Skip to main content

2019 | OriginalPaper | Buchkapitel

4. New Technology in the Hands of the New Terrorism

verfasst von : Stefan Goertz, Alexander E. Streitparth

Erschienen in: The New Terrorism

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter examines the technological opportunities of the digital age and the Internet for a multidirectional exchange of Jihadi ideas, ideology, strategy and tactics. Myriads of social networks on the Internet serve as platforms for Jihadi disputes, which shows that the Internet and telecommunication technology of the twenty-first century are of central importance for new terrorism. Currently, the World Wide Web and its numerous media channels are the most important and most commonly and frequently used communication and propaganda platforms of the Islamist and Jihadi milieu. The Internet allows free cross-border and real-time communication and interaction as well as the reception of (supposedly authentic) reports on the fate of individual Jihadis and developments in far-off conflict regions. These technological achievements of the twenty-first century have enabled the (imagined) worldwide Umma to interconnect and pose a historically new potential for Jihadi actors of new terrorism to mobilise and radicalise Muslims on a global scale.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
See more about the individual functions: Conway (2006), Fisher (2016), Goertz (2016), Hofman (2006), Nacos (2006), Rudner (2017), Ulph (2006), Weimann (2006, 2011).
 
2
Court of Quebec, District of Montreal, Criminal and Penal Division, HM The Queen vs. Said Namouh, no. 500–73–002831-077 and 500–73–002965-081, 1.10.2009.
 
4
BfV-Newsletter No. 3/2016 – Thema 1.
 
5
Definition of netwar: “Lower-intensity conflict at the societal end of the spectrum in which a combatant is organised along networked lines or employs networks for operational control and other communications” (Arquilla & Ronfeldt, 1996, p. vii). For Internet as a “command and control” platform see Hannigan (2014).
 
Literatur
Zurück zum Zitat Al Qaeda. (2010). Al Qaeda training manual: Military studies in the Jihad against the Tyrants. Saffron Walden: Books Express Publishing. Al Qaeda. (2010). Al Qaeda training manual: Military studies in the Jihad against the Tyrants. Saffron Walden: Books Express Publishing.
Zurück zum Zitat Al Suri, A. (2013). The Jihadi experiences: The strategy of deterring with terrorism. INSPIRE, Issue 10. Al Suri, A. (2013). The Jihadi experiences: The strategy of deterring with terrorism. INSPIRE, Issue 10.
Zurück zum Zitat Arquilla, J., & Ronfeldt, D. (1996). The advent of Netwar. Santa Monica, CA: RAND Corporation. Arquilla, J., & Ronfeldt, D. (1996). The advent of Netwar. Santa Monica, CA: RAND Corporation.
Zurück zum Zitat Behrens, C., & Goertz, S. (2016). Radikalisierungsprozesse von Islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11, 686–693. Behrens, C., & Goertz, S. (2016). Radikalisierungsprozesse von Islamistischen Einzeltätern und die aktuelle Analyse durch die deutschen Sicherheitsbehörden. Kriminalistik, 11, 686–693.
Zurück zum Zitat Berger, J., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. Washington, DC: The Brookings Institution. Berger, J., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. Washington, DC: The Brookings Institution.
Zurück zum Zitat Berger, J., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: King’s College, International Centre for the Study of Radicalisation and Political Violence. Berger, J., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: King’s College, International Centre for the Study of Radicalisation and Political Violence.
Zurück zum Zitat Bertram, S., & Ellison, K. (2014). Sub Saharan African terrorist groups’ use of the Internet. Journal of Terrorism Research, 5(1), 5–26.CrossRef Bertram, S., & Ellison, K. (2014). Sub Saharan African terrorist groups’ use of the Internet. Journal of Terrorism Research, 5(1), 5–26.CrossRef
Zurück zum Zitat Brandon, J. (2008). Virtual caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion. Brandon, J. (2008). Virtual caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion.
Zurück zum Zitat Brooking, E. (2015). The ISIS propaganda machine is horrifying and effective: How does it work? Council on Foreign Relations, Retrieved August 21, 2015. Brooking, E. (2015). The ISIS propaganda machine is horrifying and effective: How does it work? Council on Foreign Relations, Retrieved August 21, 2015.
Zurück zum Zitat Bundesamt für Verfassungsschutz. (2013). BfV-Newsletter 1/2013, Thema 6. Bundesamt für Verfassungsschutz. (2013). BfV-Newsletter 1/2013, Thema 6.
Zurück zum Zitat Bundesamt für Verfassungsschutz. (2016). BfV-Newsletter 3/2016, Thema 1. Bundesamt für Verfassungsschutz. (2016). BfV-Newsletter 3/2016, Thema 1.
Zurück zum Zitat Bundeskriminalamt/Bundesamt für Verfassungsschutz. (2016). Analyse der Radikalisie- rungshintergründe und -verläufe der Personen, die aus Islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin. Bundeskriminalamt/Bundesamt für Verfassungsschutz. (2016). Analyse der Radikalisie- rungshintergründe und -verläufe der Personen, die aus Islamistischer Motivation aus Deutschland in Richtung Syrien oder Irak ausgereist sind. Berlin.
Zurück zum Zitat Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College. Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: The International Centre for the Study of Radicalisation and Political Violence, King’s College.
Zurück zum Zitat Conway, M. (2006, April). Terrorism and the Internet: New media – New threat? Parliamentary Affairs, 59(2), 283–298.CrossRef Conway, M. (2006, April). Terrorism and the Internet: New media – New threat? Parliamentary Affairs, 59(2), 283–298.CrossRef
Zurück zum Zitat Corman, S. (2011). Understanding the role of narratives in extremist strategic communications. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 36–43). Wright-Patterson Air Force Base, OH: AF Research Laboratory. Corman, S. (2011). Understanding the role of narratives in extremist strategic communications. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 36–43). Wright-Patterson Air Force Base, OH: AF Research Laboratory.
Zurück zum Zitat Cornish, P., Lindley-French, J., & Yorke, C. (Eds.). (2011). Strategic communication and national strategy: A Chatham House report. London: Royal Institute of International Affairs. Cornish, P., Lindley-French, J., & Yorke, C. (Eds.). (2011). Strategic communication and national strategy: A Chatham House report. London: Royal Institute of International Affairs.
Zurück zum Zitat Directorate for External Policies, Policy Department. (2013). The involvement of Salafism/Wahhabism in the support and supply of arms to rebel groups around the world. Brussels: European Parliament. Directorate for External Policies, Policy Department. (2013). The involvement of Salafism/Wahhabism in the support and supply of arms to rebel groups around the world. Brussels: European Parliament.
Zurück zum Zitat Eck, K., & Hultmann, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal Peace Resolution, 44, 233–246.CrossRef Eck, K., & Hultmann, L. (2007). One-sided violence against civilians in war: Insights from new fatality data. Journal Peace Resolution, 44, 233–246.CrossRef
Zurück zum Zitat EUROPOL. (2009). TE-SAT 2009: EU terrorism situation and trend report. Den Haag. External Operations Reconnaissance Team (2014). EUROPOL. (2009). TE-SAT 2009: EU terrorism situation and trend report. Den Haag. External Operations Reconnaissance Team (2014).
Zurück zum Zitat Farwell, J. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.CrossRef Farwell, J. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.CrossRef
Zurück zum Zitat Fink, N., & Barclay, J. (2013). Mastering the narrative: Counterterrorism strategic communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation. Fink, N., & Barclay, J. (2013). Mastering the narrative: Counterterrorism strategic communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation.
Zurück zum Zitat Fisher, A. (2016). Swarmcast: How Jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–19. Fisher, A. (2016). Swarmcast: How Jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–19.
Zurück zum Zitat Freeman, M., & Ruehsen, M. (2013). Terrorism financing methods: An overview. Perspectives on Terrorism, 7(4), 6–26. Freeman, M., & Ruehsen, M. (2013). Terrorism financing methods: An overview. Perspectives on Terrorism, 7(4), 6–26.
Zurück zum Zitat Gambetta, D., & Hertog, S. (2010). Engineers of Jihad. Sociology working paper 2007–10. Oxford: Department of Sociology, University of Oxford. Gambetta, D., & Hertog, S. (2010). Engineers of Jihad. Sociology working paper 2007–10. Oxford: Department of Sociology, University of Oxford.
Zurück zum Zitat Gendron, A. (2006). Militant Jihadism: Radicalization, conversion, recruitment. Trends in terrorism series (Vol. 4). Ottawa: Integrated Threat Assessment Centre. Gendron, A. (2006). Militant Jihadism: Radicalization, conversion, recruitment. Trends in terrorism series (Vol. 4). Ottawa: Integrated Threat Assessment Centre.
Zurück zum Zitat Gendron, A., & Rudner, M. (2012). Assessing cyber threats to Canadian infrastructure. Canadian security intelligence service occasional paper. Ottawa: Canadian Security Intelligence Service. Gendron, A., & Rudner, M. (2012). Assessing cyber threats to Canadian infrastructure. Canadian security intelligence service occasional paper. Ottawa: Canadian Security Intelligence Service.
Zurück zum Zitat General Intelligence and Security Service of the Netherlands. (2012). Jihadism on the web: A breeding ground for Jihad in the modern age. Zoetermeer: Algemene Inlichtingenen Veiligheidsdienst. General Intelligence and Security Service of the Netherlands. (2012). Jihadism on the web: A breeding ground for Jihad in the modern age. Zoetermeer: Algemene Inlichtingenen Veiligheidsdienst.
Zurück zum Zitat Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei, 26–30. Goertz, S. (2016). Cyber-Jihad. Die Kriminalpolizei, 26–30.
Zurück zum Zitat Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: C.F.Müller. Goertz, S. (2017). Islamistischer Terrorismus. Heidelberg: C.F.Müller.
Zurück zum Zitat Goertz, S., & Holst, M. (2016). Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von Jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform, 6, 1–14. Goertz, S., & Holst, M. (2016). Wege in den Terrorismus: Psychologische und sozialwissenschaftliche Analyseansätze von Jihadistischen Gewaltexzessen. Die Monatsschrift für Kriminologie und Strafrechtsreform, 6, 1–14.
Zurück zum Zitat Gulsby, K., & Desa, A. (2014). The new Al-Qaeda: Decentralization and recruitment. Security and Intelligence Studies Journal, 1(2), 53–62. Gulsby, K., & Desa, A. (2014). The new Al-Qaeda: Decentralization and recruitment. Security and Intelligence Studies Journal, 1(2), 53–62.
Zurück zum Zitat Harris-Hogan, S. (2012). Australian neo-Jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.CrossRef Harris-Hogan, S. (2012). Australian neo-Jihadist terrorism: Mapping the network and cell analysis using wiretap evidence. Studies in Conflict and Terrorism, 35(4), 298–314.CrossRef
Zurück zum Zitat Ilardi, G. (2013). Interviews with Canadian radicals. Studies in Conflict & Terrorism, 36(9), 713–738.CrossRef Ilardi, G. (2013). Interviews with Canadian radicals. Studies in Conflict & Terrorism, 36(9), 713–738.CrossRef
Zurück zum Zitat Ilyas, M. (2013). Islamist groups in the UK and recruitment. Journal of Terrorism Research, 4(2), 37–48.CrossRef Ilyas, M. (2013). Islamist groups in the UK and recruitment. Journal of Terrorism Research, 4(2), 37–48.CrossRef
Zurück zum Zitat International Monetary Fund, Legal Department. (2003). Suppressing the financing of terrorism: A handbook for legislative drafting. Washington, DC: International Monetary Fund. International Monetary Fund, Legal Department. (2003). Suppressing the financing of terrorism: A handbook for legislative drafting. Washington, DC: International Monetary Fund.
Zurück zum Zitat Jacobson, M. (2010). Terrorist financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.CrossRef Jacobson, M. (2010). Terrorist financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353–363.CrossRef
Zurück zum Zitat Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 11, 243–285.CrossRef Kalyvas, S. (1999). Wanton and senseless? The logic of massacres in Algeria. Rationality and Society, 11, 243–285.CrossRef
Zurück zum Zitat Kaya, A. (2010). Individualization and institutionalization of Islam in Europe in the age of securitization. Insight Turkey, 12(1), 47–63. Kaya, A. (2010). Individualization and institutionalization of Islam in Europe in the age of securitization. Insight Turkey, 12(1), 47–63.
Zurück zum Zitat Khosrokhavar, F. (2009). Inside Jihadism: Understanding Jihadi movements worldwide. London: Routledge. Khosrokhavar, F. (2009). Inside Jihadism: Understanding Jihadi movements worldwide. London: Routledge.
Zurück zum Zitat Klausen, J. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53. Klausen, J. (2012). The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.
Zurück zum Zitat Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.CrossRef Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.CrossRef
Zurück zum Zitat Lemieux, A., & Nill, R. (2011). The role and impact of music in promoting (and countering) violent extremism. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 143–152). Wright-Patterson Air Force Base, OH: AF Research Laboratory. Lemieux, A., & Nill, R. (2011). The role and impact of music in promoting (and countering) violent extremism. In L. Fenstermacher & T. Leventhal (Eds.), Countering violent extremism: Scientific methods and strategies (pp. 143–152). Wright-Patterson Air Force Base, OH: AF Research Laboratory.
Zurück zum Zitat Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training: Part 1. Terrorism Monitor, 5(1), 1–4. Lia, B. (2007). Al-Suri’s doctrine for decentralizing Jihadi training: Part 1. Terrorism Monitor, 5(1), 1–4.
Zurück zum Zitat Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542.CrossRef Lia, B. (2008). Doctrines for Jihadi terrorist training. Terrorism and Political Violence, 20(4), 518–542.CrossRef
Zurück zum Zitat Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication, 19(1), 75–86.CrossRef Livingstone, S. (2004). The challenge of changing audiences or, what is the audience researcher to do in the age of the Internet? European Journal of Communication, 19(1), 75–86.CrossRef
Zurück zum Zitat Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s socially mediated civil war. Blogs and Bullets III. Peaceworks 91, January 2014. Washington, DC: United States Institute for Peace. Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s socially mediated civil war. Blogs and Bullets III. Peaceworks 91, January 2014. Washington, DC: United States Institute for Peace.
Zurück zum Zitat Masciandaro, D. (2004). Global financial crime: Terrorism, money laundering and offshore centres. Burlington, VT: Ashgate. Masciandaro, D. (2004). Global financial crime: Terrorism, money laundering and offshore centres. Burlington, VT: Ashgate.
Zurück zum Zitat Musawi, M. (2010). Cheering for Osama: How Jihadists use Internet discussion forums. London: Quilliam Foundation. Musawi, M. (2010). Cheering for Osama: How Jihadists use Internet discussion forums. London: Quilliam Foundation.
Zurück zum Zitat Nacos, B. (2006). Communication and recruitment of terrorists. In J. Forest (Ed.), The making of a terrorist: Recruitment, training and root causes. Westport, CT: Praeger Security International. Nacos, B. (2006). Communication and recruitment of terrorists. In J. Forest (Ed.), The making of a terrorist: Recruitment, training and root causes. Westport, CT: Praeger Security International.
Zurück zum Zitat Nesser, P. (2004). Jihad in Europe: A survey of the motivations for Sunni Islamist terrorism in post-millennium Europe FFI report. Oslo: Norwegian Institute for Defence Research. Nesser, P. (2004). Jihad in Europe: A survey of the motivations for Sunni Islamist terrorism in post-millennium Europe FFI report. Oslo: Norwegian Institute for Defence Research.
Zurück zum Zitat Neumann, P. (2016). Radicalized: New Jihadists and the threat to the west. London: I.B. Tauris.CrossRef Neumann, P. (2016). Radicalized: New Jihadists and the threat to the west. London: I.B. Tauris.CrossRef
Zurück zum Zitat Nissen, T. (2014). Terror.com: IS’s social media warfare in Syria and Iraq. Contemporary conflicts: Military Studies, 2(2). Copenhagen: Royal Danish Defence College. Nissen, T. (2014). Terror.​com: IS’s social media warfare in Syria and Iraq. Contemporary conflicts: Military Studies, 2(2). Copenhagen: Royal Danish Defence College.
Zurück zum Zitat Phares, W. (2005). Future Jihad: Terrorist strategies against the West. New York: Palgrave Macmillan. Phares, W. (2005). Future Jihad: Terrorist strategies against the West. New York: Palgrave Macmillan.
Zurück zum Zitat Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Köln: Wolters Kluver Luchterhand. Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Köln: Wolters Kluver Luchterhand.
Zurück zum Zitat Roy, O. (2004). Globalised Islam: The search for a New Ummah. London: Hurst & Co. Roy, O. (2004). Globalised Islam: The search for a New Ummah. London: Hurst & Co.
Zurück zum Zitat Rudner, M. (2013). Al Qaeda’s twenty-year strategic plan: The current phase of global terror. Studies in Conflict & Terrorism, 36(12), 953–980.CrossRef Rudner, M. (2013). Al Qaeda’s twenty-year strategic plan: The current phase of global terror. Studies in Conflict & Terrorism, 36(12), 953–980.CrossRef
Zurück zum Zitat Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 40(1), 10–23.CrossRef Rudner, M. (2017). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict & Terrorism, 40(1), 10–23.CrossRef
Zurück zum Zitat Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.CrossRef Schmid, A. (2005). Terrorism as psychological warfare. Democracy and Security, 1(2), 137–146.CrossRef
Zurück zum Zitat Senator für Inneres Freie Hansestadt Bremen. (2016). Verfassungsschutzbericht 2015. Bremen. Senator für Inneres Freie Hansestadt Bremen. (2016). Verfassungsschutzbericht 2015. Bremen.
Zurück zum Zitat Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3(3), 373–387.CrossRef Seymour, B. (2008). Global money laundering. Journal of Applied Security Research, 3(3), 373–387.CrossRef
Zurück zum Zitat Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global Jihad. Washington, DC: Georgetown University Press. Springer, D., Regens, J., & Edger, D. (2009). Islamic radicalism and global Jihad. Washington, DC: Georgetown University Press.
Zurück zum Zitat Taylor, M., & Ramsay, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter? In E. Kessels (Ed.), Countering violent extremist narratives (pp. 94–111). Den Haag: National Coordinator for Counterterrorism. Taylor, M., & Ramsay, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter? In E. Kessels (Ed.), Countering violent extremist narratives (pp. 94–111). Den Haag: National Coordinator for Counterterrorism.
Zurück zum Zitat The Netherlands Office of the Coordinator for Counterterrorism. (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism. The Netherlands Office of the Coordinator for Counterterrorism. (2007). Jihadism and the Internet. Den Haag: National Coordinator for Counterterrorism.
Zurück zum Zitat Theohary, C., & Rollins, J. (2011). Terrorist use of the Internet: Information operations in cyberspace. Washington, DC: Congressional Research Service Report for Congress. Theohary, C., & Rollins, J. (2011). Terrorist use of the Internet: Information operations in cyberspace. Washington, DC: Congressional Research Service Report for Congress.
Zurück zum Zitat U.K. House of Commons, Home Affairs Committee. (2012). Roots of violent radicalization. London: The Stationery Office. U.K. House of Commons, Home Affairs Committee. (2012). Roots of violent radicalization. London: The Stationery Office.
Zurück zum Zitat Vidino, L. (2006). Al Qaeda in Europe: The new battleground of international Jihad. Amherst, NY: Prometheus Books. Vidino, L. (2006). Al Qaeda in Europe: The new battleground of international Jihad. Amherst, NY: Prometheus Books.
Zurück zum Zitat Weimann, G. (2006). Terror on the Internet: The new agenda, the new challenges. Washington, DC: United States Institute of Peace. Weimann, G. (2006). Terror on the Internet: The new agenda, the new challenges. Washington, DC: United States Institute of Peace.
Zurück zum Zitat Weimann, G. (2011). Cyber-Fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.CrossRef Weimann, G. (2011). Cyber-Fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.CrossRef
Zurück zum Zitat Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In B. Said & H. Fouad (Eds.), Salafismus: Auf der Suche nach dem wahren Islam (pp. 320–349). Freiburg: Herder. Zelin, A. (2014). Missionare des Jihad in Libyen und Tunesien. In B. Said & H. Fouad (Eds.), Salafismus: Auf der Suche nach dem wahren Islam (pp. 320–349). Freiburg: Herder.
Zurück zum Zitat Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 3, 12–16. Zywietz, B. (2015). Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 3, 12–16.
Metadaten
Titel
New Technology in the Hands of the New Terrorism
verfasst von
Stefan Goertz
Alexander E. Streitparth
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-14592-7_4

Premium Partner