Online Terrorist Propaganda, Recruitment, and Radicalization -

Online Terrorist Propaganda, Recruitment, and Radicalization

John R. Vacca (Herausgeber)

Buch | Hardcover
504 Seiten
2019
CRC Press (Verlag)
978-1-138-04826-3 (ISBN)
143,40 inkl. MwSt
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups’ online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.

With contributions from leading experts in the field—including practitioners and terrorism researchers—the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.

Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

John R. Vacca is an information technology consultant, researcher, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, he has authored 81 books and more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. He is also a former configuration management specialist, computer specialist, and computer security official (CSO) for NASA’s space station program, Freedom, and the International Space Station Program from 1988 until his retirement from NASA in 1995. In addition, he is also an independent online book reviewer. Finally, he was one of the security consultants for the MGM movie titled "AntiTrust," which was released in January 2001. A detailed copy of the author’s bio can be viewed at http://www.johnvacca.com.

Part I: Introduction

Chapter 1: Online Utilization For Terrorist Self-Radicalization Purposes

Chapter 2: Countering Online Terrorist Recruitment Activities

Chapter 3: Rule-Of-Law And Respect For Human Rights Considerations

Part II: A Transnational Recruitment Problem Of Violent Online Extremist Terrorists

Chapter 4: How The Threat From Violent Extremism Has Evolved

Chapter 5: The Development Of How To Counter Violent Extremism

Chapter 6: Global Online Counter-Terrorism Strategy

Part III: Policy And Legislative Frameworks Responses To Threats Presented By Online Terrorists

Chapter 7: National Policies And Legislative Frameworks

Chapter 8: Legislation Specifically Targeting The Use Of The Internet To Recruit Terrorists

Chapter 9: Developing International /Universal Online Counter-Terrorist Recruitment Legal Instruments

Chapter 10: Enforcement Of Criminal Offences: Specifically Targeting The Use Of The Internet To Incite Terrorists

Chapter 11: Legal Restrictions and Challenges for Police and Law Enforcement Authorities

Part IV: Investigations And Intelligence-Gathering Of Terrorism-Related Online Activities

Chapter 12: Tools In The Commission Of Terrorist Offenses Involving The Internet

Chapter 13: Investigations Of Terrorist Cases Involving The Internet

Chapter 14: Forensic Data Preservation And Recovery

Chapter 15: Supporting The Authentication Of Digital Evidence

Chapter 16: Operational Cybercrime Units: Forensic Retrieval Of Computer-Based

Chapter 17: The Intelligence-Gathering And Investigative Phase Of Online Counter-Terrorism Operations

Chapter 18: Training In The Technical Aspects Of How Terrorists And Other Criminals Can Use The Internet

Part V: ISIS And The Dark Web

Chapter 19: How The Dark Web Has Become ISIS' Number One Recruiting and Engagement Platform

Chapter 20: How ISIS Is Using The Dark Web For Propaganda Purposes

Chapter 21: How To Access The Dark Web and Track ISIS

Chapter 22: How To Infiltrate ISIS On The Dark Or Deep Web

Chapter 23: How To Fight And Contain ISIS On The Dark Or Deep Web

Chapter 24: How The U.S.’ DoD Is Fighting ISIS On The Deep Web

Part VI: International Cooperation With Online Terrorism

Chapter 25: Instruments And Arrangements Against Online Terrorism

Chapter 26: Intelligence Sharing among Agencies and Internationally

Chapter 27: National Legislative Frameworks: Investigation And Prosecution Of Online Terrorism Cases

Chapter 28: Non-Legislative Measures: A Critical Factor In The Successful Investigation And Prosecution Of Online Terrorism-Related Offenses

Part VII: Prosecutions: The Universal Legal Framework Against Online Terrorism

Chapter 29: A Rule-Of-Law Approach To Criminal Prosecutions Of Extremely Violent Online Terrorists

Chapter 30: Role Of Prosecutors In Online Terrorism Cases

Chapter 31: The Charging Phase: Decisions Of Whether To Charge Online Terrorists

Chapter 32: The Trial Phase: Evidential Issues Related To The Use Of Intelligence-Based Evidence In Dealing With Online Terrorism

Part VIII: Private Sector Cooperation And Responsibility and the Future of Countering Online Radicalization

Chapter 33: Public-Private Partnerships’ and the Private Sector’s Role In Countering The Use Of The Internet For Terrorist Purposes

Chapter 34: Advanced Drone and Satellite Surveillance

Erscheinungsdatum
Zusatzinfo 18 Tables, black and white; 160 Halftones, black and white; 15 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 178 x 254 mm
Gewicht 1133 g
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Mathematik / Informatik Informatik Web / Internet
Sozialwissenschaften Politik / Verwaltung Europäische / Internationale Politik
ISBN-10 1-138-04826-7 / 1138048267
ISBN-13 978-1-138-04826-3 / 9781138048263
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
was jeder über Informatik wissen sollte

von Timm Eichstädt; Stefan Spieker

Buch | Softcover (2024)
Springer Vieweg (Verlag)
37,99
Grundlagen – Anwendungen – Perspektiven

von Matthias Homeister

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Eine Einführung in die Systemtheorie

von Margot Berghaus

Buch | Softcover (2022)
UTB (Verlag)
25,00