Terrorisme i cyberspace: udfordringer ved organisering og udførelse af politisk vold online

Forfattere

  • Jeppe Teglskov Jacobsen

DOI:

https://doi.org/10.7146/politica.v47i3.131446

Resumé

Internettet præsenteres ofte som et farligt redskab i hænderne på terrorister. Det er dog ikke nødvendigvis sandheden. Artiklen trækker på indsigter fra studier af sunniekstremistiske grupper, Anders B. Breivik og Anonymous og diskuterer terroristers anvendelse af internettet i organiseringen og udførelsen af terrorisme. Jeg vil argumentere for, at det anarkiske og anonyme internet fører mistillid og fragmentering med sig, hvilket gør det sværere for grupper at opretholde en fælles strategi og det fælles fjendebillede. Artiklen styrker derfor fortællingen om, at det hovedsageligt er ekskluderede og socialt marginaliserede enspændere, der ender med at planlægge voldshandlinger i isolation bag computerskærmen. I forlængelse heraf vil jeg pege på, at hovedparten af potentielle terrorister drages af fysisk interaktion, våben og eksplosioner – og ikke udviklingen af komplekse cybervåben.

Referencer

AQAP (2010). Special Issue. Inspire, november.

Archetti, Cristina (2015). Terrorism, communication and new media: explaining radicalization in the digital age. Perspectives on Terrorism 9 (1): 49-59.

Awan, Akil (2007). Radicalization on the Internet? RUSI Journal 152 (3): 76-81.

Behnke, Andreas (2004). Terrorising the political: 9/11 within the context of the globalisation of violence. Millennium 33: 279-312.

Behnke, Andreas (2014). Dressed to kill: the sartorial code of Anders Behring Breivik, i Sue Malvern og Gabriel Koureas (red.), Terrorist Transgressions. Gender and the Visual Culture of the Terrorist. London: I.B. Tauris.

Benson, David (2014). Why the Internet is not increasing terrorism. Security Studies 23 (2): 293-328.

Betz, David og Tim Stevens (2011). Cyberspace and the State – towards a Strategy for Cyber-power. Oxon: Routledge.

Bigo, Didier, Laurent Bonelli, Emmanuel-Pierre Guittet og Francesco Ragazzi (2014). Preventing and countering youth radicalisation in the EU. LIBE committee study, http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/509977/IPOL-LIBE_ET(2014)509977_EN.pdf (5. marts 2015).

Borchgrevink, Aage (2013). A Norwegian Tragedy. Cambridge: Polity.

Borum, Randy (2011). Radicalization into violent extremism II. Journal of Strategic Security 4(4) : 36-62.

Breivik, Anders (2011). 2083 – A European Declaration of Independence, http://publicintelligence.net/anders-behring-breiviks-complete-manifesto-2083-a-european-declaration-of-independence/ (5. marts 2015).

Brunst, Phillip (2010). Terrorism and the Internet: new threats posed by cyberterrorism and terrorist use of the Internet, i Philip Brunst (red.), A War on Terror? Heidelberg: Springer.

Böckler, Nils, Thorsten Seeger og Wilhelm Heitmeyer (2011). School shootings: a double loss of control, i Wilhelm Heitmeyer, Heinz-Gerhard Haupt, Andrea Kirschner og Stefan Malthaner (red.), Control of Violence. New York: Springer.

Cabinet Office (2010). The National Security Strategy. London: Crown Copyright.

Chen, Thomas, Lee Jarvis og Stuart Macdonald (red.) (2014). Cyberterrorism – Understanding, Assessment, and Response. New York: Springer.

Clarke, Richard og Robert Knake (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins.

Coleman, Gabriella (2013). Anonymous in context: the politics and power behind the mask, Internet Governance Papers.

Coleman, Gabriella (2014). Hackers, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous. London/New York: Verso.

Coll, Steve og Susan Glasser (2005). Terrorists turn to the web as base of operations. Washington Post, 7. august, http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html (5. marts 2015).

Conway, Maura (2014). Reality check: assessing the (un)likelihood of cyberterrorism, i Thomas Chen, Lee Jarvis og Stuart Macdonald (red.), Cyberterrorism – Understanding, Assessment, and Response. New York/Heidelberg: Springer.

Crone, Manni (2014). Religion and violence: governing muslim militancy through aesthetic assemblages. Millennium 43(1): 291-307.

Deibert, Ronald J. (2013). Black Code: Surveillance, Privacy and the Dark Side of the Internet. Toronto: Signal.

Denning, Dorothy (2000). Cyberterrorism: the logic bombs versus the truck bomb. Global Dialogue 4(2).

Denning, Dorothy (2007). A view of cyberterrorism five years later, i Kenneth Himma (red.) Internet Security: Hacking, Counterhacking, and Society. Sudbury: Jones and Bartlett.

Dodd, Vikram (2010). Roshonara Choudhry: police interview extracts, Guardian, 3. november, http://www.theguardian.com/uk/2010/nov/03/roshonara-choudhry-police-interview (5. marts 2015).

Dunn Cavelty, Myriam (2008). Cyber-terror – looming threat or phantom menace? Journal of Information Technology & Politics 4 (1): 19-36.

EU Cybersecurity Strategy (2013). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Bruxelles, 7. februar.

FBI (2010). The cyber threat – using intelligence to predict and prevent. FBI.gov, 3. april, http://www.fbi.gov/news/stories/2010/march/cyberintel030410 (5. marts 2015).

FBI (2012). Final Report on the William H. Webster Commission on the Federal Bureau of Investigation, Counterterrorism Intelligence. http://www.fbi.gov/news/pressrel/press-releases/final-report-of-the-william-h.-webster-commission (5. marts 2015).

Gemmerli, Tobias (2014). Online-radikalisering: et uafklaret begreb. Litteraturreview af definitioner og tilgange inden for online-radikalisering (del 1 af 3), DIIS Rapport 7, København: DIIS.

Gemmerli, Tobias (2015). Online-radikalisering: forebyggelse på internettet. DIIS Rapport 3, København: DIIS.

Gertz, Bill (2014). Al-Qaida targeting U.S. infrastructure for digital 9/11. The Washington–Free Beacon, 25. juli, http://freebeacon.com/national-security/al-Qaida-targeting-u-s-infrastructure-for-digital-911/ (5. marts 2015).

Hansen, Stig Jarle (2013). Al-Shabaab in Somalia: The History and Ideology of a Militant Islamist Group, 2005-2012. New York: Oxford University Press.

Hegghammer, Thomas (2013). The recruiter’s dilemma: signalling and rebel recruitment tactics. Journal of Peace Research 50 (3): 3-16.

Helfstein, Scott (2012). Edge of Radicalization: Individuals, Networks and Ideas in Violent Extremism, Countering Terrorism Center, https://www.ctc.usma.edu/posts/edges-of-radicalization-ideas-individuals-and-networks-in-violent-extremism (5. marts 2015).

Hemmingsen, Ann-Sophie (2011). Individualismens terrorisme, i Lars Erslev Andersen, Manni Crone, Peter Hansen, Ann-Sophie Hemmingsen, Ulla Holm, Søren Hove og Leila Stockmarr (red.), Ti år efter 11. september 2011 – tilbageblik, status og aktuelle tendenser. København: DIIS.

Hoffman, Bruce (2006). The use of the Internet by Islamic extremists. Testimony presented to the House Permanent Select Committee on Intelligence, 4. maj.

Holt, Thomas (2012). Exploring the intersections of technology crime, and terror. Terrorism and Political Violence 24 (2): 337-354.

Hoskins, Andrew og Ben O’Loughlin (2009). Media and the myth of radicalization. Media, War & Conflict 2 (2): 107-110.

Hua, Jian og Sanjay Bapna (2012). How can we deter cyber terrorism? Information Security Journal 21: 102-114.

Jacobsen, Jeppe T. (2014). Clausewitz and the utility of cyberattacks in war. International Journal of Cyber Warfare and Terrorism 4(4): 1-16.

Jones, Bryony (2012). French attacks could inspire next generation of terrorists. CNN, 22. marts, http://edition.cnn.com/2012/03/21/world/europe/lone-wolf-future-of-terrrorists/index.html (5. marts 2015).

July 7th People’s Independent Inquiry Forum (2009). Waseem Mughal and Younis Tsouli incl., http://z13.invisionfree.com/julyseventh/ar/t1770.htm (5. marts 2015).

Kenney, Michael (2010). Beyond the Internet: metis, techne, and the limitations of online artifacts for Islamist terrorists. Terrorism and Political Violence 22 (2): 177-197.

Kibar, Omar (2014). Virushandlerne. Weekendavisen, 9. maj.

Kirkhope, Timothy og Charles Tannock (2015). Motion for a resolution, European Parliament – Plenary Sitting, 4. februar, B8-0126/2015.

Knake, Robert (2010). Untangling attribution: moving beyond accountability in cyberspace. Prepared statement, Council for Foreign Relations.

Kushner, David (2014). The masked avengers: How Anonymous incited online vigilantism from Tunisia to Ferguson. New Yorker, 8. september.

Lachow, Irving (2009). Cyber terrorism: menace or myth?, i Franklin Kramer, Stuart Starr og Larry Wentz (red.), Cyberpower and National Security. Washington DC: National Defense University Press.

Langner, Ralph (2013). Stuxnet’s secret twin. Foreign Policy, 19. november.

Lenning, Christopher, Krestina Amon, Heidi Brummert og Nicholas Lennings (2010). Grooming for terror: the Internet and young people. Psychiatry, Psychology and Law 17 (3): 424-437.

Lindsey, Jon (2013). Stuxnet and the limit of cyber warfare. Security Studies 22(3): 365-404.

Mansfield-Devine, Steve (2011a). Anonymous: serious threat or mere annoyance. Network Security 12 (1): 1-10.

Mansfield-Devine, Steve (2011b). Hacktivism: assessing the damage. Network Security 12 (8): 1-13.

Marcus, Jonathan (2015). US Centcom Twitter account hacked by pro-IS group. BBC, 12. januar, http://www.bbc.com/news/world-us-canada-30785232 (5. marts 2015).

Matusitz, Jonathan (2008). Cyberterrorism: postmodern state of chaos. Information Security Journal 17: 179-187.

McCant, Will (2008). More on online recruitment. Jihadica, 18. september og 14. oktober, http://www.jihadica.com/?cat=89 (5. marts 2015).

McFarlane, Bruce (2010). Online violent radicalisation (OVeR): Challenges facing law enforcement agencies and policy stakeholders, conference paper, http://artsonline.monash.edu.au/radicalisation/files/2013/03/conference-2010-online-violent-radicalisation-bm.pdf (5. marts 2015).

McGraw, Gary og Nathaniel Fick (2011). Separating the threat from the hype: what Washington needs to know about cyber security, kapitel 3 i Kristin M. Lord og Travis Sharp (red.), America’s Cyber Future: Security and Prosperity in the Information Age. Washington DC: Center for a New American Security.

Melle, Ingrid (2013). The Breivik case and what psychiatrists can learn from it. World Psychiatry 12 (1): 16-21.

Molfino, Emily (2012). VIEWPOINT: Cyberterrorism: Cyber “Pearl Harbor” is Imminent, i Sean Costigan og Jake Perry (red.), Cyberspaces and Global Affairs. Farnham: Ashgate Publishing Limited.

Mueller, Robert (2013). FBI Director fears 9/11-style attack on US. SkyNews, 23. august, http://news.sky.com/story/1132290/fbi-director-fears-9-11-style-attack-on-us (5. marts 2015).

Nesser, Petter (2008). How did Europe’s global jihadis obtain training for their militant causes? Terrorism and Political Violence 20 (2): 234-256.

Ogun, Mehmet (2012). Terrorist use of the Internet. Journal of Applied Security Research 7 (2): 203-217.

Olsen, Jon (2014). Trusselsbilledet – fra dommedagsprofeter til ensomme ulve, i Lars Erslev Andersen (red.), Terrorisme og trusselsvurderinger. København: DIIS.

Olson, Parmy (2013). We Are Anonymous: Inside the Hacker World of Lulzsec, Anonymous and the Global Cyber Insurgency. London: RandomHouse.

Pantucci, Raffaello (2011). What have we learned about lone wolves from Anders Behring Breivik? Perspectives on Terrorism 5 (5-6): 27-42.

Pisoiu, Daniela (2013). Theoretische Ansätze zur Erklärung individueller Radikalisierungsprozesse: eine kritische Beurteilung und Überblick der Kontroversen. Journal EXIT-Deutschland 1: 41-87.

Ravndal, Jacob (2013). Anders Behring Breivik’s use of the Internet and social media. Journal EXIT-Deutschland 2: 172-185.

Redins, Larisa (2012). Understanding cyberterrorism. Risk Management 59 (8): 32-35.

Regeringen (2014). Forebyggelse af ekstremisme og radikaliseringen – Regeringens handlingsplan.

Rid, Thomas (2012). Cyber War Will Not Take Place. London: Hurst & Company.

Rid, Thomas og Peter McBurney (2012). Cyber-weapons. RUSI Journal 157(1): 6-13.

Ritzau (2015). Efterforskningskilder: Terrormistænkt trænede med al-Qaeda i Yemen. Politiken, 9. januar, http://politiken.dk/udland/int_europa/ECE2505758/efterforskningskilderterrormistaenkt-traenede-med-al-qaeda-i-yemen/ (5. marts 2015).

RwB, Reports without Borders (2014). Areas controlled by Islamic State are news “black holes”, 23. oktober, http://en.rsf.org/iraq-areas-controlled-by-islamic-state-23-10-2014,47147.html (5. marts 2015).

Rådet for den Europæiske Union (2015). Council Conclusions on Cyber Diplomacy, 6122/15, Bruxelles, 11. februar.

Sandberg, Sveinung (2013). Are self-narratives strategic or determined, unified or fragmented? Acta Sociologica 56: 69-83.

Sandelson, Michael og Lyndsey Smith (2013). Oslo government headquarters building fate due to new review. The Foreigner, 20. september, http://theforeigner.no/pages/news/oslo-government-headquarters-building-fate-due-for-new-review/ (5. marts 2015).

Sanger, David (2012). Confront and Conceal. New York: RandomHouse.

Saunders, Doug (2014). When troubled young men turn to terror, is it ideology or pathology? The Global and Mail, 24. oktober, http://www.theglobeandmail.com/news/national/lone-wolf-ideology-or-pathology/article21293910/ (5. marts 2015).

Seierstad, Åsne (2013). En av oss – en fortelling om Norge. Oslo: Kagge.

Singer, Peter og Allan Friedman (2014). Cybersecurity and Cyberwar – What Everyone Needs To Know. Oxford: Oxford University Press.

Smith, Graham (2012). Hacking group Anonymous could shut down the entire U.S. power grid, head of national security warns. DailyMail, 22. februar, http://www.dailymail.co.uk/news/article-2104832/Hacking-group-Anonymous-shut-entire-U-S-power-grid-head-national-security-warns.html (5. marts 2015).

Spaaij, Ramon (2010). The enigma of lone wolf terrorism. Studies in Conflict & Terrorism 33 (9): 854-870.

Speri, Alice (2014). Now even ISIS has its own whistleblower, 20. juni, https://news.vice.com/article/now-even-isis-has-its-very-own-whistleblower (5. marts 2015).

Stenersen, Anne (2008). The Internet: a virtual training camp? Terrorism and Political Violence 20(2): 215-233.

Stohl, Michael (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot game? Crime, Law and Social Change 46: 223-238.

Syse, Aslak (2014). Breivik – the Norwegian terrorist case. Behavioural Science and Law 32: 389-407.

The 9/11 Commission Report (2004). National Commission on Terrorist Attacks Upon the United States. Washington DC: Government Printing Office.

Thompson, Robin (2011). Radicalization and the use of social media. Journal of Strategic Studies 4 (4): 167-190.

Thyssen, Ole (2015). Var Omar El-Hussein blot morder, eller var han terrorist? Politiken, 18. februar.

UNODC (2012). The Use of the Internet for Terrorist Purposes. Publishing and Library Section, UN Office at Vienna.

Verton, Dan (2003). Black Ice – The Invisible Threat of Cyber-Terrorism. Emeryville: McGill-Hill Companies.

Walsh, Eddie (2012). VIEWPOINT: an alternative perspective on cyber anarchy for policy-makers, i Sean Costigan og Jake Perry (red.), Cyberspaces and Global Affairs. Farnham: Ashgate Publishing Limited.

Weimann, Gabriel (2004). Cyberterrorism: How Real is the Threat? United States Institute of Peace Special Report.

Weimann, Gabriel (2006). Terror on the Internet. Washington DC: The Endowment of the United States Institute for Peace.

Weimann, Gabriel (2010). Terror on Facebook, Twitter and Youtube. Brown Journal of World Affairs 16 (2): 45-54.

Weimann, Gabriel (2012). Lone wolves in cyberspace. Journal of Terrorism Research 3 (2): 76-90.

Wikotorowicz, Q. (2005). The State of Global Jihad Online – A Qualitative, Quantitative, and Cross-Lingual Analysis. Oxford: Rowman & Littlefield.

Wilson, Clay (2014). Cyber threats to critical information infrastructure, i Thomas Chen, Lee Jarvis og Stuart Macdonald (red.), Cyberterrorism – Understanding, Assessment, and Response. New York/Heidelberg: Springer.

Woolford, Thomas og Jonathan Matusitz (2013). Cyberterrorism group Anonymous at the forefront of research. Extremist Project, 13. februar, http://extremisproject.org/2013/02/cyberterrorism-group-anonymous-at-forefront-of-research (5. marts 2015).

Wright, Lawrence (2006). The Looming Tower – Al-Qaida and the Road to 9/11. New York: Alfred A. Knopf.

Zelin, Aaron (2013). The state of global Jihad online. New American Foundation, januar, http://www.newamerica.net/sites/newamerica.net/files/policydocs/Zelin_Global%20Jihad%20Online_NAF.pdf (5. marts 2015).

Downloads

Publiceret

2015-09-14

Citation/Eksport

Jacobsen, J. T. (2015). Terrorisme i cyberspace: udfordringer ved organisering og udførelse af politisk vold online. Politica, 47(3). https://doi.org/10.7146/politica.v47i3.131446