Terroristen 2.0

Total Page:16

File Type:pdf, Size:1020Kb

Terroristen 2.0 Terroristen 2.0 Het gebruik van internet door terroristische groepen in het sociale media-tijdperk Anne van Groningen Javaplein 34C 1094 HZ Amsterdam 3364585 MA Scriptie Internationale Betrekkingen in Historisch PerspectieF Universiteit Utrecht Begeleider: ProF. Dr. I.G.B.M. Duyvesteyn 10 maart 2015 Inhoudsopgave Voorwoord .............................................................................................................................................. 2 I. Het internet: zegen en vloek ......................................................................................................... 3 Cyber utopianism vs. cyber anxiety .................................................................................................. 3 Tussen mythe en realiteit: cyber 9/11 en digital Pearl Harbor ..................................................... 4 Terroristen en het internet in een veranderende omgeving .......................................................... 7 De noodzaak van een actuele benadering ...................................................................................... 11 II. Casus: Islamitische Staat ............................................................................................................. 15 Introductie ........................................................................................................................................ 15 Toetsing kerngebruiken .................................................................................................................. 17 Internet als communicatiemedium ............................................................................................ 17 Internet als Financieringsmiddel ................................................................................................ 22 Internet als netwerkmiddel ........................................................................................................ 23 Internet als rekruteringsmiddel ................................................................................................. 26 Internet als bron van inFormatie ................................................................................................ 28 Overige gebruiken ....................................................................................................................... 30 Het internetgebruik van IS .............................................................................................................. 30 III. Casus: Al Shabaab ........................................................................................................................... 32 Introductie ........................................................................................................................................ 32 Toetsing kerngebruiken .................................................................................................................. 34 Internet als communicatiemedium ............................................................................................ 34 Internet als Financieringsmiddel ................................................................................................ 39 Internet als netwerkmiddel ........................................................................................................ 41 Internet als rekruteringsmiddel ................................................................................................. 44 Internet als bron van inFormatie ................................................................................................ 46 Overige gebruiken ....................................................................................................................... 47 Het internetgebruik van Al Shabaab .............................................................................................. 48 IV. Analyse ............................................................................................................................................ 49 Een succesvolle aanpassing: terroristen 2.0 ............................................................................. 49 Gevolgen: ingebeeld en echt gevaar ........................................................................................... 53 Een moeizame aanpassing: overheden 1.5 ................................................................................ 56 Beleidsimplicaties: contraterrorisme 2.0 .................................................................................. 59 Tweerichtingsverkeer in het virtuele domein ........................................................................... 62 V. Conclusie ........................................................................................................................................... 64 BibliograFie ........................................................................................................................................... 69 1 Voorwoord Voor u ligt de scriptie ‘Terroristen 2.0. Het gebruik van internet door terroristische groepen in het sociale media-tijdperk.’ Deze scriptie is geschreven in het kader van de master Internationale Betrekkingen in Historisch PerspectieF aan de Universiteit Utrecht. Het idee voor het schrijven van deze scriptie ontstond tijdens mijn stage aan de Nederlandse ambassade in Colombia, waar ik van februari tot en met juli 2014 stage liep. Tijdens het monitoren en analyseren van de politieke ontwikkelingen in het land kwam ik erachter dat de Colombiaanse rebellengroepen (FARC, ELN) actieF gebruik maakten van sociale media voor het verspreiden van propaganda en de communicatie met hun achterban. Toen in juni 2014 ISIS wereldnieuws werd na het uitroepen van het kaliFaat en de groep zich door de publicatie van gruwelijke video’s op het internet dagelijks van een grote hoeveelheid media-aandacht wist te verzekeren, werd mijn interesse voor het gebruik van internet door militante groepen versterkt en besloot ik mijn scriptie hieraan te wijden. Van oktober 2014 tot en met februari 2015 ben ik bezig geweest met het bronnenonderzoek en het schrijven van deze scriptie. Het bronnenonderzoek voor deze scriptie is reeds in januari 2015 afgerond. Het is daardoor mogelijk dat geraadpleegde websites, bekeken video’s, online tijdschriFten en overige bronnen nu niet meer beschikbaar zijn. Dit is echter niet te voorkomen en laat tegelijkertijd het belang van dit onderzoek zien, omdat de online aanwezigheid van dergelijke bronnen nog altijd wordt betwist. Als laatste wil ik graag mijn begeleider, mevrouw I.G.B.M. Duyvesteyn bedanken voor haar begeleiding tijdens dit traject. Ik wens u veel leesplezier toe. Anne van Groningen Amsterdam, 10 maart 2015. 2 I. Het internet: zegen en vloek Cyber utopianism vs. cyber anxiety Het internet is niet meer weg te denken uit ons dagelijks leven. In Nederland heeFt 94% van de bevolking toegang tot internet, in de Verenigde Staten is dat ruim 84%. IJsland staat bovenaan de wereldranglijst met een internetpenetratie van 96%. 1 Ruim 83% van de Nederlanders is dagelijks online2 en gebruikt het internet vooral voor het versturen en ontvangen van e-mails, het opzoeken van inFormatie en actieF zijn op sociale media.3 We regelen onze bankzaken op internet, kopen nieuwe kleding online en houden via sociale media contact met vrienden en Familie over de hele wereld. Wij zijn onderdeel geworden van het wereldwijde web en vice versa. Computers en het internet hebben ons zonder twijFel veel opgeleverd. Binnen enkele muisklikken heeFt iedereen ter wereld met een internetverbinding toegang tot inFormatie over welk onderwerp dan ook. Het internet is naast een efFectief communicatiemiddel ook een belangrijk instrument gebleken voor toegang tot kennis, iets dat veel mensen in de wereld daarvoor niet hadden. Er heerste euforie toen duidelijk werd dat het internet, met name de sociale media, een belangrijke Faciliterende rol speelde tijdens de protesten in Iran in 2009 en in de Arabische wereld in de jaren daarna. ‘The revolution will be twittered’, schreeF The Atlantic over de volksopstand in Teheran na de Iraanse presidentsverkiezingen van 2009.4 Tim Rutten van de The Los Angeles Times noemde Twitter “tyranny’s new nightmare”5 en ten tijde van de Arabische Lente werden termen als Facebook revolution en YouTube uprising aangehaald om de massale protesten te kunnen duiden. “The internet can be considered the First weapon oF mass construction, which we can deploy to destroy hate and conflict and to propagate peace and democracy,” zei Riccardo Luna, hoofdredacteur van de Italiaanse Wired in 2010. 6 De Italiaanse versie van het Amerikaanse tijdschriFt nomineerde dat jaar het internet voor de Nobelprijs voor de Vrede. Volgens Wired had het internet de basis gelegd voor een nieuw soort maatschappij, waarin iedereen die verbonden is met het internet de zaden voor vrede kon zaaien.7 Tegelijkertijd ontstond er echter ook bezorgdheid over de schaduwzijde van het internet. Onze hersenen zouden schade kunnen oplopen door overmatig internetgebruik, met slaapproblemen, leerproblemen en zelFs ‘digitale dementie’ tot gevolg.8 De bevrijdende rol die het 1 The World Bank Data, Internet users (per 100 people), http://data.worldbank.org/indicator/IT.NET.USER.P2?order=wbapi_data_value_2013+wbapi_data_value+wbapi_data_value- last&sort=desc (versie 15 januari 2015). 2 EuroStat Newsrelease, ‘More than 60% of individuals in de EU28 use the internet daily’, 18 december 2013, http://epp.eurostat.ec.europa.eu/cache/ITY_PUBLIC/4-18122013-BP/EN/4-18122013-BP-EN.PDF (versie 31 oktober
Recommended publications
  • Western Foreign Fighters Innovations in Responding to the Threat
    Western Foreign Fighters Innovations in Responding to the Threat rachel briggs obe tanya silverman About the authors Rachel Briggs OBE is Senior Fellow at the Institute for Strategic Dialogue (ISD). Her research focuses on counter-extremism, especially tackling online extremism through digital disruption and counter-narrative campaigns. She has spearheaded the establishment of ISD’s work in this area. Rachel has 15 years’ experience as a writer, researcher and policy advisor, working with governments, the private sector and civil society to understand the problem and find practical workable solutions. She is also Director of Hostage, a charity that supports hostage families and returning hostages during and after a kidnap. She was awarded an OBE in 2013 in recognition for this work. Tanya Silverman is a Programme Associate at the Institute for Strategic Dialogue and is involved in all areas of the organisation’s security and counter-extremism work. Tanya previously worked on the Against Violent Extremism (AVE) network, a partnership between ISD and Google Ideas with members comprising of former extremists, survivors of extremism and activists with the shared goal of countering extremism. She now focuses on researching innovative approaches to counter-radicalisation. Acknowledgements The authors wish to thank Ulrich Dovermann at the German Federal Agency for Civic Education for his kind support and stewardship through the research process, and for being an inspirational driving force for change in the counter-extremism domain. They would also like to thank members of the Policy Planners’ Network on Countering Radicalisation and Polarisation (PPN) who have given their time and knowledge to the report.
    [Show full text]
  • Facing Off with ISIS G20 Leaders Vow to Fight ISIS Despite Differences
    November 20, 2015 5 Cover Story Facing off with ISIS G20 leaders vow to fight ISIS despite differences Thomas Seibert Istanbul eeting in the after- math of the Paris at- tacks, world leaders gathered in Turkey pledged to redouble Mefforts to fight the Islamic State (ISIS) but carrying out that promise will be difficult as conflicting inter- ests of key players remain. Participants at the Group of 20 (G20) meeting of heads of state from the world’s biggest economies vowed to step up action against ISIS by improving intelligence shar- ing, increasing border controls and sharpening air travel security to keep militants from crossing inter- national boundaries. The decision came after police in Paris found evidence that one of the attackers, who killed more than 125 people in a string of shootings Leaders of G20 observe a minute of silence in memory of Paris attacks at G20 summit in Antalya. and bombings on November 13th, had registered as a Syrian refugee entering Greece via Turkey. Turk- ity of turning ‘radical’ as soon as allies against ISIS, Ankara is con- sealing the border for ISIS fighters, said he did not expect the Paris ish officials said their security forc- they get the money and the weap- cerned that the Kurds’ real aim is while Turkish officials complain of bombings to usher in a new era of es had warned France about one of ons.” to set up a Kurdish state along the a lack of coordination with Western broad international cooperation the bombers and had foiled an ISIS US President Barack Obama said Turkish border.
    [Show full text]
  • Right to Act: United States Legal Basis Under the Law of Armed Conflict to Pursue the Islamic State in Syria Samantha Arrington Sliney
    University of Miami Law School Institutional Repository University of Miami National Security & Armed Conflict Law Review November 2015 Right to Act: United States Legal Basis Under the Law of Armed Conflict to Pursue the Islamic State in Syria Samantha Arrington Sliney Follow this and additional works at: http://repository.law.miami.edu/umnsac Part of the International Law Commons, Military, War, and Peace Commons, and the National Security Law Commons Recommended Citation Samantha Arrington Sliney, Right to Act: United States Legal Basis Under the Law of Armed Conflict to Pursue the Islamic State in Syria, 6 U. Miami Nat’l Security & Armed Conflict L. Rev. 1 () Available at: http://repository.law.miami.edu/umnsac/vol6/iss1/1 This Article is brought to you for free and open access by Institutional Repository. It has been accepted for inclusion in University of Miami National Security & Armed Conflict Law Review by an authorized administrator of Institutional Repository. For more information, please contact [email protected]. Right to Act: United States Legal Basis Under the Law of Armed Conflict to Pursue the Islamic State in Syria Samantha Arrington Sliney* I. INTRODUCTION...................................................................................... 1 II. HISTORY OF THE ISLAMIC STATE ........................................................ 4 III. THE ISLAMIC STATE’S IDEOLOGY ...................................................... 6 IV. TAKE OVER OF SYRIA AND IRAQ, JUNE 2014 TO PRESENT: AN OVERVIEW ........................................................................................
    [Show full text]
  • “Jihadi John,” Imperialism and ISIS
    “Jihadi John,” Imperialism and ISIS By Bill Van Auken Region: Middle East & North Africa Global Research, February 28, 2015 Theme: Intelligence, Media Disinformation, World Socialist Web Site US NATO War Agenda In-depth Report: IRAQ REPORT, SYRIA On Thursday, the Washington Post revealed the identity of “Jihadi John,” the Islamic State of Iraq and Syria (ISIS) operative featured in grisly videos depicting the beheading of US journalists James Foley and Steven Sotloff, as well as two British aid workers, David Haines and Alan Henning. The Post named the ISIS member as Mohammed Emwazi, a 26-year-old who was born in Kuwait and raised in London. He is described in a CNN report as “a Briton from a well-to-do family who grew up in West London and graduated from college with a degree in computer programming.” The media reporting on this identification has been dominated by discussions of the psychology of terrorism and the role of Islamist ideology, along with speculation as to why someone from such a background would choose to engage in such barbaric acts. All of these banalities are part of a campaign of deliberate obfuscation. Purposefully left in the shadows is the central revelation to accompany the identification of “Jihad John”—the fact that he was well known to British intelligence, which undoubtedly identified him as soon as his image and voice were first broadcast in ISIS videos. Not only did Britain’s security service MI5 carefully track his movements, it carried out an active campaign to recruit him as an informant and covert agent.
    [Show full text]
  • Reporting ISIS
    Shorenstein Center on Media, Politics and Public Policy Discussion Paper Series #D-101, July 2016 The Pen and the Sword: Reporting ISIS By Paul Wood Joan Shorenstein Fellow, Fall 2015 BBC Middle East Correspondent Licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. May 2013: The kidnapping started slowly. 1 At first, it did not feel like a kidnapping at all. Daniel Rye delivered himself to the hostage-takers quite willingly. He was 24 years old, a freelance photographer from Denmark, and he had gone to the small town of Azaz in northern Syria. His translator, a local woman, said they should get permission to work. So on the morning of his second day in Azaz, only his second ever in Syria, they went to see one of the town’s rebel groups. He knocked at the metal gate to a compound. It was opened by a boy of 11 or 12 with a Kalashnikov slung over his shoulder. “We’ve come to see the emir,” said his translator, using the word – “prince” – that Islamist groups have for their commanders. The boy nodded at them to wait. Daniel was tall, with crew-cut blonde hair. His translator, a woman in her 20s with a hijab, looked small next to him. The emir came with some of his men. He spoke to Daniel and the translator, watched by the boy with the Kalashnikov. The emir looked through the pictures on Daniel’s camera, squinting. There were images of children playing on the burnt-out carcass of a tank. It was half buried under rubble from a collapsed mosque, huge square blocks of stone like a giant child’s toy.
    [Show full text]
  • Syria 2014 Human Rights Report
    SYRIA 2014 HUMAN RIGHTS REPORT EXECUTIVE SUMMARY The authoritarian regime of President Bashar Asad has ruled the Syrian Arab Republic since 2000. The regime routinely violated the human rights of its citizens as the country witnessed major political conflict. The regime’s widespread use of deadly military force to quell peaceful civil protests calling for reform and democracy precipitated a civil war in 2012, leading to armed groups taking control of major parts of the country. In government-controlled areas, Asad makes key decisions with counsel from a small number of military and security advisors, ministers, and senior members of the ruling Baath (Arab Socialist Renaissance) Party. The constitution mandates the primacy of Baath Party leaders in state institutions and society. Asad and Baath party leaders dominated all three branches of government. In June, for the first time in decades, the Baath Party permitted multi-candidate presidential elections (in contrast to single-candidate referendums administered in previous elections), but the campaign and election were neither free nor fair by international standards. The election resulted in a third seven-year term for Asad. The geographically limited 2012 parliamentary elections, won by the Baath Party, were also neither free nor fair, and several opposition groups boycotted them. The government maintained effective control over its uniformed military, police, and state security forces but did not consistently maintain effective control over paramilitary, nonuniformed proregime militias such as the National Defense Forces, the “Bustan Charitable Association,” or “shabiha,” which often acted autonomously without oversight or direction from the government. The civil war continued during the year.
    [Show full text]
  • Return to Raqqa
    RETURN TO RAQQA 80' - 2020 MEDIAWAN RIGHTS Produced by Minimal Films [email protected] RETURN TO RAQQA 0 2 SYNOPSIS “Return to Raqqa” chronicles what was perhaps the most famous kidnapping event in history , when 19 journalists were taken captive by the Islamic State, as told by one of its protagonists: Spanish reporter Marc Marginedas, who was also the first captive to be released. MARC MARGINEDAS Marc Marginedas is a journalist who was a correspondent for El Periódico de Catalunya for two decades. His activity as a war correspondent led him to cover the civil war in Algeria, the second Chechen war, the wars in Iraq and Afghanistan and the civil war in Syria, among others. On 1 September 2013, Marginedas entered Syria accompanied by a group of opposition figures from the Free Syrian Army. It was his third visit to the country as a correspondent since the outbreak of the civil war in 2011. His main goal during this latest trip was to provide information on the preparations for a possible international military intervention that seemed very close. Three days later, on 4 September 2013, Marginedas was abducted near the city of Hama by ISIS jihadists. His captivity lasted almost six months, during which he shared a cell with some twenty journalists and aid workers from various countries. Two of these were James Foley and Steven Sotloff, colleagues who unfortunately did not share his fate. Marginedas was released in March 2014 and has not returned to Syrian territory since then. But he now feels the need to undertake this physical, cathartic journey to the house near Raqqa where he underwent the harshest experience of his life, an experience that he has practically chosen to forget over the past few years.
    [Show full text]
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of ILLINOIS EASTERN DIVISION UNITED STATES of AMERICA V. MOHAMMED HAMZAH KHAN
    Case: 1:14-cr-00564 Document #: 95 Filed: 11/04/16 Page 1 of 15 PageID #:577 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA No. 14 CR 564 v. Judge John J. Tharp Jr. MOHAMMED HAMZAH KHAN GOVERNMENT’S SENTENCING MEMORANDUM The UNITED STATES OF AMERICA, through ZACHARY T. FARDON, United States Attorney for the Northern District of Illinois, respectfully submits its Sentencing Memorandum for defendant Mohammed Hamzah Khan. This matter is set for sentencing on November 18, 2016.1 Introduction On October 4, 2014, Mohammed Hamzah Khan, then a 19 year-old — just 16 months removed from high school, where he was known as a good student, a leader, reliable, and courteous2 — attempted to execute a carefully calculated plan to take his younger siblings (Minor 1 and Minor 2) halfway around the world to join and support the barbaric Islamic State of Iraq and the Levant. This was not an impulsive decision or a moment of indiscretion. Rather, Khan had planned his travel to join ISIL for months, and understood the gravity of his actions. He was committed to 1 The Presentence Investigation Report is cited “PSR,” the plea agreement is cited as “Plea,” and the Government’s Version is cited as “GV.” Other docket entries in this case are cited as “R.” followed by the docket number. 2 See PSR at ¶64. Case: 1:14-cr-00564 Document #: 95 Filed: 11/04/16 Page 2 of 15 PageID #:578 abandoning his family, his education, his community, and his country for ISIL, and he understood that he would likely die for its cause, and that he was bringing his minor siblings into a war zone.
    [Show full text]
  • Jihadist Foreign Fighter Phenomenon in Western Europe: a Low-Probability, High-Impact Threat
    Jihadist Foreign Fighter Phenomenon in Western Europe: A Low-Probability, High-Impact Threat Edwin Bakker and Jeanine de Roy van Zuijdewijn ICCT Research Paper October 2015 The phenomenon of foreign fighters in Syria and Iraq is making headlines. Their involvement in the atrocities committed by terrorist groups such as the so-called “Islamic State” and Jabhat al-Nusra have caused grave concern and public outcry in the foreign fighters’ European countries of origin. While much has been written about these foreign fighters and the possible threat they pose, the impact of this phenomenon on Western European societies has yet to be documented. This Research Paper by Edwin Bakker and Jeanine De Roy van Zuijdewijn explores four particular areas where this impact is most visible: a) violent incidents associated with (returned) foreign fighters, b) official and political responses linked to these incidents, c) public opinion, and d) anti-Islam reactions linked to these incidents. The authors conclude that the phenomenon of jihadist foreign fighters in European societies should be primarily regarded as a social and political threat, not a physical one. They consider the phenomenon of European jihadist foreign fighters a “low-probability, high-impact” threat. About the Authors Edwin Bakker is Professor of (Counter-)Terrorism Studies at Leiden University, Director of the Centre for Terrorism and Counterterrorism (CTC) of that same university and Research Fellow at ICCT. He studied Economic Geography (Netherlands) and Political Geography (Netherlands and Germany). In 1997, he defended his PhD thesis on minority conflicts in Slovakia and Hungary. He taught classes in international policies on preventing and managing separatism and intra-state war in the Balkans at the Centre for International Conflict Analysis and Management (CICAM), Nijmegen University.
    [Show full text]
  • U.S. Citizens Kidnapped by the Islamic State John W
    CRS Insights U.S. Citizens Kidnapped by the Islamic State John W. Rollins, Specialist in Terrorism and National Security ([email protected], 7-5529) Liana Rosen, Specialist in International Crime and Narcotics ([email protected], 7-6177) October 17, 2014 (IN10167) Overview On October 3, 2014, the terrorist group known as the Islamic State (IS, or alternatively, Islamic State in Iraq and the Levant, ISIL, or Islamic State in Iraq and Syria, ISIS) threatened to kill a third U.S. citizen whom it had kidnapped, Abdul-Rahman Kassig (previously Peter Kassig). While releasing some Western hostages for ransom, the Islamic State has beheaded others, including two U.S. citizens, James Foley and Steven Sotloff, and two British citizens, David Haines and Alan Henning. The group posted videos of the murders online, generating debate about the U.S. government's role and capabilities for freeing hostages. In light of these beheadings, some policy makers have called for a reevaluation of U.S. policy on international kidnapping responses. Questions include whether it is effective and properly coordinated and implemented, should be abandoned or modified to allow for exceptions and flexibility, or could benefit from enhancements to improve global adherence. Scope The beheadings appear to be driven by a variety of underlying motives. Reports describe the group as inclined toward graphic and public forms of violence for purposes of intimidation, recruiting, and fundraising. Reports also suggest that the Islamic State may kill some hostages when it fails to obtain ransom payments. Foley's family, for example, disclosed that the Islamic State demanded a ransom of 100 million euros ($132 million).
    [Show full text]
  • Appendix a – Statement of Reasons
    A Appendix A – Statement of reasons Source: Minister for Foreign Affairs, Submission 1 UNCLASSIFIED Declaration of an area where the Islamic State of Iraq and the Levant is engaged in hostile activity under the Criminal Code Al-Raqqa Province, Syria This statement is based on publicly available information about the areas where the proscribed terrorists group—the Islamic State of Iraq and the Levant (ISIL)—is engaged in hostile activity. To the Australian Government’s knowledge, this information is accurate, reliable and has been corroborated by classified information. Basis for declaring an area in a foreign country where a listed terrorist organisation is engaging in hostile activity Under section 119.3 of the Criminal Code, the Foreign Affairs Minister may, by legislative instrument, declare an area in a foreign country for the purposes of section 119.2. Before declaring an area in a foreign country for the purposes of section 119.2, the Foreign Affairs Minister must be satisfied that a listed terrorist organisation is engaging in a hostile activity in that area of the foreign country. Section 119.2 makes it an offence for a person to enter, or remain in, an area in a foreign country if the area is an area declared by the Foreign Affairs Minister under section 119.3. Background to this declaration Proscription of the group engaged in hostile activity The group currently referred to as the Islamic State of Iraq and the Levant (ISIL) has been operating in Iraq under various names since 2003. It was first listed as a proscribed terrorist organisation under the Arabic name Tanzim Qa’idat al-Jihad fi Bilad al-Rafidayn in 2005.
    [Show full text]
  • Developing the Concept of Cumulative Extremism Via Politics, Policies and Publicity in the War Against Islamic Terrorism
    Beyond 9/11: Developing the concept of cumulative extremism via politics, policies and publicity in the war against Islamic terrorism David Colin Sadler A thesis in fulfilment of the requirements for the degree of Doctor of Philosophy School of Social Sciences Faculty of Arts and Social Sciences January 2019 THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: Sadler First name: David Other name/s: Colin Abbreviation for degree as given in the University calendar: PhD School: School of Social Sciences Faculty: Faculty of Arts and Social Sciences Title: Beyond 9/11: Developing the concept of cumulative extremism via politics, policies and publicity in the war against Islamic terrorism Abstract 360 words This thesis develops the concept of “cumulative extremism” to inform political and academic debates on apportioning responsibility for post-9/11 Islamic terrorism. Since 2006 cumulative extremism has been used to refer to how one form of extremism feeds off and magnifies other forms. The original concept is expanded via interdisciplinary analyses of post-9/11 US counterterrorism policies and the discourse framing social and media responses to those policies, which this thesis argues become performative themselves in influencing the numbers and extent of perceived terror threats. An examination of US political rhetoric, counterterrorism policy-making, and popular media coverage of terrorist incidents indicates how Western state behaviour on counterterrorism is often at odds with international law, human rights, and moral norms. Since 9/11 the US and supporting Western states have been drawn into an open-ended conflict against Islamic terrorism where the question of what might constitute a resolution has become impossible to answer.
    [Show full text]