Skip to main content

2024 | OriginalPaper | Buchkapitel

The Role of Intelligence in the Confrontation of ISIS 3.0 and Recommendations for UAE

verfasst von : Dusko Tomic, Eldar Saljic, Yousef Al Ali

Erschienen in: Digital Governance & Security

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

After September 11, 2001, the entire world was threatened by the Islamic terrorist organization Al-Qaeda. Led by Osama Bin Laden, they attacked the World Trade Center and the Pentagon and showed everyone that the USA was vulnerable to attacks, killing thousands of innocent people in the process since most of the people inside the World Trade Center were civilians. After that, Al-Qaeda was considered the main public enemy in the War on Terror, which the USA and its allies in NATO started shortly after. With the changes to national security policies, aviation security, airport security and counter-terrorism measurements undertaken by states and international organizations (United Nations, European Union, Commonwealth etc.), there was less belief that another organization could rise again and become as powerful as Al-Qaeda, which was believed to have stopped their attacks in 2011, after the killings of Osama Bin Laden. After Bin Laden was killed, many believed the organization Al-Qaeda to have dispersed and become less active. Nevertheless, there are many reports and researches showing that Al-Qaeda was still active in Southeast Asia, where they are still recruiting fighters for the Jihad, under new leadership. However, in 2011, the world witnessed public uprisings and revolt in several states in the Middle East (Libya, Syria, Bahrain, Egypt, Tunisia, Algeria, etc.), where rebels started fighting against the current regime. This event was later known as the Arab Spring. After the Arab Spring, another terrorist organization became famous for the proclamation of their Khalifate—the Islamic State of Iraq and the Levant, commonly known as ISIS. ISIS started operating a large-scale network spreading across the borders of Iraq and Syria, where their Khalifate was located, and led attacks in Europe and the USA and was affiliated with other attacks being conducted by affiliated organizations. In 2017, the USA and its allies led an attack on ISIS and officially declared the organization “defeated,” killing the majority of their fighters and attacking their headquarters in the largest ISIS Khalifate. But, much to the surprise of everyone else, ISIS continued to exist and led attacks after 2017, with the most recent attack being the Sri Lanka Easter Bombings on Christian churches in the capital in 2019. Despite being “defeated” in the military sense, ISIS continues to exist in the virtual world, and reports show that they are still recruiting fighters and spreading propaganda through the internet, thus this formation has been given the name ISIS 3.0.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al-Rawi, A. (2016). Video games, terrorism, and ISIS’s Jihad 3.0. Terrorism and Political Violence, 740–760. Al-Rawi, A. (2016). Video games, terrorism, and ISIS’s Jihad 3.0. Terrorism and Political Violence, 740–760.
Zurück zum Zitat Awan, I. (2017). Cyber-extremism: ISIS and the power of social media. Society, 138–149. Awan, I. (2017). Cyber-extremism: ISIS and the power of social media. Society, 138–149.
Zurück zum Zitat Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twittern. Brookings. Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twittern. Brookings.
Zurück zum Zitat Charles, A. (2009). Playing with one's Self: Notions on subjectivity and agency in digital games. Eludamos Journal for Computer Game Culture, 281–294. Charles, A. (2009). Playing with one's Self: Notions on subjectivity and agency in digital games. Eludamos Journal for Computer Game Culture, 281–294.
Zurück zum Zitat Hinnebusch, R. (2012). Syria: From “authoritarian upgrading” to “revolution”. International Affairs, 95–113. Hinnebusch, R. (2012). Syria: From “authoritarian upgrading” to “revolution”. International Affairs, 95–113.
Zurück zum Zitat Intelligence and Terrorism Information Center. (2014). ISIS: Portrait of a Jihadi terrorist organization. Intelligence and Terrorism Information Center. Intelligence and Terrorism Information Center. (2014). ISIS: Portrait of a Jihadi terrorist organization. Intelligence and Terrorism Information Center.
Zurück zum Zitat Pearson, E. (2017). Online as the new frontline: Affect, gender, and ISIS-take-down on social media. Studies in Conflict and Terrorism, 850–874. Pearson, E. (2017). Online as the new frontline: Affect, gender, and ISIS-take-down on social media. Studies in Conflict and Terrorism, 850–874.
Zurück zum Zitat Ranstorp, M., & Normark, M. (2015). Introduction: Understanding terrorism innovation and learning—Al qaeda and beyond. Routledge.CrossRef Ranstorp, M., & Normark, M. (2015). Introduction: Understanding terrorism innovation and learning—Al qaeda and beyond. Routledge.CrossRef
Zurück zum Zitat Shehabat, A., Mitew, T., & Alzoubi, Y. (2017). Encrypted Jihad: investigating the role of telegram app in lone wolf attacks in the west. Journal of Strategic Security, 10, 27–53.CrossRef Shehabat, A., Mitew, T., & Alzoubi, Y. (2017). Encrypted Jihad: investigating the role of telegram app in lone wolf attacks in the west. Journal of Strategic Security, 10, 27–53.CrossRef
Zurück zum Zitat Zelin, A. Y. (2014). The war between ISIS and Al-Qaeda for supremacy of the global Jihadist movement. The Washington Institute for Near East Policy. Zelin, A. Y. (2014). The war between ISIS and Al-Qaeda for supremacy of the global Jihadist movement. The Washington Institute for Near East Policy.
Metadaten
Titel
The Role of Intelligence in the Confrontation of ISIS 3.0 and Recommendations for UAE
verfasst von
Dusko Tomic
Eldar Saljic
Yousef Al Ali
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-49302-7_7