ABSTRACT

This chapter demonstrates the complex and very real threat posed by acts of online extremism and cyber terrorism, including the application of hacking techniques in furtherance of war between nation-states. These threats require a sophisticated response from law enforcement and military agencies alike in order to properly defend against attacks. The chapter provides substantive detail on the role of the Internet in facilitating communications, fundraising, and planning for terror groups. It describes the Arab Spring uprising and how social media and cell phone technology engendered these events. The chapter also provides an overview of the emergence of a new app being used by Islamic State of Iraq and Syria (ISIS) to shield its communications from government agencies and counterterror groups. It explains why ISIS and other groups are using encrypted apps developed in-house rather than continuing to use popular messaging apps due to the risk of identification.