ABSTRACT
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.
With contributions from leading experts in the field—including practitioners and terrorism researchers—the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.
Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
TABLE OF CONTENTS
part Section I|1 pages
Introduction
part Section II|1 pages
A Transnational Recruitment Problem of Violent Online Extremist Terrorists
chapter Chapter 5|22 pages
How Homegrown Violent Extremism Will Likely Continue to Evolve as a Significant Threat
part Section III|1 pages
Policy and Legislative Frameworks Responses to Threats Presented by Online Terrorists
chapter Chapter 8|12 pages
Legislation Specifically Targeting the Use of the Internet to Recruit Terrorists
chapter Chapter 9|12 pages
Legal Restrictions and Challenges for Police and Law Enforcement Authorities
chapter Chapter 10|13 pages
Web Vulnerability-Based Spear PhishingA Modern Combination of Tools in Cyberterrorism
part Section IV|1 pages
Investigations and Intelligence Gathering of Terrorism-Related Online Activities
part Section V|1 pages
Online Terrorist Propaganda
chapter Chapter 14|11 pages
Metaphors of Radicalization
chapter Chapter 15|12 pages
An Information, Motivation, and Behavioral Skills Perspective on Terrorist Propaganda
chapter Chapter 17|24 pages
Online Terrorist Propaganda
part Section VI|1 pages
ISIS and the Dark Web
chapter Chapter 20|24 pages
How IS Virtual Planners Use the Dark Web to Recruit, Direct, and Inspire Attacks in Europe and North America
chapter Chapter 22|20 pages
ISIS and Russia
part Section VII|1 pages
International Cooperation with Online Terrorism
chapter Chapter 23|16 pages
Instruments and Arrangements against Online Terrorism Relating to International Cooperation
part Section VIII|1 pages
Private Sector Cooperation and Responsibility for Countering the Use of the Internet for Terrorist Purposes