Page numbers refer to the print edition but are hyperlinked to the appropriate location in the e-book.
Abab, Abu Zubeir Adil al,
95
Abdaly, Taimour Abdulwahab al-,
67
Abdo, Naser Jason,
70,
72
Afghanistan,
xi,
111,
115,
133–34,
197,
210; al-Qaeda and,
29,
38,
164,
210; social media and,
133–34,
140–41; suicide bombings in,
58–59; US war in,
197–98
Ahmed, Mohammed Sharfaraz,
72
Algeria: jihad in,
115–16,
119; terrorist organizations in,
22
Ali, Hamid Abdallah Ahmad al-,
118–19
Ansari, Abu-Hamzah al-,
94–95
al-Aqsa Martyrs’ Brigades,
23,
169
Awlaki, Anwar al-,
20,
37,
70,
74,
143,
206,
239; Hasan and,
206–7; influence of,
26,
67–68,
73–74,
143; use of social media,
143
Azzam Publications,
38–39
Baghdadi, Abu Bakr al-,
3,
96
Bajadin, Abdullah Dhu al-,
31
Bank of America: cyberattacks against,
160,
166; public-private partnerships and,
251–52
al-Battar Media Battalion,
130
Al-Battar Training Camp magazine,
31,
238
bin Laden, Osama,
2,
37,
164,
196,
210; 9/11 terrorist attacks and,
16–17; appeals for money from,
35; books about,
94; fatwas issued by,
112
Black Ice: The Invisible Threat of Cyber-Terrorism (Verton),
5,
28
blogs,
38,
42,
127,
211; counterterrorism monitoring of,
189,
191; terrorists’ use of,
22,
39,
43,
64,
87,
176,
206
Boston Marathon bombing (2013),
26,
66; inspired by
Inspire magazine,
32–33,
73
Breivik, Anders Behring,
67
Brigades of Tariq ibn Ziyad,
165
“A Call to Arms” (video),
69–70
Central Intelligence Agency (CIA),
7,
44,
165,
176; public-private partnerships and,
250–52
chatrooms,
4,
19,
22,
36,
106,
168,
238; counterterrorism and,
186,
191; monitoring of,
9,
183,
190; al-Qaeda and,
39; recruiting in,
27; used by “lone wolves,”
64; used for planning operations,
32–33
children and youth,
53–57; counterextremism education for,
178; impact of terrorism on,
218; online children’s magazines,
87; online fatwas and,
117; recruitment of,
28,
53–57,
61,
128–29,
148; as targets,
74
China, cyberattacks originating in,
185,
248–49
Choudhry, Roshonara,
67,
143
Christians: online fatwas against,
115–18,
239; War on Terror and,
211
Citigroup Citibank, cyberattacks against,
166
civil liberties,
221–47; counterterrorism and,
7–8,
177,
222–25,
229–31; freedom of expression,
25,
229–31,
244–45,
254; free speech on social media,
140,
145; NSA controversy and,
225–29; Obama on,
231; PATRIOT Act and,
225; surveillance and,
221,
230; trade-offs with security,
230–35.
See also freedom of expression
Clapper, James R., Jr.,
161–62
Clean IT Project (2012),
240–43
CNN: cyberattacks against,
160,
169; public-private partnerships and,
251–52
computer network attacks (CNA),
156
core violent radical “master” narrative,
197–201,
210; radicalization and,
203–4
Council on Foreign Relations,
19,
89–90
Counterstrike: The Untold Story of America’s Secret Campaign in the War on Terror (Schmitt and Shanker),
223–24
counterterrorism,
xiii,
6–8,
7,
175–92,
222–25; civil liberties and,
7–8,
177,
221–25; counternarratives and,
210–19; cyberterrorism and,
171,
176,
248–49; government recommendations for,
177–78; government spending on,
1–2; international collaboration in,
243–47; monitoring of “chatter,”
165; M.U.D. approach to,
188–92; online debates and,
106–8; public-private partnerships and,
247–52; resulting in smaller-scale attacks,
27; “Say No to Terror” Campaign,
215–19; sting operations and,
208; strategic communication planning in,
180–83; USA PATRIOT Act,
222,
224–25,
235; use of “noise” in,
179–88,
191–92.
See also war on terrorism
critical infrastructure protection,
248,
250
Cutting Sword of Justice,
162
cybercrime,
35,
46,
150,
176; credit card fraud,
35–36,
152; identity theft,
35,
152,
184,
213; phishing,
35,
248
cyberterrorism,
6,
10–11,
23,
149–73; appeal of,
152–54; botnets and,
156–57; contrasted with hacking,
151–52; counterterrorism and,
171,
176,
248–49; definition of,
6,
150–52; denial-of-service (DoS) attacks and,
159–61; fatwas and,
120; forms of,
154–61; likelihood of cyberterrorist attacks,
161–63; recruitment of cyberterrorists,
149,
152,
154,
165,
167–68,
170–71; SCADA systems and,
157–59; state sponsorship of,
168–73; Sunni-Shiite conflict and,
102–3; terrorists’ growing interest in,
164–67.
See also hacking
denial-of-service (DoS) attacks,
159,
161
Department of Homeland Security (DHS),
11,
64,
133,
162; public-private partnerships and,
248–52
Dolphinarium bombing, Tel Aviv (2001),
54
Domestic Security Enhancement Act of 2003 (“PATRIOT II”),
224–25
drug trafficking,
35,
115
EBSCO Information Services,
46–47
Egypt,
110,
136n2,
197; fatwas originating from,
110,
116,
120; Hamas and,
99; perception of al-Qaeda in,
202,
211; reaction to War on Terror in,
202,
211; terrorist organizations in,
22
electromagnetic pulses,
155
“Electronic Islamic Army,”
160
Estonia, cyberattack on,
155–56
Facebook,
xii,
127,
131–37,
238; counterterrorism and,
188,
215,
227; de-encryption and,
227; encryption and,
227; Fatah and,
56; government surveillance and,
236–37; Hamas and,
88,
91; Hezbollah and,
134–35; monitoring of,
183; neutrality of,
140n3; public-private partnerships and,
250; regulation of,
236–37,
250; security certificates and,
172; social media marketing and,
78; used by “lone wolves,”
67,
178; used for planning terrorist attacks,
45; used for recruitment,
27,
45,
74,
128; used to distribute terrorist messages,
xii,
4,
11,
18,
20–21,
32,
38–39,
43,
45,
64,
126–37,
140,
145,
160,
193
Fahd, Shaykh Naser bin Hamad al-,
105,
122–23
Faraj, Muhammad abd-al-Salam,
201
Al-Fateh (Hamas online children’s magazine),
53–54,
82,
87
fatwas,
10,
58,
109–23; against Christians,
115–18,
239; cyberterrorism and,
120; definition of,
110; legitimate actions and,
118–20; legitimate targets of,
115–19; Osama bin Laden and,
112–13; against Rushdie,
109,
111; “sexual jihad” fatwas,
114–15; suicide attacks and,
103n2,
104,
120–22; used to promote jihad,
58,
112–16; weapons of mass destruction (WMD) and,
105,
122–23
Federal Bureau of Investigation (FBI),
7,
26; cyberterrorism and,
161–62,
165,
170; Gadahn, Adam Yahiye, and,
205; Internet monitoring by,
176,
222–24; Loewen and,
208; public-private partnerships and,
251–52; Rahman and,
111; sting operations,
208; Tsarnaev brothers and,
26,
66
Foreign Intelligence Surveillance Act (FISA) of 1978,
225,
225n3,
227; FISA Amendments Act (2008),
227
France,
244; counterterrorism in,
184; Hamas’ website and,
82; terrorist attacks targeting,
5,
65,
166,
184
Frankfurt airport killings (2011),
125,
207
freedom of information,
7,
229
fund-raising,
24,
34–36,
98; foreign funding of terrorist groups,
89–90; identity theft and,
184; use of Internet for,
6,
18,
19,
40,
142,
145;
zakat and,
218
Gartenstein-Ross, David,
203,
205
Gaza,
23,
45,
137; Hamas in,
29,
33,
99n1; terrorist attacks originating from,
25,
45,
59,
99
Germany: counterterrorism in,
184; Frankfurt airport killings (2011),
125,
207; Munich Olympic Games (1972),
16; offensive websites and,
244; terrorist attacks targeting,
5,
16,
65,
207
Global Islamic Media Front (GIMF),
40,
42,
54,
100
Golani, Abu Mohammed al-,
135–36
Google,
9,
46,
248; cyberattacks on,
165; de-encryption and,
227; government surveillance and,
226,
236; public-private partnerships and,
250–52
Guardian (London): cyberattacks against,
169; NSA spy scandal and,
228–29
hacking,
151,
164–73; fatwas regarding,
120; public-private partnerships and,
248–49; state sponsorship of,
171–73,
248; Sunni-Shiite conflict and,
102–3; used as counterterrorist strategy,
183–85,
223–24,
228–29; used as terrorist strategy,
134,
138,
152,
154,
162–71.
See also cyberterrorism
Hamas,
23,
35,
80–91,
98–100; chatrooms and,
33; conflict with al-Qaeda,
98–100; cyberterror and,
172; e-marketing and,
80–91; foreign backing of,
89–90; fundraising activities of,
35,
89–90; global websites of,
81–82,
89,
238; Google Earth and,
29; Iranian sponsorship of,
169,
172; Izz ad-Din al-Qassam Brigades,
59–60,
80,
87,
143,
144; Mecca Agreement and,
99n1; recruitment of children by,
53–54,
82; suicide attacks and,
59,
104–5,
111; women and,
59; YouTube and,
88,
91,
144
Harakat ul-Mujahideen,
35
Hassin, Nizar Hasan Saliman,
88
Heffelfinger, Christopher,
167–68
Hezbollah,
23,
97–98,
100–101,
165; computer games and,
55; cyberterror and,
165,
172; fundraising activities of,
35; Iranian sponsorship of,
169,
172; online debates and,
97–98,
100–101; social media and,
134–35,
139–40; Sunni-Shiite conflict and,
97–98,
102,
114
Homeland Security Project,
2,
177
Huffington Post, cyberattacks against,
163
Innocence of Muslims (film),
166n6
international collaboration,
243–47
Internet connectivity,
36
Iran: cyberterrorism and,
152,
169,
171–73; fatwas issued from,
109,
111; Hamas’ website and,
82; as sponsor of terrorism,
82,
90,
168–69,
169n7,
171–73; Stuxnet attack on,
162,
171
Iranian Cyber Army (ICA),
171–72
Iraq,
xi–xii,
23,
94–96; cyberwarfare in,
223; fatwas against Americans in,
116; Islamic State (IS) in,
3,
32,
55,
96–97; al-Qaeda in,
32,
41,
94–95,
100–101; as sponsor of terrorism,
168–69,
169n7; suicide bombings in,
58–59,
103; Sunni-Shiite conflict in,
101,
103; US war in,
26,
56,
116,
137,
197–98,
200
Islam: in counterterrorist narratives,
216–17,
219; fatwas regarding,
110,
112–14,
116–17; Internet and,
37,
113; jihad and,
20n2,
114,
120,
130,
181; jihadi narrative and,
197–200,
208–10; “radical” Islam,
26,
32,
69,
113,
123,
209; radicalization of terrorists and,
203,
209; sharia law,
103,
105,
114,
116,
122; suicide attacks and,
103–5,
120; Sunni-Shiite conflict within,
97,
101–3,
107; War on Terror perceived as war on Islam,
199–200,
202,
207,
211; women and,
58–59
Islamic Movement of Uzbekistan,
22
Israel: counterterrorism in,
184; cyberattacks against,
120,
134,
172; debates among terrorist groups and,
97–99; Dolphinarium bombing, Tel Aviv (2001),
54; fatwas against,
113,
116–17,
120; Hamas’ website and,
81–85; Israeli-Palestinian conflict,
83–85,
84n1,
200; jihadi narrative and,
197,
199–200; prisoner exchanges and,
100; suicide attacks on,
58–59,
84,
99,
103–4; terrorist attacks on,
16,
29,
33,
54,
116,
134–35; use of cyberterattacks by,
162; in video games,
55
Japan: American bombing of,
106; terrorist organizations in,
22
jihad,
xii,
114,
120,
130,
181; definition of,
20n2, jihadi media,
36–38; neojihadism,
196–201,
201–2,
206,
211; al-Qaeda and,
42
Jihadist Use of Social Media—How to Prevent Terrorism and Preserve Innovation (2011),
20–21
Joint Cyber Reserve Unit,
185
JPMorgan Chase, cyberattacks against,
163,
166
Kahane Lives movement,
23
Kandahari, Abu Shihab al-,
105
Kashmir,
105; terrorist organizations in,
22
Khobar attack (2004),
98–99
Kurdish Workers’ Party,
23
Liberation Tigers of Tamil Eelam,
22,
144
Libya: cyberterrorism and,
152; as sponsor of terrorism,
168–69,
169n7; terrorist organizations in,
22
LinkedIn Groups,
127,
236; government surveillance and,
236
London subway bombing (2005),
35
lone wolf terrorism,
xiii,
4–5,
11,
63–75; definition of,
64–65; al-Qaeda and,
69–73; recruitment of lone wolf terrorists,
20,
53,
73–75,
201; use of Internet by lone wolf terrorists,
11,
67–69
Madrid train bombing (2004),
35
Magic Lantern (surveillance program),
224,
230
Mandiant Corporation,
185
Maqdisi, Abu Muhammad al-,
117–20
Maqdisi, Abu al-Noor al-,
100
Masri, Abu Obeida al-,
160
McDonald’s, fatwas against,
119
Middle East Media Research Institute (MEMRI),
10,
122,
238–40
Mohammed, Khalid Sheikh,
206
Morocco, perception of al-Qaeda in,
211
Moro Islamic Liberation Front,
22
Moscow subway bombing (2010),
143
M.U.D. (Monitoring, Using, and Disrupting) model,
188–90
Muhajir, Amu-Hamzah al-,
94
Muhammad, Abdulhakim Mujahid,
65
Mumbai terrorist attacks (2008),
29,
34,
48
Muqrin, Abu Hajir al-,
30
narratives,
193–219; core violent radical “master” narrative,
197–99; counternarratives,
188,
210–19; neojihadism,
196,
201–2,
206,
211; radicalization and,
203–4; reception of,
202–10; “Say No to Terror” Campaign,
215–19; used for counterterrorism,
187
National Commission on Terrorist Attacks Against the United States (9/11 Commission),
2,
18–19,
107,
177
National Cyber Security Alliance (NCSA),
249–50
National Security Agency (NSA),
7,
49,
176,
225–29; Edward Snowden and,
30,
223,
226–28; public approval of,
233–34,
237; public-private partnerships and,
250; surveillance program of,
223,
225–29,
233,
235,
237;
Netherlands,
5,
65,
184; hosting of terrorist websites in,
238
“New Jihad Encyclopedia,”
106
New York Times: coverage of terrorism in,
30,
48–49; cyberattacks on,
163,
185; NSA spy scandal and,
226
noise (in communication theory),
8,
11,
178–88,
190–92,
212; mechanical and technological noise,
179,
183–85,
191; in M.U.D. model,
190–91; psychological and social noise,
179,
185–88,
191; use in counterterrorism,
180–88,
191–92
North Korea: cyberterrorism and,
152; as sponsor of terrorism,
168–69,
169n7
Norway shootings (2011),
64,
67
Nukhbat al-I’lam al-Jihadi,
130
al-Nusra Media Battalion,
31
Obama, Barack,
63,
142,
228–31,
234; fictional attack on,
138,
163; NSA spying scandal and,
228–30,
233,
237
Oklahoma City bombing (1995),
64
online debates,
93–108; counterterrorism and,
106–8; between Hamas and al-Qaeda,
98–100; within Hezbollah,
97–98; between Hezbollah and other groups,
100–101; within al-Qaeda,
94–97; Shiite-Sunni conflict and,
101–3; suicide attacks and,
95,
103–5; weapons of mass destruction (WMDs) and,
105–6
online forums,
4,
18,
27,
38–39,
41,
132; counterterrorism and,
145,
176,
183,
189–90,
215; debates on,
96–97,
100–101; Hamas’ use of,
80,
82,
85,
87; hosting of,
238,
240; lone wolf terrorism and,
67,
178; al-Qaeda’s use of,
41–42,
141; social media and,
129,
131–33,
137,
141–42; training on,
31–32,
160,
166; weapons of mass destruction (WMDs) and,
105–6; women and,
58–59,
208
online indoctrination,
24,
28
PAIS International,
46–47
Pakistan,
59,
71,
134,
164,
205–6; Hamas’ website and,
81; Internet connectivity in,
36; perception of al-Qaeda in,
202,
211; al-Qaeda in,
2,
27,
41; terrorist organizations in,
22,
24,
35
Palestine,
42,
56,
59,
99,
104,
111; debates among terrorist groups and,
98,
100; Hamas’ website and,
81–84; Israeli-Palestinian conflict,
54,
83–85,
84n1,
200; jihadi narrative and,
200; terrorist organizations in,
23
Pantucci, Raffaelo,
67–68
permanent denial-of-service (PDoS) attacks,
159
political Internet campaigns,
186–87
propaganda,
23–25,
37,
128,
192,
246; botnets and,
156; counterpropaganda,
185–86; narratives and,
193,
196,
199; al-Qaeda and,
39–40,
66,
69–70,
73; social media used for,
133,
135,
138–39,
141–42,
145; used for recruitment,
27–28
psychological operations (PSYOP),
185–86
public-private partnerships (PPPs),
247–52
al-Qaeda,
1–2,
5–6,
38–45,
94–97,
98–100,
211; changing tactics of,
5–6,
30,
32,
38,
69,
128; computer games produced by,
54–56; conflict with Hamas,
98–100; conflict with Hezbollah,
100–102; core narrative of,
196–98,
200,
210,
211; counterterrorist activities against,
107,
183–84,
225–26; cyberterror and,
164–65,
167; data mining and,
28–29; fatwas and,
114,
115; Gadahn, Adam Yahiye, and,
204–5; global presence of,
2,
22–23,
41; Hasan and,
206–7; identity theft and,
184;
Inspire magazine,
26,
30,
32–33,
68,
70–74,
139,
143; internal debates of,
94–97; Islamic State (IS) and,
96–97; lone wolf terrorism and,
66,
69–73; NSA controversy and,
225–26; online training and,
30–31; psychological warfare and,
24; public perception of,
202,
211; recruitment and,
27,
38,
44,
70,
118,
197; recruitment of children by,
28; September
11, 2001, terrorist attacks and,
16–17,
19,
24,
33; Sunni-Shiite divide and,
102; use of Internet by,
9–10,
19,
28,
38–42,
167; use of social media,
xii,
38,
42–45,
135–36,
139; website hosting of,
238–39
al-Qaeda Electronic Army,
167
Al-Qaeda in the Islamic Maghreb (AQIM),
xii,
22,
28,
32,
41,
43,
44,
56,
101,
115,
139
radicalization,
2,
26,
68,
181,
196–97,
203,
205; of children and youth,
5,
57,
85,
132,
209; computer games and,
54; counter-radicalization,
176–77,
182,
187,
210,
213–14; of “homegrown” terrorists,
203,
205–6; of lone wolf terrorists,
xiii,
5,
11,
64,
68,
75,
207; narratives and,
193,
196–97,
199–200,
210; self-radicalization,
2,
26,
64,
75,
125,
197; social media and,
19,
125,
128,
132,
142–43,
207; use of Internet for,
6,
10–11,
18–19,
23,
26,
37,
67,
85,
130,
177,
201
recruitment,
10,
24,
26–28,
73–75; of children,
28,
56–57,
61,
128–29,
148; counterterrorism and,
184–85,
210,
246; cyberterrorism and,
149,
152,
154,
165,
167–68,
170–71; funnel stage of,
75,
203; inspired by al-Awlaki,
20; of lone wolf terrorists,
64,
73–75; narratives and,
196–97,
199; by al-Qaeda,
38,
44,
70,
118,
197; self-recruitment,
44; use of Internet for,
18–19,
38,
73–75,
128,
145,
201; use of social media for,
6,
27,
44,
132,
141,
145; of women,
57–59,
61,
148
Regions Financial Corporation, cyberattacks against,
166
Rhetoric (Aristotle),
212
Riyadh Conference on the Use of the Internet to Counter the Appeal of Extremist Violence (2011),
187–88
Rushdie, Salman: fatwa against,
109,
111
Russia,
5,
64,
244; counterterrorism in,
184; cyberattacks originating from,
155; Hamas’ website and,
81,
84,
87; Moscow subway bombing (2010),
143
Salafi Group for Call and Combat,
115–16
Salem, Mohammad bin Ahmad al-,
37
Satanic Verses, The (Rushdie),
109,
111
Saudi Arabia,
23,
94,
216; in counterterrorist narratives,
216–17; cyberattacks on,
162,
169; fatwas originating in,
103,
105,
114,
116,
122; Khobar attack (2004),
98–99; al-Qaeda and,
94,
112; support for Hamas,
89–90; in terrorist narratives,
197
“Say No to Terror” Campaign,
215–19
SCADA (supervisory control and data acquisition) systems,
157–59,
166
September
11, 2001, terrorist attacks: communication and,
16–17; counterterrorist measures enacted after,
222–26,
230–31; data security and,
29; planning of,
19,
33; as psychological warfare,
24
Shamukh al-Islam forum,
38,
41,
44
Shanqiti, Abu al-Mundhir al-,
117–18
Sheik, Abd al-Aziz Bin Abdallah al-,
103
Shuyabi, Hammoud al-Uqla al-,
116
SITE Intelligence Group,
10,
31
SMS (Short Message Service) text communications,
22
social media,
xii–xiii,
19,
22,
38,
125–46; cyberattacks against,
138,
163; definition of,
126–28; Facebook,
131–37; free speech issues,
140,
145; ownership of,
238; al-Qaeda’s use of,
xii,
39,
42–45; terrorists’ use of,
xii,
128–31; Twitter,
137–41; used for counternarratives,
215; used for fund-raising,
34; used for recruitment,
6,
27,
44,
128–29,
132,
141,
145; YouTube,
141–45.
See also Facebook;
MySpace;
YouTube
South Korea, cyberattacks against,
163
Spain,
23,
65; Madrid train bombing (2004),
35
strategic communication planning,
180–83
Stuxnet computer worm,
162,
171
suicide bombings,
54,
98,
103–5,
120–publications on,
46–48; Bali
22,
204; contrasted with bombings (2002),
35,
103,
168,
197; cyberterrorism,
153,
171; counter-Boston Marathon bombing,
26; fatwas and,
122; counterterrorism cyberattack on Estonia (2007),
155; and,
188,
190; fatwas and,
109,
113, Dolphinarium bombing, Tel Aviv
115,
119–23; online debate over,
95, (2001),
54; Fort Hood shooting
103–5,
103n2,
120–22,
206; Twitter (2009),
27,
64,
198–99,
206; and,
139; in video games,
28; women Frankfurt airport killings (2011),
125, and,
58–59,
99
Suntrust Bank, cyberattacks against,
166
Suri, Abu Musab al-,
42,
69,
73,
102,
106; surveillance,
221–27,
230–33; attempts to reform,
227,
234,
235–36; carried out by NSA,
223,
225–29,
233,
235,
237; civil liberties and,
224,
230–32; leading to convictions,
225; principles guiding regulation of,
236–37
Syria,
xi–xii,
23,
96–98,
114–15,
135–
36,
139; al-Qaeda in,
2,
96–97; cyberterrorism and,
152,
169–70; Hezbollah in,
97–98,
135; Islamic State (IS) in,
3,
96–97; as sponsor of terrorism,
168–69,
169n7
Tahawy, Abdallah el-,
112
Tailored Access Operations (TAO),
228–29
Tartusi, Abu Baseer al-,
95,
122
Tehreek-e-Taliban Pakistan group,
143
Terror on the Internet: The New Arena, the New Challenges (Weimann),
xi,
xii,
52,
253
terrorist attacks,
2; academic publications on,
46–48; Bali bombings (2002),
35,
103,
168,
197; Boston Marathon bombing,
26; cyberattack on Estonia (2007),
155; Dolphinarium bombing, Tel Aviv (2001),
54; Fort Hood shooting (2009),
27,
64,
198–99,
206; Frankfurt airport killings (2011),
125,
207; inspired by al-Awlaki,
20; Khobar attack (2004),
98–99; London subway bombing (2005),
35; lone wolf terrorism and,
64–65; Madrid train bombing (2004),
35; media interest in,
48–50; Moscow subway bombing (2010),
143; Mumbai terrorist attacks (2008),
29,
34,
48; Munich Olympic Games (1972),
16; Norway shootings (2011),
64,
67; Oklahoma City bombing (1995),
64; September 11 attacks (2001),
16–17,
24,
33; suicide bombings,
59; used as communication,
15–17; Westgate mall attack, Nairobi (2013),
138; Woolwich attack (2013),
66; World Trade Center bombing (1993),
111
terrorist websites,
xiii,
4,
9–10,
18,
22,
38,
78–91,
165; brand migration,
86–87; channel structure modifications,
90–91; counterterrorist actions against,
145,
176,
183–85,
187,
189–90; debates on,
94–96,
98–101,
105–6; emergence of,
18,
36; fatwas and,
111–13,
116–19,
122; games on,
28; global spread of,
xiii,
22–23,
81–82; Hamas’ use of,
53–54,
80–91; Hezbollah’s use of,
35; hosting of,
87,
128,
238–40,
244–45; lone wolf terrorism and,
68–69; monitoring of,
8,
126,
148,
176,
183,
189; narratives and,
193,
200; online indoctrination and,
26; organizational support,
88; outsourcing,
87–88; positioning and differentiation,
85; potential users of,
80–85; al-Qaeda’s use of,
24,
33,
38–42,
136; recruitment of children and,
53–54,
57; resource allotment,
89–90; resourcing,
85–86; self-policing by hosts,
238–43; social media and,
127,
128,
132,
138,
141–44,
207; Sunni-Shiite conflict and,
102–3; terrorists’ use of e-marketing,
78,
80–91; used for fund-raising,
35; used for propaganda,
25,
40; used for recruitment,
26–27; women and,
57–60.
See also social media
Terror on the Internet Project,
8–11
“theater of terror,”
16–17
Time magazine, cyberattacks against,
169
Transportation Security Administration (TSA),
235–36; public-private partnerships and,
250–52
Twitter,
xii,
11,
38,
127,
137–41,
238; counterterrorism and,
215; cyberattacks against,
138,
163,
169,
171; government surveillance and,
236–37,
250; hacking of Twitter accounts,
163,
169,
171; public-private partnerships and,
250; social media marketing and,
78; terrorists’ use of,
xii,
11,
18,
39,
42–45,
88,
101,
126,
136–41,
145; used for recruiting,
27,
74
United Nations (UN),
7,
111,
135,
245; United Nations Action to Counter Terrorism,
6–7; United Nations Counter-Terrorism Implementation Task Force,
35,
187–88; United Nations Office on Drugs and Crime (UNODC),
25,
245–46; United Nations Security Council,
3,
107,
118–19,
246–47
United Kingdom,
3,
5,
135,
165; counterterrorism in,
184–85,
210,
212–13; “homegrown” terrorists in,
203; hosting of terrorist websites in,
238; jihadi narrative and,
197,
202,
204; London subway bombing (2005),
35; lone wolf terrorism in,
65,
69,
70; Muslims in,
202–3; Woolwich attack (2013),
66
United States: Boston Marathon bombing,
26; cyberattacks against,
172–73; fatwas against,
116; Fort Hood shooting (2009),
27,
64,
198–99,
206; “homegrown” terrorists in,
203–9; hostility to Islam of,
202; hosting of terrorists’ websites in,
87,
238–40,
244–45; international perception of,
2,
211; jihadi narrative and,
197,
202; lone wolf terrorism in,
65; Muslims in,
202,
207–8; need for international collaboration,
243–44; Oklahoma City bombing (1995),
64; September 11 attacks (2001),
16–17,
24,
33; use of cyberterattacks,
162,
171; use of social media in,
127; US war in Iraq,
26,
56,
116,
137,
197–98,
200; weapons of mass destruction and,
106; World Trade Center bombing (1993),
111
US Agency for International Development (USAID), public-private partnerships and,
251–52
Verizon, public-private partnerships and,
251–52
Voice of America, cyberattacks against,
172
War on Terror,
1–3; international collaboration,
243–47; NSA controversy and,
225–29; perceived as war on Islam,
199–200,
202,
207,
211; USA PATRIOT Act,
222,
224–25,
235.
See also counterterrorism
Washington Post: coverage of terrorism in,
48–49; cyberattacks on,
169; NSA spy scandal and,
226,
228,
233
Westgate mall attack, Nairobi (2013),
138
Wikileaks disclosures,
30
women,
57–61; lone wolf terrorism and,
67; online fatwas and,
114–15,
117; online recruitment of,
57–59,
61,
148; as suicide bombers,
58–59,
99; as targets of terrorist attacks,
60,
74
Woolwich attack (2013),
66
World Trade Center bombing (1993),
16,
111
Yahoo!,
240; censorship of offensive material on,
244; cyberattacks against,
160; de-encryption and,
227; government surveillance and,
236; public-private partnerships and,
250
Yassin, Sheik Ahmed,
81,
82
Yemen: counterterrorism in,
184; terrorist organizations in,
2,
23,
41
YouTube,
xii,
127,
141–45; AqsaTube,
88,
144; counterterrorism and,
45,
188,
215,
219; Hamas’ use of,
88,
91,
144; monitoring of content on,
145; al-Qaeda and,
38–39,
45; regulation of,
237; social media marketing and,
78; used by “lone wolves,”
67–69; used for recruiting,
74,
208; used to distribute terrorist messages,
4,
11,
18,
20–21,
32,
38–39,
43,
45,
59,
125–26,
129,
132,
141–45,
160,
167,
238; and “YouTube Invasion,”
142
Zarqawi, Abu Musab al-,
94–95
Zawahiri, Ayman al-,
3,
45,
96–97,
112,
197,
210; appeals for money from,
35; Hamas and,
99–100; hunt for,
44; jihadist attacks on,
97; on weapons of mass destruction (WMD),
105,
123; Umayma Hassan and,
57–58