Updating Terrorism the Changing Uses of the Internet by Terrorists in the West

Total Page:16

File Type:pdf, Size:1020Kb

Updating Terrorism the Changing Uses of the Internet by Terrorists in the West Updating terrorism The changing uses of the internet by terrorists in the West Matthijs Kock | 5996198 Master thesis in International Relations in Historical Perspective Supervised by Prof. dr. Beatrice de Graaf & dr. Frank Gerits Utrecht University | 15 August 2020 “The fact that we’re all connected, the fact that we’ve got this information space, does change the parameters. It changes the way people live and work. It changes things for good and for bad.”1 - Tim Berners-Lee, inventor of the World Wide Web 1 Scott Laningham, ‘Tim Berners-Lee. Originator of the Web and director of the World Wide Web Consortium talks about where we’ve come, and about the challenges and opportunities ahead’, IBM Developed, August 22, 2006, https://www.ibm.com/developerworks/podcast/dwi/cm-int082206txt.html (accessed May 14, 2020). Abstract This thesis analyses how the technological development of the internet has changed the use of the internet by terrorists in the West between 2003 and 2009. The role of the internet for terrorism is often, but incorrectly, perceived as a static one without progress. This thesis however emphasises the historical development of the internet by analysing how the internet was used by terrorists in three technological phases of the web. Each Web phase is studied using a detailed qualitative approach in which the online activities of individual members of a terrorist network are examined. The networks selected for this analysis are the Dutch Hofstad Network, the Islamic State in Iraq and Syria (ISIS) and the fluid network of far-right terrorists. The careful choice for each of these networks is based on their active use of the respective technological phase of the internet. The analysis shows that on the one hand, shifts in the type of content and used platforms can be distinguished over the years. Additionally, an increase in the sophistication of online activities of terrorists and the importance of online communities can be seen. On the other hand, the online activities were merely an expansion to the offline activities of terrorists, as they could not replace the physical violence that is essential to terrorism. This online expansion did however further increase the (potential) audience of terrorists and decrease the importance of ideology. Keywords Online terrorism, History of Internet, Hofstad Network, ISIS, Far-Right terrorism, counterterrorism Acknowledgements I would like to express my great appreciation to my supervisors, Prof. dr. Beatrice de Graaf and dr. Frank Gerits. The advice, insights, and support from a renowned researcher in the field of terrorism studies like Beatrice de Graaf, has greatly enhanced the quality of my thesis. Dr. Frank Gerits helped me to improve the overall structure of this research and kept me focussed on answering the main research question. I would also like to thank Esther Heldenbergh-Bode, personal assistant to Beatrice de Graaf, for managing my progress, and organising my meetings with Beatrice, which was not an easy feat due to the current coronavirus pandemic. Additionally, I want to thank my fellow students of the thesis seminar, Jordy van Beek, Dawid Fusiek, Alex Hampton, Connie Meza and Jannes Pittermann. We all shared the struggles of writing a master thesis and they kept me motivated while also providing me with new insights and perspectives. And finally, I am grateful for the advice, support and encouragements of my parents and friends throughout the process of writing this master thesis. Table of contents List of abbreviations ............................................................................................................................... 1 1.1 Introduction to the topic ............................................................................................................... 2 1.2 Research question ......................................................................................................................... 3 1.3 Theoretical justification ................................................................................................................. 6 1.4 Methodological framework ......................................................................................................... 10 The Hofstad Network’s exploration of the internet ............................................................................ 14 2.1 The internet at the start of the century ...................................................................................... 14 2.2 The Hofstad Network .................................................................................................................. 14 2.3 The internet of the Hofstad Network .......................................................................................... 16 2.3.1 Propaganda........................................................................................................................... 16 2.3.2 Finance ................................................................................................................................. 18 2.3.3 Training ................................................................................................................................. 19 2.3.4 Planning ................................................................................................................................ 20 2.3.5 Execution .............................................................................................................................. 23 2.3.6 Cyberattacks ......................................................................................................................... 24 2.4 Looking in the wrong direction ................................................................................................... 24 2.5 Conclusion ................................................................................................................................... 25 The online ubiquity of ISIS .................................................................................................................... 27 3.1 The user-based internet .............................................................................................................. 27 3.2 Creating an Islamic caliphate ....................................................................................................... 28 3.3 ISIS electronic jihad ..................................................................................................................... 30 3.3.1 Propaganda........................................................................................................................... 30 3.3.2 Finance ................................................................................................................................. 33 3.2.3 Training ................................................................................................................................. 35 3.3.4 Planning ................................................................................................................................ 36 3.3.5 Execution .............................................................................................................................. 37 3.3.6 Cyberattacks ......................................................................................................................... 39 3.4 Notice and take down ................................................................................................................. 41 3.5 Conclusion ................................................................................................................................... 42 Lone actor terrorism and the Web 3.0 ................................................................................................. 44 4.1 The ever-expanding internet ....................................................................................................... 44 4.2 Right-wing terrorism ................................................................................................................... 45 4.3 An online community .................................................................................................................. 47 4.3.1 Propaganda........................................................................................................................... 47 4.3.2 Finance ................................................................................................................................. 50 4.3.3 Training ................................................................................................................................. 51 4.3.4 Planning ................................................................................................................................ 52 4.3.5 Execution .............................................................................................................................. 54 4.3.6 Cyberattacks ......................................................................................................................... 57 4.4 Automated counterterrorism ...................................................................................................... 58 4.5 Conclusion ................................................................................................................................... 60 Transitions and trends in the online activities of terrorists. ............................................................... 61 Transitions ........................................................................................................................................
Recommended publications
  • PERSPECTIVES on TERRORISM Volume 11, Issue 5
    ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith
    [Show full text]
  • Violent Jihad in the Netherlands
    Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat 2 Contents Foreword 5 Introduction 7 The murder of Theo van Gogh: consequences and effects 7 General trends in the development of jihadism 9 Framework of terms and definitions 10 1 From exogenous threat to home-grown terrorism 13 1.1 What is a jihadist network? 13 1.2 Historical development of network formation 15 1.2.1 The traditional phase: migration of jihadists 15 1.2.2 The proliferation phase: recruitment 16 1.2.3 The ‘home-grown’ phase: radicalisation and jihadisation 17 1.3 Three types of jihadist networks 17 2 Decentralisation and local implantation of international jihad19 2.1Al-Qaeda: from ‘network of gynetworks’ 19 to trademark and ideolo 2.2 Ideology of global violent jihad 21 2.3 Decentralisation of international jihad 22 2.4 Local implantation of international jihad 26 3 Radicalisation and the emergence of local networks 29 3.1Radicalisation, recruitment and jihadisation 29 3.2 The religious context of radicalisation 30 3.3 The socio-political context of radicalisation 33 3.4 The cultural and socio-psychological context of radicalisation 35 3.5 Emergence of local autonomous cells and networks 37 3.6 Backgrounds and functioning of local autonomous networks 38 3.7 The significance of the Hofstad network 39 4 Virtualisation of jihad 43 4.1The Internet as a propulsion of the jihad movement 43 4.2 Al-Qaeda as a virtual database (top-down) 44 4.3 The virtual umma (grass
    [Show full text]
  • 11 July 2006 Mumbai Train Bombings
    11 July 2006 Mumbai train bombings July 2006 Mumbai train bombings One of the bomb-damaged coaches Location Mumbai, India Target(s) Mumbai Suburban Railway Date 11 July 2006 18:24 – 18:35 (UTC+5.5) Attack Type Bombings Fatalities 209 Injuries 714 Perpetrator(s) Terrorist outfits—Student Islamic Movement of India (SIMI), Lashkar-e-Toiba (LeT; These are alleged perperators as legal proceedings have not yet taken place.) Map showing the 'Western line' and blast locations. The 11 July 2006 Mumbai train bombings were a series of seven bomb blasts that took place over a period of 11 minutes on the Suburban Railway in Mumbai (formerly known as Bombay), capital city of the Indian state of Maharashtra and India's financial capital. 209 people lost their lives and over 700 were injured in the attacks. Details The bombs were placed on trains plying on the western line of the suburban ("local") train network, which forms the backbone of the city's transport network. The first blast reportedly took place at 18:24 IST (12:54 UTC), and the explosions continued for approximately eleven minutes, until 18:35, during the after-work rush hour. All the bombs had been placed in the first-class "general" compartments (some compartments are reserved for women, called "ladies" compartments) of several trains running from Churchgate, the city-centre end of the western railway line, to the western suburbs of the city. They exploded at or in the near vicinity of the suburban railway stations of Matunga Road, Mahim, Bandra, Khar Road, Jogeshwari, Bhayandar and Borivali.
    [Show full text]
  • Violent Radicalization Jamie Bartlett a & Carl Miller a a Violence and Extremism Programme , Demos, London, UK Published Online: 06 Dec 2011
    This article was downloaded by: [UVA Universiteitsbibliotheek SZ] On: 16 March 2015, At: 07:25 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Terrorism and Political Violence Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/ftpv20 The Edge of Violence: Towards Telling the Difference Between Violent and Non- Violent Radicalization Jamie Bartlett a & Carl Miller a a Violence and Extremism Programme , Demos, London, UK Published online: 06 Dec 2011. To cite this article: Jamie Bartlett & Carl Miller (2012) The Edge of Violence: Towards Telling the Difference Between Violent and Non-Violent Radicalization, Terrorism and Political Violence, 24:1, 1-21, DOI: 10.1080/09546553.2011.594923 To link to this article: http://dx.doi.org/10.1080/09546553.2011.594923 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
    [Show full text]
  • Countering Violent Extremism the Counter Narrative Study
    ! COUNTERING VIOLENT EXTREMISM THE COUNTER NARRATIVE STUDY “Countering the Narratives of Violent Extremism FOREWORD The Achilles’ heel of our strategy against terrorism and violent extremism has been the failure to counter the narratives that groups use to recruit. As long as groups attract a steady stream of new members, the terrorism and violence will continue. This is why the strategy known as Countering Violent Extremism (CVE) is so important, and must be used as a counterterrorism tool alongside military, intelligence, and law enforcement operations. Through our partnership with the Qatar International Academy for Security Studies (QIASS), we offer critical guidance to those wishing to counter the narratives of violence and extremism. “Countering Violent Extremism: The Counter-Narrative Study” is the result of a year- long research project conducted by our team of former top law enforcement, intelligence, and counterterrorism officials. We traveled around the world, from Malaysia to Kenya to Norway to Northern Ireland to the United States, studying extremist and terrorist groups and interviewing their members, as well as those in government and other important stakeholders responsible for tackling the problem. As you will see from our “Findings,” we’ve put together some essential lessons. One of the most important takeaways is understanding the pattern(s) behind group recruitment. Terrorist and extremist groups first prey on local grievances—exploiting feelings of anger, humiliation, resentment, or lack of purpose. They then incorporate, into their violent pronouncements, conspiratorial messages that blame those they are targeting. Self-proclaimed religious groups use distorted religious edicts in their narratives. Recruiters achieve success by providing both answers and a sense of purpose to vulnerable individuals.
    [Show full text]
  • Vol 8, No 4 (2014): Perspectives on Terrorism
    PERSPECTIVES ON TERRORISM Volume 8, Issue 4 Table of Contents Welcome from the Editors 1 Report of the Jury on the TRI Award Competition for “Best Ph.D. Dissertation on Terrorism and Counter-Terrorism completed in 2013” 2 I. Articles Alliance Hubs: Focal Points in the International Terrorist Landscape 4 by Tricia Bacon An Exploratory Study on the Impact of Electoral Participation upon a Terrorist Group’s Use of Violence in a Given Year 27 by Stephen McGrath and Paul Gill Terrorist Networks’ Productivity and Durability: A Comparative Multi-level Analysis 36 by Arie Perliger II. Research Notes The Importance of Financing in Enabling and Sustaining the Conflict in Syria (and Beyond) 53 by Tom Keatinge Special Research Notes Section: Bart Schuurman, Guest Editor Using Primary Sources for Terrorism Research: Introducing Four Case Studies 62 by Bart Schuurman A History of the Hofstadgroup 65 by Bart Schuurman, Quirine Eijkman and Edwin Bakker The German Sauerland Cell Reconsidered 82 by Quirine Eijkman Operation Pendennis: A Case Study of an Australian Terrorist Plot 91 by Bart Schuurman, Shandon Harris-Hogan, Andrew Zammit and Pete Lentini Who Are They and Why Do They Go? The Radicalisation and Preparatory Processes of Dutch Jihadist Foreign Fighters 100 by Daan Weggemans, Edwin Bakker and Peter Grol III. Resources Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1) 111 ISSN 2334-3745 i August 2014 PERSPECTIVES ON TERRORISM Volume 8, Issue 4 Compiled and selected by Judith Tinnes Bibliography on State Sponsored Terrorism and Assassinations Abroad; with Special Emphasis on the Assassination of 28 July 1914 that Triggered World War I 146 Selected and compiled by Eric Price IV.
    [Show full text]
  • Homegrown Terrorism
    Homegrown Terrorism The Threat Within Kimberley L. Thachuk, Marion E. “Spike” Bowman, and Courtney Richardson Center for Technology and National Security Policy National Defense University May 2008 The views expressed in this article are those of the authors and do not reflect the official policy or position of the National Defense University, the Department of Defense or the U.S. Government. All information and sources for this paper were drawn from unclassified materials. Dr. Kimberley L. Thachuk is a Senior Analyst at the Office of the National Counterintelligence Executive, the Office of the Director of National Intelligence. Formerly, she was a Senior Fellow at the Center for Technology and National Security Policy at the National Defense University where she co-directed the Transformation Short Course Program. Her research is mainly on transnational threats to national security, including organized crime and terrorism, drug, human, and arms trafficking, alien smuggling, smuggling of weapons of mass destruction, cyber threats, and health and environmental threats. She also specializes in Homeland Security as well as Latin American issues, with a particular emphasis on Colombia. Marion E. “Spike” Bowman is Deputy Director, National Counterintelligence Executive. Previously he was Senior Research Fellow at the Center for Technology and National Security Policy. He is retired from the Senior Executive Service, Federal Bureau of Investigation, where he served successively as Deputy General Counsel (National Security Law), Senior Counsel, and Director, Intelligence Issues and Policy Group (National Security Branch). He is a former intelligence officer and specialist in national security law with extensive experience in espionage and terrorism investigations. In addition to national security experience he is a retired U.S.
    [Show full text]
  • Perspectives on Terrorism, Volume 8, Issue 4
    PERSPECTIVES ON TERRORISM Volume 8, Issue 4 Table of Contents Welcome from the Editors 1 Report of the Jury on the TRI Award Competition for “Best Ph.D. Dissertation on Terrorism and Counter-Terrorism completed in 2013” 2 I. Articles Alliance Hubs: Focal Points in the International Terrorist Landscape 4 by Tricia Bacon An Exploratory Study on the Impact of Electoral Participation upon a Terrorist Group’s Use of Violence in a Given Year 27 by Stephen McGrath and Paul Gill Terrorist Networks’ Productivity and Durability: A Comparative Multi-level Analysis 36 by Arie Perliger II. Research Notes The Importance of Financing in Enabling and Sustaining the Conflict in Syria (and Beyond) 53 by Tom Keatinge Special Research Notes Section: Bart Schuurman, Guest Editor Using Primary Sources for Terrorism Research: Introducing Four Case Studies 62 by Bart Schuurman A History of the Hofstadgroup 65 by Bart Schuurman, Quirine Eijkman and Edwin Bakker The German Sauerland Cell Reconsidered 82 by Quirine Eijkman Operation Pendennis: A Case Study of an Australian Terrorist Plot 91 by Bart Schuurman, Shandon Harris-Hogan, Andrew Zammit and Pete Lentini Who Are They and Why Do They Go? The Radicalisation and Preparatory Processes of Dutch Jihadist Foreign Fighters 100 by Daan Weggemans, Edwin Bakker and Peter Grol III. Resources Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1) 111 ISSN 2334-3745 i August 2014 PERSPECTIVES ON TERRORISM Volume 8, Issue 4 Compiled and selected by Judith Tinnes Bibliography on State Sponsored Terrorism and Assassinations Abroad; with Special Emphasis on the Assassination of 28 July 1914 that Triggered World War I 146 Selected and compiled by Eric Price IV.
    [Show full text]
  • Lone Wolf Terrorism: How the European Union Can Fight It
    Department of International Relations Course: International Public Policies Lone wolf terrorism: how the European Union can fight it Supervisor: Alessandro Orsini Candidate: Diana Zogno 627992 Co-supervisor: Silvia Menegazzi A.Y. 2017/2018 1 Summary Introduction 3 CHAPTER ONE 7 IDENTIFICATION OF THE PHENOMENON 7 1.1 The issue of definition 8 1.2 A definitional conundrum: composition and control 14 1.3 An historical overview 22 1.4 Towards a comprehensive definition? 27 CHAPTER TWO 31 THE JIHADI-INSPIRED WAVE OF “LONE WOLF” TERRORISM 31 2.1 The Jihadist recruiting strategy 31 2.3 Lone wolves’ path to radicalization 44 CHAPTER THREE 59 JIHADIST NARRATIVES THROUGH THE INTERNET 59 3.1 Jihadist online campaign 59 3.2 Jihadist online capabilities 65 3.3 Inspire and Dabiq 68 3.4 Online communities and gaming 71 CHAPTER FOUR 76 THE DOMESTIC DIMENSION OF LONE WOLF TERRORISM 76 4.1 The Western lone wolf: a profile? 88 CHAPTER FIVE 93 LONE WOLVES AND HOW TO COUNTER THE PHENOMENON 93 5.1. EU actual issues on Counterterrorism policies 93 5.2 A policy proposal 100 Conclusion 117 2 Introduction Terrorism as a field of study has been broadly explored in many of its characteristics, models and definitions by several scholars during the past decades. The concept itself, politically debated other that scientifically, is a source of controversy and political discussion; and in the complexity of this phenomenon and its various implications there is though one aspect of it that, while being a stronger and stronger trend, that has not been explored much yet, namely, lone wolves Terrorism.
    [Show full text]
  • The Edge of Violence Described As a Process of Radicalisation
    Edge of violence cover 11/17/10 5:01 PM Page 1 The path into terrorism in the name of Islam is often The Edge of Violence | described as a process of radicalisation. But to be radical is “Tackling home-grown not necessarily to be violent. Violent radicals are clearly enemies of liberal democracies, but non-violent radicals might sometimes be powerful allies. This pamphlet is a terrorism requires a summary of two years of research examining the difference between violent and non-violent radicals in Europe and Canada. It represents a step towards a more nuanced radical approach…” understanding of the behaviour of radicalised individuals, the appeal of the al-Qaeda narrative, and the role of governments Jamie Bartlett · Jonathan Birdwell · Michael King and communities in responding. The Edge of Violence suggests that government policy must distinguish clearly between radicalisation that leads to THE EDGE OF VIOLENCE violence and radicalisation that does not: ways must be found to ensure young people can be radical and dissenting without Jamie Bartlett violent consequences. The pamphlet argues that the best way to fight radical ideas is with a liberal attitude to dissent, as Jonathan Birdwell silencing radical views can create a taboo effect that Michael King inadvertently makes such ideas more appealing. The threat of violent radicalisation can never be ‘solved’ or completely neutralised, it can only be managed. The process of radicalisation to violence still eludes complete understanding: any response will entail controversial decisions and unintended consequences. Therefore, governments must focus on the things they can realistically change, while the lead role in prevention must be played by society: individuals, groups, organisations and communities.
    [Show full text]
  • Perspectives on Terrorism, Volume 3, Issue 4 (2009)
    !"#$%&'((()'(**$&'+' ,&-&%.&/'0112' PERSPECTIVES ON TERRORISM !! ! !"#$%&'()'*++$&', Table of Contents: Confronting al-Qaeda: Understanding the Threat in Afghanistan .............4 ',!-.(%!/.0$&.1 Somali Piracy: The Next Iteration ...............................................................26 ',!2$3$(!4$5( The Role of the Pashtuns in Understanding the Afghan Crisis .................37 ',!67..%!89:( Francis Lieber, Terrorism, and the American Way of War .......................52 ',!;(:<!=:10&.( Books Reviews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email protected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
    [Show full text]
  • Perspectives on Terrorism, Volume 8, Issue 3
    PERSPECTIVES ON TERRORISM Volume 8, Issue 3 Table of Contents Welcome from the Editors 1 I. Articles Deterring Terrorism: a New Strategy 2 by Max Abrahms Eco-Terrorism? Countering Dominant Narratives of Securitisation: a Critical, Quantitative History of the Earth Liberation Front (1996-2009) 16 by Michael Loadenthal Should we be Scared of all Salafsts in Europe? A Dutch Case Study 51 by Ineke Roex Securing the Sulu-Sulawesi Seas from Maritime Terrorism: a Troublesome Cooperation? 64 by Senia Febrica II. Research Note Bangladesh: an Emerging Centre for Terrorism in Asia 84 by Sajjan M. Gohel III. Resources Bibliography: Arab Spring (Part 2) 92 Compiled and selected by Judith Tinnes Terrorists, Extremists, Militants: Selected Biographies, Autobiographies and related Documents and Writings 126 Compiled by Eric Price IV. Book Reviews “Counterterrorism Bookshelf” – Eight Books on Terrorism & Counter-terrorism Related Subjects 135 by Joshua Sinai V. Op-Ed Terrorism and Jihad: Diferences and Similarities 140 by Philipp Holtmann ISSN 2334-3745 i June 2014 PERSPECTIVES ON TERRORISM Volume 8, Issue 3 VI. News News from the Country Coordinators of TRI’s Network of PhD Teses Writers 144 by Alex P. Schmid VII. Notes from the Editors About Perspectives on Terrorism 148 ISSN 2334-3745 ii June 2014 PERSPECTIVES ON TERRORISM Volume 8, Issue 3 Welcome from the Editors Dear Reader, We are pleased to announce the release of Volume VIII, Issue 3 (June 2014) of Perspectives on Terrorism at www.terrorismanalysts.com. Our free online journal is a joint publication of the Terrorism Research Initiative (TRI), headquartered in Vienna, and the Center for Terrorism and Security Studies (CTSS), headquartered at the University of Massachusetts’ Lowell campus.
    [Show full text]