Rechtsextremistische Fahnen auf einer Demonstration zur Illustration des Arbeitsfeldes „Rechtsextremismus“

Right-wing Extremists and their Internet Presence

Cover of the publication ‘Right-wing Extremists and their Internet Presence’, Editor: Bundesamt für Verfassungsschutz, Date of Information: August 2013Zoom© Bundesamt für Verfassungsschutz Cover of the publication ‘Right-wing Extremists and their Internet Presence’

In general, right-wing extremist activities on the Internet are aimed at attracting attention and raising interest for the rightwing extremist cause. If successful, they achieve their aim of steadily increasing the number of adherents, sympathisers and members of right-wing extremist groups and associations. Some
right-wing extremists and/or right-wing extremist organisations have also been using the Internet to present their personal views and to disseminate their propaganda, including enemy profiling. This also includes – not rarely overt and open – defamations of people who hold different political views as well as agitation against minorities, which is done without showing any respect for human dignity.
Essential for the dissemination of such ”messages” are without doubt the interactive elements of the Internet such as social networks, blogs or video platforms. But also right-wing extremist Internet presences, which have been created as a news portal, forum or homepage, for example, have become an important instrument of digital propaganda today.


Within the right-wing extremist spectrum, the security awareness – the realisation of the need to protect oneself, especially on the Internet – has increased. By means of tactical rules of conduct, security warnings for electronic communications or general tips for dealing with security agencies, right-wing extremists are systematically seeking to sensitise their comrades. The aim of such security measures is to protect oneself or a special organisation both in the virtual and real world against the political opponent or against any action on the part of state authorities.


This brochure published by the Bundesamt für Verfassungsschutz describes the currently most important elements of right-wing extremist activity on the Internet, documenting specific modi operandi of right-wing extremist protagonists.


Contents:

  • Forms of Internet Presence
  • Right-wing Extremist Activities on the Internet
    • Openly Extremist Manner
      • Self-Presentation
      • Mobilisation
      • Networking
    • Indirect Influence Exercised by Right-wing Extremists on Public Discourse
      • Systematic Use of Provocation, Polemics and ”Comedy”
      • Covert Influence Exercised on Opinion-Forming
    • Influence Exercised on the Behaviour of the Scene: Clandestine and Tactical Behaviour of Right-wing Extremists
      • Data and Communications Security
      • Behaviour within Social Networks
      • Behaviour in Internet Forums
      • Behaviour in Case of Approaches Made by the Police or the BfV/LfVs
      • Behaviour in Case of Searches and Seizures
  • Use of Technical Means

Editor: Bundesamt für Verfassungsschutz
Date of information: August 2013

Download

Print view

Emblem pro securitate

Anti-terrorist Hotline: +49(0)221/ 792-3366

Anti-terrorist Hotline: +49(0)221/ 792-3366

Publications

2017 Annual Report on the Protection of the Constitution (Facts and Trends)

2017 Annual Report on the Protection of the Constitution (Facts and Trends)

DOI: July 2018
Further information Download
How can I identify extremists and members of foreign secret services within my environment? - Important information for refugees in Germany

How can I identify extremists and members of foreign secret services within my environment? - Important information for refugees in Germany

DOI: March 2018
Further information Download
2016 Annual Report on the Protection of the Constitution (Facts and Trends)

2016 Annual Report on the Protection of the Constitution (Facts and Trends)

DOI: July 2017
Further information Download
Our topics – Facts to know

Our topics – Facts to know

DOI: January 2017
Further information Download
Industry 4.0 – Challenges of a new technology

Industry 4.0 – Challenges of a new technology

DOI: January 2017
Further information Download
Social media – Risks posed by social networks

Social media – Risks posed by social networks

DOI: March 2016
Further information Download