Zusammenfassung
Seit Beginn des 21. Jahrhunderts besteht innerhalb der sozialwissenschaftlichen Forschung der Konsens, dass die technologischen Möglichkeiten des Internets von vitaler Bedeutung für den islamistischen Terrorismus sind (Corman 2011; Cornish& Lindley-French&Yorke 2011; Fink&Barclay 2013). Verschiedene Studien bewerten die Existenz des Internets gar als Voraussetzung dafür, dass eine terroristische Organisation wie Al Qaida bereits länger als 20 Jahre existiert, während empirisch betrachtet terroristische Gruppen durchschnittlich weniger als ein Jahr lang bestehen (Archetti 2015; Theohary&Rollins 2011). Ebenso unbestritten ist, dass der „Islamische Staat“ (IS) ohne die Existenz des Internets und der sozialen Medien nicht solch dramatisch viele europäische und westliche Anhänger für seinen Jihad in Syrien und im Irak und für terroristische Anschläge in westlichen Staaten hätte gewinnen können (Goertz 2016; Brooking 2015).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Literatur
Aboudi, S. (2015). Al Qaeda Claims French Attack, Derides Paris Rally. Reuters, 14.1.2015. http://www.reuters.com/article/2015/01/14/us-franceshootingaqapidUSKBN0KN0VO20150114. Zugegriffen: 30.11.2015.
Al Awlaki, A. (2011). Western Jihad is Here to Stay. http://anwar-awlaki.blogspot.co.uk/2011/10/western-jihad-is-here-to-stay.html. Zugegriffen: 11.12.2016.
Al Awlaki, A. (2009). 44 Ways to Support Jihad, no. 29. http://www.anwar-alawlaki.com; http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefaal-Awlaki44wayssupportjihad.pdf. Zugegriffen: 5.4.2017.
Al Kanadi, A. (2004). Der islamische Rechtsspruch über Musik und Gesang im Licht des Qur’an, der Sunnah und der übereinstimmenden Meinung unserer religiösen Vorfahren. o.O.
Al Qaeda (2010). Al Qaeda Training Manual: Military Studies in the Jihad Against the Tyrants. Saffron Walden: Books Express Publishing.
Al Shehri, A. (2014). Al-Qaeda Uses Twitter to Mobilize Saudi Youth. Al-Monitor, 9.4.2014; http://www.al-monitor.com/pulse/security/2014/04/al-qaeda-twitter-mobilizesaudiyouth.html. Zugegriffen: 30.11.2015.
Al Suri, A. (2013). The Jihadi Experiences: The strategy of deterring with terrorism. INSPIRE, Ausgabe 10.
Andrew, C. (2009). The Defence of the Realm. The Authorized History of MI5. Toronto: Viking Canada.
Archetti, C. (2015). Terrorism, Communication and New Media: Explaning Radicalization in the Digital Age. Perspectives on Terrorism, 9/1, Februar 2015.
Arquilla, J.&Ronfeldt, D. (1996). The Advent of Netwar. RAND Corporation.
Atayf, M. (2012). Scholars Speak Out in Favour of Electronic Jihad against the Enemy.
Al Arabiya News, 30.1.2012. http://english.alarabiya.net/articles/2012/01/29/191307.html Zugegriffen: 4.3.2017.
Bardoloi, S. (2004). Money Not Always Honey! Information Management, 20.1.2004. http://www.information-management.com/specialreports/20040120/7996-1.html. Zugegriffen: 29.3.2017.
Barrett, D.&Mendick, R. (2014). Mainstream Charities have Donated Thousands to Islamic Group Fronted by Terror Suspect. Sunday Telegraph, 2.3.2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10670120/Mainstream-charities-have-donated-thousandsto-Islamic-group-fronted-by-terror-suspect.html. Zugegriffen: 30.11.2015.
Behrens, C./Goertz, S. (2016). Radikalisierungsprozesse von islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11/2016, S. 686–693.
Berger, J.&Morgan, J. (2015). The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. Washington, DC: The Brookings Institution.
Berger, J.&Strathearn, B. (2013). Who Matters Online: Measuring Influence, Evaluating Content and Countering Violent Extremism in Online Social Networks. London: International Centre for the Study of Radicalisation and Political Violence. King’s College.
Bertram, S.&Ellison, K. (2014). Sub Saharan African Terrorist Groups’ Use of the Internet. Journal of Terrorism Research 5(1), S. 5–26.
Brandon, J. (2010). Terrorists Targeting Children Via Facebook, Twitter. Fox News, 15.3.2010. www.foxnews.com/tech/2010/03/15/terrorists-targeting-children-via-facebook-twitter.html. Zugegriffen: 7.4.2017.
Brandon, J. (2008). Virtual Caliphate. Islamic Extremists and Their Websites. London: Centre for Social Cohesion.
Brooking, E. (2015). The ISIS Propaganda Machine is Horrifying and Effective. How Does it Work? Council on Foreign Relations, 21.8.2015.
Bundesamt für Verfassungsschutz (2016). BfV-Newsletter 3/2016, Thema 1.
Bundesamt für Verfassungsschutz (2013). BfV-Newsletter 1/2013, Thema 6.
Bundeskriminalamt/ Bundesamt für Verfassungsschutz (2016). Analyse der Radikalisierungshintergründe und -verläufe der Personen, die aus islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin
Carter, J.&Maher, S.&Neumann, P. (2014). #Greenbirds: Measuring Importance andInfluence in Syrian Foreign Fighter Networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.
Conway, M. (2006). Terrorism and the Internet. New Media – New Threat? Parliamentary Affairs 59/2, April 2006.
Corman, S. (2011). Understanding the Role of Narratives in Extremist Strategic Communications. In Fenstermacher, L./ Leventhal, T.(Hrsg.). Countering Violent Extremism: Scientific Methods and Strategies, AF Research Laboratory, S. 36–43.
Cornish, P./Lindley-French, J./ Yorke, C. (2011) (Hrsg.). Strategic Communication and National Strategy. London: A Chatham House Report, Royal Institute of International Affairs.
Directorate for External Policies, Policy Department (2013). The Involvement of Salafism/ Wahhabism in the Support and Supply of Arms to Rebel Groups Around the World. Brüssel: Europäisches Parlament.
Eck, K.&Hultmann, L. (2007). One-sided violence against civilians in war: Insights from New fatality data. Journal Peace Resolution, 44, S. 233–246.
EUROPOL (2009). TE-SAT 2009: EU Terrorism Situation and Trend Report. Den Haag.
External Operations Reconnaissance Team (2014). OSJ [Open Source Jihad] Special: Field Tactics. Inspire Magazine, Ausgabe 13, S. 108–111.
FAZ (2016). Anschlag auf Sikh-Tempel Jetzt stehen die Dschihadisten vor Gericht. http://www.faz.net/aktuell/politik/kampf-gegen-den-terror/prozess-beginn-um-terror-anschlag-auf-sikh-tempel-in-essen-14562221.html. Zugegriffen: 18.12.2016.
Farwell, J. (2014). The Media Strategy of ISIS. Survival, 56:6, S. 49–55.
Fink, N./ Barclay, J. (2013). Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations. Washington D.C.: Center on Global Counterterrorism Cooperation.
Fisher, A. (2016). Swarmcast: How Jihadist Networks Maintain A Persistent Online Presence. Perspectives on Terrorism, 9/3, S. 3–19.
Freeman, M.&Ruehsen, M. (2013). Terrorism Financing Methods: An Overview. Perspectives on Terrorism 7(4), S. 6–26.
Gambetta, D.&Hertog, S. (2010). Engineers of Jihad. Department of Sociology, University of Oxford, Sociology Working Paper 2007–10.
Gendron, A.&Rudner, M. (2012). Assessing Cyber Threats to Canadian Infrastructure. Canadian Security Intelligence Service Occasional Paper. Ottawa: Canadian Security Intelligence Service.
General Intelligence and Security Service of the Netherlands (2012). Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. Zoetermeer: Algemene Inlichtingen-en Veiligheidsdienst.
Gendron, A. (2006). Militant Jihadism: Radicalization, Conversion, Recruitment. Trends in Terrorism Series, Vol. 4. Ottawa: Integrated Threat Assessment Centre.
Gertz, B. (2013). Islamist Terrorists Shifting from Web to Social Media. The Washington Free Beacon. 23.10.2013. http://freebeacon.com/islamist-terrorists-shifting-from-webto- social-media/. Zugegriffen: 13.3.2017.
Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: Kriminalistik/C.F.Müller.
Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei. S. 26–30.
Goertz, S./Holst, M. (2016): Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform 6/2016. S. 1–14.
Gulsby, K.&Desa, A. (2014). The New Al-Qaeda: Decentralization and Recruitment. Security and Intelligence Studies Journal 1(2), S. 53–62.
Hannigan, R. (2014). The web os a terrorist’s command-and-control network of choice. FT.com, 3.11.2014; http://on.ft.com/1qm2QJ Zugegriffen: 9.3.2017.
Harris-Hogan, S. (2012). Australian Neo-Jihadist Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence. Studies in Conflict and Terrorism 35(4), S. 298–314.
Hofman, B. (2006). The Use of the Internet by Islamic Extremists. Rand Corporation Testimony Series. 4.5.2006.
Ilardi, G. (2013). Interviews with Canadian Radicals. Studies in Conflict & Terrorism 36(9), S. 713–738.
Ilyas, M. (2013). Islamist Groups in the UK and Recruitment. Journal of TerrorismResearch 4(2), S. 37–48.
International Monetary Fund, Legal Department (2003). Suppressing the Financing of Terrorism: A Handbook for Legislative Drafting. Washington, D.C.: International Monetary Fund.
Irshaid, F. (2014). How ISIS is Spreading its Message Online’, BBC News, 19.6.2014.http://www.bbc.co.uk/news/world-middle-east-27912569. Zugegriffen: 4.3.2017.
Jacobson, M. (2010). Terrorist Financing and the Internet. Studies in Conflict & Terrorism 33(4), S. 353–363.
Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 1999, 11, S. 243–285.
Kaya, A. (2010). Individualization and Institutionalization of Islam in Europe in the Age of Securitization. Insight Turkey 12(1), S. 47–63.
Khosrokhavar, F. (2009). Inside Jihadism. Understanding Jihadi Movements Worldwide. London: Routledge.
Kjuka, D. (2013). Digital Jihad: Inside Al-Qaeda’s Social Networks. The Atlantic, 6.3.2013. www.theatlantic.com/international/archive/2013/03/digital-jihad-inside-al-qaedas-social-networks/273761/. Zugegriffen: 4.3.2017.
Klausen, J. (2015). Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38:1, S. 1–22.
Koplowitz, H. (2013). US Formally Admits Killing Anwar Al-Awlaki, 3 Other Citizens, in DroneStrikes. International Business Times, 23.5.2013. www.ibtimes.com/us-formally-admits-killing-anwar-al-awlaki-3-other-citizens-drone-strikes-full-text-1275805. Zugegriffen: 12.3.2017.
Klausen, J. (2012). The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’sPropaganda Campaign. Perspectives on Terrorism 6(1), S. 36–53.
Lemieux, A.&Nill, R. (2011). The Role and Impact of Music in Promoting (and Countering) Violent Extremism. In Fenstermacher L.&Leventhal, T. (Hrsg). Countering Violent Extremism: Scientific Methods and Strategies. AF Research Laboratory.
Levitt, M. (2004). Charitable Organizations and Terrorist Financing: A War on Terror Status- Check. In The Dimensions of Terrorist Financing. University of Pittsburgh.
Lia, B. (2009). Architect of Global Jihad: The Life of Al Qaeda Strategist Abu Musab Al Suri. London: Hurst.
Lia, B. (2008). Doctrines for Jihadi Terrorist Training. Terrorism and Political Violence 20(4), S. 518–542.
Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training – part 1. Terrorism, Monitor, 5(1), S. 1–4.
Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication 19/1., S. 75–86.
Lynch, M.&Freelon, D.&Aday, S. (2014). Syria’s socially mediated civil war. United States Institute for Peace, 91.1, S. 1–35.
Mackey, R. (2014). The Case for ISIS, Made in a British Accent, New York Times, 20.6.2014. http://www.nytimes.com/2014/06/21/world/middleeast/the-case-for-isis-made-ina-british-accent.html. Zugegriffen: 4.2.2017.
Masciandaro, D. (2004). Global Financial Crime: Terrorism, Money Laundering and OffshoreCentres. Burlington, VT: Ashgate.
Moon, D. (2010). Anwar al-Awlaki: Translator of jihad. Asia Times, 7.1.2010. http://www.atimes.com/atimes/Middle_East/LA07Ak05.html. Zugegriffen: 4.4.2017.
Musawi, M. (2010). Cheering for Osama. How Jihadists Use Internet Discussion Forums. London: Quilliam Foundation.
Nacos, B. (2006). Communication and Recruitment of Terrorists. In Forest, J. (Hrsg.). The Making of a Terrorist: Recruitment, Training and Root Causes. Westport, CT: Praeger Security International.
Nelson, F. (2014). Terrorism in the UK: Social Media is Now the Biggest Jihadi Training Camp of Them All. Daily Telegraph, 25.4. 2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10786205/Terrorism-in-the-UK-Social-media-is-now-thebiggest-jihadi-training-camp-of-them-all.html. Zugegriffen: 30.11.2015.
Nesser, P. (2004). Jihad in Europe – A Survey of the Motivations for Sunni Islamist Terrorism inPost-Millennium Europe FFI Report. Oslo: Norwegian Institute for Defence Research.
Neumann, P. (2016). Radicalized. New Jihadists and the Threat to the West. London: I.B. Tauris.
Nissen, T. (2014). Terror.com – IS’s Social Media Warfare in Syria and Iraq. Contemporary Conflicts vol. 2, no. 2.
NDR (2016). Die Geschichte der Safia S. 18.10.2016. http://www.ndr.de/nachrichten/niedersachsen/hannover_weser-leinegebiet/Die-Geschichte-der-Safia-S,safias102.html. Zugegriffen: 9.2.2017.
Phares, W. (2005). Future Jihad: Terrorist Strategies against the West. New York: Palgrave Macmillan.
Rieger, D.&Frischlich&Bente (2013). Propaganda 2.0: Psychological Effects of Right- Wing and Islamic Extremist Internet Videos. Köln: Wolters Kluver Luchterhand.
Roy, O. (2004). Globalised Islam. The Search for a New Ummah. London: Hurst & Co.
Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s Catalyst for Global Terror, Studies in Conflict & Terrorism, 40:1, S. 10–23.
Rudner, M. (2013). Al Qaeda’s Twenty-Year Strategic Plan: The Current Phase of Global Terror. Studies in Conflict & Terrorism 36(12), S. 953–980.
Seymour, B. (2008). Global Money Laundering. Journal of Applied Security Research 3(3), S. 373–387.
Senator für Inneres Freie Hansestadt Bremen (2016). Verfassungsschutzbericht 2015. Bremen.
Schmid, A. (2005). Terrorism as PsychologicalWarfare. Democracy and Security 1(2).
SITE (2017). Media Units of Jihadi Groups. https://ent.siteintelgroup.com/mediagroups.html. Zugegriffen: 26.3.2017.
Springer, D.&Regens, J.&Edger, D. (2009). Islamic Radicalism and Global Jihad. Washington D.C.: Georgetown University Press.
Sydow, C. (2012): German Islamists Target Youth on the Internet. Der Spiegel, 1.11.2012. http://www.spiegel.de/international/germany/german-jihadists-target-youthon-the-internet-study-finds-a-864797.html. Zugegriffen: 18.2.2017.
Syrian Observatory for Human Rights (SOHR). More than 2000 Syrian civilians executed by IS during 18 months since declaring its alleged caliphate. 29.12.2015, online: http://www.syriahr.com/en/?p=41663; (18.11.2016).
Taylor, M.&Ramsay, G. (2010). Violent Radical Content and the Relationship between Ideologyand Behaviour. in Kessels, E. (Hrsg.). Countering Violent Extremist Narratives. Den Haag: National Coordinator for Counterterrorism.
The Netherlands Office of the Coordinator for Counterterrorism (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.
Theohary, C./Rollins, J. (2011). Terrorist Use of the Internet: Information Operations in Cyberspace. Washington D.C.: Congressional Research Service Report for Congress.
U.K. House of Commons, Home Affairs Committee (2012). Roots of Violent Radicalization. London: The Stationery Office.
Ulph, S. (2006). The Next Stage in Counter-Terrorism: Analysing Jihadist Radicalization onthe Web. www.jamestown.org/docs/JR-Slides.pdf. Zugegriffen: 8.3.2017.
Ungerleider, N. (2013). How Al-Shabaab Uses the Internet to Recruit Americans. Fast Company, 26.9.2013. http://www.fastcompany.com/3018339/how-al-shabaab-uses-theinternet-to-recruit-americans?partnerDrss&utm_sourceDfeedburner&utm_mediumD-feed&utm_campaignDFeed%3ACfastcompany%2FheadlinesC%28FastCCompany%29. Zugegriffen: 28.3.2017.
Vidino, L. (2006). Al Qaeda in Europe: The New Battleground of International Jihad. Amherst, NY: Prometheus Books.
Weimann, G. (2011). Cyber-Fatwas and Terrorism. Studies in Conflict & Terrorism 34(10), S. 765–781.
Weimann, G. (2006). Terror on the Internet: The New Agenda, The New Challenges. Washington D.C.: United States Institute of Peace.
Whitehead, T. (2014). Self Styled ‘Father of Terrorism’ Facing Jail. Daily Telegraph, 5.7.2014. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10947387/Self-styledfather-of-terrorism-facing-jail.html. Zugegriffen: 13.3.2017.
Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In: Said, B./Fouad, H. (Hrsg.). Salafismus. Auf der Suche nach dem wahren Islam. S. 320–349. Freiburg: Herder.
Zelin, A. (2013). Foreign Jihadists in Syria: Tracking Recruitment Networks. The WashingtonInstitute for Near East Policy, 19.12.2013. http://www.washingtoninstitute.org/policy-analysis/view/foreign-jihadists-in-syria-tracking-recruitment-networks. Zugegriffen: 30.11.2015.
David, Sami/Zelin, A. (2013). Up to 11,000 Foreign Fighters in Syria; Steep Rise among Western Europeans. ICSR Insights, 17.12.2013. http://icsr.info/2013/12/icsr-insight-11000-foreign-fighters-syria-steep-riseamong-western-europeans/. Zugegriffen: 30.11.2015.
Zipkin, N. (2014). Have 1,000 Followers? You’re in the 96th Percentile of Twitter Users. Entrepreneur 19.12.2014. http://www.entrepreneur.com/article/230487. Zugegriffen: 7.4.2017.
Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, Nr. 3 (2015), S. 12–16.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Fachmedien Wiesbaden GmbH
About this chapter
Cite this chapter
Goertz, S. (2018). Neue technologische Mittel des neuen Terrorismus. In: Der neue Terrorismus. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-18814-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-658-18814-6_4
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-18813-9
Online ISBN: 978-3-658-18814-6
eBook Packages: Social Science and Law (German Language)