Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence.  Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.

With contributions from leading experts in the field—including practitioners and terrorism researchers—the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.

Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

part Section I|1 pages


chapter Chapter 1|30 pages

Online Utilization for Terrorist Self-Radicalization Purposes

ByAllen R. Anderson

chapter Chapter 2|13 pages

Online Radicalization

Contested Terms and Conceptual Clarity
ByStuart Macdonald, Joe Whittaker

chapter Chapter 3|17 pages

The Relationship between Social Media and Radicalization

ByCori E. Dauber, Kemal Ilter

chapter Chapter 4|14 pages

Rule-of-Law and Respect for Human Rights Considerations

ByOmi Hodwitz

part Section II|1 pages

A Transnational Recruitment Problem of Violent Online Extremist Terrorists

chapter Chapter 5|22 pages

How Homegrown Violent Extremism Will Likely Continue to Evolve as a Significant Threat

ByCori E. Dauber, Mark D. Robinson

chapter Chapter 6|10 pages

Counterterrorism Strategy from an Extended Global Online Level

ByJosé de Arimatéia da Cruz

part Section III|1 pages

Policy and Legislative Frameworks Responses to Threats Presented by Online Terrorists

chapter Chapter 8|12 pages

Legislation Specifically Targeting the Use of the Internet to Recruit Terrorists

ByThomas J. Holt, Joshua D. Freilich, Steven M. Chermak

part Section IV|1 pages

Investigations and Intelligence Gathering of Terrorism-Related Online Activities

chapter Chapter 11|14 pages

Investigations of Terrorist Cases Involving the Internet

ByAllison Miller, Yannis A. Stivachtis

chapter Chapter 12|17 pages

Terrorism Recruitment and Radicalization into the 21st Century

ByJames M. Smith, Maeghin Alarid

chapter Chapter 13|15 pages

Domestic Terrorism and Digital MediaPlanning in Cyberspace

ByDavid Woodring, Kevin M. Fitzpatrick, Jeff Gruenewald, Brent Smith

part Section V|1 pages

Online Terrorist Propaganda

chapter Chapter 14|11 pages

Metaphors of Radicalization

A Computational and Qualitative Analysis of Jihadi Propaganda
ByBen Miller, Weeda Mehran, Yassin Kosay Alsahlani, Haroon Qahtan

chapter Chapter 15|12 pages

An Information, Motivation, and Behavioral Skills Perspective on Terrorist Propaganda

ByRebecca A. Wilson, Anthony F. Lemieux

chapter Chapter 17|24 pages

Online Terrorist Propaganda

Strategic Messaging Employed by Al Qaeda and ISIS
ByElena Pokalova

chapter Chapter 18|14 pages

Daesh’s Multimodal Strategies of Online Propaganda

ByCarol K. Winkler, Jonathan Pieslak

chapter Chapter 19|9 pages

Supporting the Authentication of Digital Evidence

BySarbari Gupta

part Section VI|1 pages

ISIS and the Dark Web

chapter Chapter 21|10 pages

Monitoring and Tracking ISIS on the Dark Web

ByWilliam F. Gross

chapter Chapter 22|20 pages

ISIS and Russia

The Use of Threat for Spreading of Influence and ISIS’s Future
ByDmitry Shlapentokh

part Section VII|1 pages

International Cooperation with Online Terrorism

chapter Chapter 23|16 pages

Instruments and Arrangements against Online Terrorism Relating to International Cooperation

ByAli Dizboni, Christian Leuprecht

chapter Chapter 24|12 pages

Intelligence Sharing Among Agencies and Internationally

ByJosé de Arimatéia da Cruz

chapter Chapter 25|12 pages

Role of Prosecutors in Online Terrorism Cases

ByBecky K. da Cruz

part Section VIII|1 pages

Private Sector Cooperation and Responsibility for Countering the Use of the Internet for Terrorist Purposes