). (2011). Strategic communication and national strategy: A Chatham House report. London: Royal Institute of International Affairs.Google Scholar
  27. Directorate for External Policies, Policy Department. (2013). The involvement of Salafism/Wahhabism in the support and supply of arms to rebel groups around the world. Brussels: European Parliament.Google Scholar
  28. Eck, K., & Hultmann, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal Peace Resolution, 44, 233–246.CrossRefGoogle Scholar
  29. EUROPOL. (2009). TE-SAT 2009: EU terrorism situation and trend report. Den Haag. External Operations Reconnaissance Team (2014).Google Scholar
  30. Farwell, J. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.CrossRefGoogle Scholar
  31. Fink, N., & Barclay, J. (2013). Mastering the narrative: Counterterrorism strategic communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation.Google Scholar
  32. Fisher, A. (2016). Swarmcast: How Jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–19.Google Scholar
  33. Freeman, M., & Ruehsen, M. (2013). Terrorism financing methods: An overview. Perspectives on Terrorism, 7(4), 6–26.Google Scholar
  34. Gambetta, D., & Hertog, S. (2010). Engineers of Jihad. Sociology working paper 2007–10. Oxford: Department of Sociology, University of Oxford.Google Scholar
  35. Gendron, A. (2006). Militant Jihadism: Radicalization, conversion, recruitment. Trends in terrorism series (Vol. 4). Ottawa: Integrated Threat Assessment Centre.Google Scholar
  36. Gendron, A., & Rudner, M. (2012). Assessing cyber threats to Canadian infrastructure. Canadian security intelligence service occasional paper. Ottawa: Canadian Security Intelligence Service.Google Scholar
  37. General Intelligence and Security Service of the Netherlands. (2012). Jihadism on the web: A breeding ground for Jihad in the modern age. Zoetermeer: Algemene Inlichtingenen Veiligheidsdienst.Google Scholar
  38. Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei, 26–30.Google Scholar
  39. Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: C.F.Müller.Google Scholar
  40. Goertz, S., & Holst, M. (2016). Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von Jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform, 6, 1–14.Google Scholar
  41. Gulsby, K., & Desa, A. (2014). The new Al-Qaeda: Decentralization and recruitment. Security and Intelligence Studies Journal, 1(2), 53–62.Google Scholar
  42. Hannigan, R. (2014). The web is a terrorist’s command-and-control network of choice. Financial Times, 03.11.2014. Retrieved January 15, 2019, from
  43. Harris-Hogan, S. (2012). Australian neo-Jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.CrossRefGoogle Scholar
  44. Hofman, B. (2006). The use of the Internet by Islamic extremists. CT-262-1, May 2006, Testimony presented to the house permanent select committee on intelligence, on May 4, 2006. Testimony series. Santa Monica, CA: RAND Corporation. Retrieved January 15, 2019, from
  45. Ilardi, G. (2013). Interviews with Canadian radicals. Studies in Conflict & Terrorism, 36(9), 713–738.CrossRefGoogle Scholar
  46. Ilyas, M. (2013). Islamist groups in the UK and recruitment. Journal of Terrorism Research, 4(2), 37–48.CrossRefGoogle Scholar
  47. International Monetary Fund, Legal Department. (2003). Suppressing the financing of terrorism: A handbook for legislative drafting. Washington, DC: International Monetary Fund.Google Scholar
  48. Irshaid, F. (2014). How ISIS is spreading its message online. BBC News, 19.06.2014. Retrieved January 15, 2019, from
  49. Jacobson, M. (2010). Terrorist financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.CrossRefGoogle Scholar
  50. Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 11, 243–285.CrossRefGoogle Scholar
  51. Kaya, A. (2010). Individualization and institutionalization of Islam in Europe in the age of securitization. Insight Turkey, 12(1), 47–63.Google Scholar
  52. Khosrokhavar, F. (2009). Inside Jihadism: Understanding Jihadi movements worldwide. London: Routledge.Google Scholar
  53. Kjuka, D. (2013). Digital Jihad: Inside Al-Qaeda’s social networks. The Atlantic, 06.03.2013. Retrieved January 15, 2019, from
  54. Klausen, J. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.Google Scholar
  55. Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.CrossRefGoogle Scholar
  56. Koplowitz, H. (2013). US formally admits killing Anwar Al-Awlaki, 3 other citizens, in drone strikes. International Business Times, 23.05.2013. Retrieved January 15, 2019, from
  57. Lemieux, A., & Nill, R. (2011). The role and impact of music in promoting (and countering) violent extremism. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 143–152). Wright-Patterson Air Force Base, OH: AF Research Laboratory.Google Scholar
  58. Levitt, M. (2004). Charitable organizations and terrorist financing: A war on terror status-check. Paper presented at the workshop “The Dimensions of Terrorist Financing,” 19.03.2004. University of Pittsburgh.
  59. Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training: Part 1. Terrorism Monitor, 5(1), 1–4.Google Scholar
  60. Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542.CrossRefGoogle Scholar
  61. Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication, 19(1), 75–86.CrossRefGoogle Scholar
  62. Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s socially mediated civil war. Blogs and Bullets III. Peaceworks 91, January 2014. Washington, DC: United States Institute for Peace.Google Scholar
  63. Mackey, R. (2014). The case for ISIS, made in a British accent. New York Times, 20.06.2014. Retrieved January 15, 2019, from
  64. Masciandaro, D. (2004). Global financial crime: Terrorism, money laundering and offshore centres. Burlington, VT: Ashgate.Google Scholar
  65. Moon, D. (2010). Anwar al-Awlaki: Translator of Jihad. Asia Times, 07.01.2010. Retrieved January 15, 2019, from
  66. Musawi, M. (2010). Cheering for Osama: How Jihadists use Internet discussion forums. London: Quilliam Foundation.Google Scholar
  67. Nacos, B. (2006). Communication and recruitment of terrorists. In J. Forest (Ed.), The making of a terrorist: Recruitment, training and root causes. Westport, CT: Praeger Security International.Google Scholar
  68. NDR. (2016). Die Geschichte der Safia S. 18.10.2016. Norddeutscher Rundfunk. Retrieved January 15, 2019, from,safias102.html
  69. Nelson, F. (2014). Terrorism in the UK: Social media is now the biggest Jihadi training camp of them all. Daily Telegraph, 25.04.2014. Retrieved January 15, 2019, from
  70. Nesser, P. (2004). Jihad in Europe: A survey of the motivations for Sunni Islamist terrorism in post-millennium Europe FFI report. Oslo: Norwegian Institute for Defence Research.Google Scholar
  71. Neumann, P. (2016). Radicalized: New Jihadists and the threat to the west. London: I.B. Tauris.CrossRefGoogle Scholar
  72. Nissen, T. (2014). IS’s social media warfare in Syria and Iraq. Contemporary conflicts: Military Studies, 2(2). Copenhagen: Royal Danish Defence College.
  73. Phares, W. (2005). Future Jihad: Terrorist strategies against the West. New York: Palgrave Macmillan.Google Scholar
  74. Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Köln: Wolters Kluver Luchterhand.Google Scholar
  75. Roy, O. (2004). Globalised Islam: The search for a New Ummah. London: Hurst & Co.Google Scholar
  76. Rudner, M. (2013). Al Qaeda’s twenty-year strategic plan: The current phase of global terror. Studies in Conflict & Terrorism, 36(12), 953–980.CrossRefGoogle Scholar
  77. Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 40(1), 10–23.CrossRefGoogle Scholar
  78. Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.CrossRefGoogle Scholar
  79. Senator für Inneres Freie Hansestadt Bremen. (2016). Verfassungsschutzbericht 2015. Bremen.Google Scholar
  80. Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3(3), 373–387.CrossRefGoogle Scholar
  81. SITE. (2017). Media units of Jihadi groups. Retrieved January 15, 2019, from
  82. Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global Jihad. Washington, DC: Georgetown University Press.Google Scholar
  83. Sydow, C. (2012). German Islamists target youth on the Internet. Der Spiegel, 01.11.2012. Retrieved January 15, 2019, from
  84. Syrian Observatory for Human Rights (SOHR). More than 2000 Syrian civilians executed by IS during 18 months since declaring its alleged caliphate. 29.12.2015. Retrieved January 15, 2019, from
  85. Taylor, M., & Ramsay, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter? In E. Kessels (Ed.), Countering violent extremist narratives (pp. 94–111). Den Haag: National Coordinator for Counterterrorism.Google Scholar
  86. The Netherlands Office of the Coordinator for Counterterrorism. (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.Google Scholar
  87. Theohary, C., & Rollins, J. (2011). Terrorist use of the Internet: Information operations in cyberspace. Washington, DC: Congressional Research Service Report for Congress.Google Scholar
  88. U.K. House of Commons, Home Affairs Committee. (2012). Roots of violent radicalization. London: The Stationery Office.Google Scholar
  89. Ulph, S. (2006). The next stage in counter-terrorism: Analysing Jihadist radicalization on the web. The Jamestown Foundation. Retrieved January 15, 2019, from 23.10.2006
  90. Ungerleider, N. (2013). How Al-Shabaab uses the Internet to recruit Americans. Fast Company, 26.9.2013. Retrieved January 15, 2019, from
  91. Vidino, L. (2006). Al Qaeda in Europe: The new battleground of international Jihad. Amherst, NY: Prometheus Books.Google Scholar
  92. Weimann, G. (2006). Terror on the Internet: The new agenda, the new challenges. Washington, DC: United States Institute of Peace.Google Scholar
  93. Weimann, G. (2011). Cyber-Fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.CrossRefGoogle Scholar
  94. Whitehead, T. (2014). Self styled ‘father of terrorism’ facing jail. Daily Telegraph, 05.07.2014. Retrieved January 15, 2019, from
  95. Zelin, A. (2013). Foreign Jihadists in Syria: Tracking recruitment networks. The Washington Institute for Near East Policy, Policywatch 2186, 19.12.2013. Retrieved January 15, 2019, from
  96. Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In B. Said & H. Fouad (Eds.), Salafismus: Auf der Suche nach dem wahren Islam (pp. 320–349). Freiburg: Herder.Google Scholar
  97. Zelin, A., & David, S. (2013). Up to 11,000 foreign fighters in Syria; Steep rise among Western Europeans. ICSR Insight, 17.12.2013. The Washington Institute for Near East Policy. Retrieved January 15, 2019, from
  98. Zipkin, N. (2014). Have 1,000 followers? You’re in the 96th percentile of Twitter users. Entrepreneur, 19.12.2014. Retrieved 07.04.2017, from
  99. Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 3, 12–16.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Stefan Goertz
    • 1
  • Alexander E. Streitparth
    • 2
  1. 1.BundespolizeiHochschule des BundesLübeckGermany
  2. 2.BundeswehrZentrum Operative KommunikationMayenGermany

Personalised recommendations