Index
Page numbers refer to the print edition but are hyperlinked to the appropriate location in the e-book.
Abab, Abu Zubeir Adil al, 95
Abdaly, Taimour Abdulwahab al-, 67
Abdo, Naser Jason, 70, 72
Afghan Cyber Army, 133–34
Afghanistan, xi, 111, 115, 133–34, 197, 210; al-Qaeda and, 29, 38, 164, 210; social media and, 133–34, 140–41; suicide bombings in, 58–59; US war in, 197–98
Ahmed, Mohammed Sharfaraz, 72
Ajlawni, Yasir al-, 114–15
Algeria: jihad in, 115–16, 119; terrorist organizations in, 22
Ali, Hamid Abdallah Ahmad al-, 118–19
Amara, Zakaria, 209
Amazon, 160
Amble, John Curtis, 43
American Express, 162–63
Ancheta, Jeanson, 156n3
Anderson, Ross, 183
anonymity, 18, 21, 31, 33, 153, 175
Ansar al-Sharia, xii, 95, 133
Ansari, Abu-Hamzah al-, 94–95
Ansar al-Islam, 23, 105, 133
Ansar al-Mujahideen forum, 38, 44, 55, 132–33, 144
AQAP. See Al-Qaeda in the Arabian Peninsula
AQIM. See Al-Qaeda in the Islamic Maghreb
al-Aqsa Martyrs’ Brigades, 23, 169
AqsaTube, 88, 144
Aramco, 162
Aristotle, 212
Armata Corsa, 23
Arquilla, John, 4, 21, 185, 229
Arshad, Umar, 72
Assad, Bashar al-, xii, 114–15, 135–36, 170
Atta, Mohammed, 33–34
Aum Shinrikyo, 22
Awlaki, Anwar al-, 20, 37, 70, 74, 143, 206, 239; Hasan and, 206–7; influence of, 26, 67–68, 73–74, 143; use of social media, 143
Azdi, Abu Jandal al-, 94
Azzam, Abdullah, 37, 114n1, 197, 201
Azzam al-Amriki (“Azzam the American”). See Gadahn, Adam Yahiye
Azzam Publications, 38–39
 
Baghdadi, Abu Bakr al-, 3, 96
Bajadin, Abdullah Dhu al-, 31
Balawi, Humam al-, 44
Bali bombings (2002), 35, 103, 168, 197
Balkhi, Abdulqahar, 140–41
Bamford, James, 226
Bank of America: cyberattacks against, 160, 166; public-private partnerships and, 251–52
Bar, Abu Omar Abdul, 58
Bar, Shmuel, 110, 113
Bari, Abel Abdel, 114
Basque ETA movement, 23
al-Battar Media Battalion, 130
Al-Battar Training Camp magazine, 31, 238
Baum, Robert, 72
Berg, Nicholas, 48
Bergin, Anthony, 128–29
bin Laden, Osama, 2, 37, 164, 196, 210; 9/11 terrorist attacks and, 16–17; appeals for money from, 35; books about, 94; fatwas issued by, 112
Bitawi, Hamed al-, 103–4
Black Ice: The Invisible Threat of Cyber-Terrorism (Verton), 5, 28
blogs, 38, 42, 127, 211; counterterrorism monitoring of, 189, 191; terrorists’ use of, 22, 39, 43, 64, 87, 176, 206
Boeing, 251–52
Boko Haram, xii
Boston Marathon bombing (2013), 26, 66; inspired by Inspire magazine, 32–33, 73
botnets, 155–57, 156n3, 159
Breivik, Anders Behring, 67
Brigades of Tariq ibn Ziyad, 165
Brock, Timothy C., 195
Bunt, Gary, 36–37, 111
Busch, Nathan E., 248
Bush, George W., 196, 222; NSA controversy and, 225–27, 233
 
“A Call to Arms” (video), 69–70
Canada, 5, 65, 209–10, 225; hosting of terrorist websites in, 87
Carnivore, 222–23
Casebeer, William, 210
Central Intelligence Agency (CIA), 7, 44, 165, 176; public-private partnerships and, 250–52
Chaffey, Dave, 78, 80–81, 85–86, 91
chatrooms, 4, 19, 22, 36, 106, 168, 238; counterterrorism and, 186, 191; monitoring of, 9, 183, 190; al-Qaeda and, 39; recruiting in, 27; used by “lone wolves,” 64; used for planning operations, 32–33
Chechnya, 22, 105
children and youth, 53–57; counterextremism education for, 178; impact of terrorism on, 218; online children’s magazines, 87; online fatwas and, 117; recruitment of, 28, 53–57, 61, 128–29, 148; as targets, 74
China, cyberattacks originating in, 185, 248–49
Choudhry, Roshonara, 67, 143
Christians: online fatwas against, 115–18, 239; War on Terror and, 211
Cilluffo, Frank J., 107–8, 164
Citigroup Citibank, cyberattacks against, 166
civil liberties, 221–47; counterterrorism and, 7–8, 177, 222–25, 229–31; freedom of expression, 25, 229–31, 244–45, 254; free speech on social media, 140, 145; NSA controversy and, 225–29; Obama on, 231; PATRIOT Act and, 225; surveillance and, 221, 230; trade-offs with security, 230–35. See also freedom of expression
Clapper, James R., Jr., 161–62
Clean IT Project (2012), 240–43
Clinton, Hillary, 183–84
cloud computing, 34
CNN: cyberattacks against, 160, 169; public-private partnerships and, 251–52
Coca-Cola, 119, 165
Cohen, Jared, 170
Collin Barry, 150
Colombia, 23
comic strips, 54
communication theory, 15, 212; “noise” and, 8, 11, 178–88, 190–92, 212; terrorism as communication, 15–17
computer games, 25, 28, 54–56, 185
computer network attacks (CNA), 156
computer viruses, 159, 162, 165, 171, 184
Conway, Maura, 48n9, 144–45
core violent radical “master” narrative, 197–201, 210; radicalization and, 203–4
Corman, Steven, 197
Council on Foreign Relations, 19, 89–90
counternarratives, 140–41, 188, 192, 193, 202, 210–19; “Say No to Terror” Campaign, 215–19
counterpropaganda, 185–86
counter-radicalization, 176–77, 182, 187, 210
Counterstrike: The Untold Story of America’s Secret Campaign in the War on Terror (Schmitt and Shanker), 223–24
counterterrorism, xiii, 6–8, 7, 175–92, 222–25; civil liberties and, 7–8, 177, 221–25; counternarratives and, 210–19; cyberterrorism and, 171, 176, 248–49; government recommendations for, 177–78; government spending on, 1–2; international collaboration in, 243–47; monitoring of “chatter,” 165; M.U.D. approach to, 188–92; online debates and, 106–8; public-private partnerships and, 247–52; resulting in smaller-scale attacks, 27; “Say No to Terror” Campaign, 215–19; sting operations and, 208; strategic communication planning in, 180–83; USA PATRIOT Act, 222, 224–25, 235; use of “noise” in, 179–88, 191–92. See also war on terrorism
credit card fraud, 35–36, 152
critical infrastructure protection, 248, 250
Cuba, 168–69, 169n7
Curtis, Alex, 65
Cutting Sword of Justice, 162
cybercrime, 35, 46, 150, 176; credit card fraud, 35–36, 152; identity theft, 35, 152, 184, 213; phishing, 35, 248
CyberPatriot, 185
cyberterrorism, 6, 10–11, 23, 149–73; appeal of, 152–54; botnets and, 156–57; contrasted with hacking, 151–52; counterterrorism and, 171, 176, 248–49; definition of, 6, 150–52; denial-of-service (DoS) attacks and, 159–61; fatwas and, 120; forms of, 154–61; likelihood of cyberterrorist attacks, 161–63; recruitment of cyberterrorists, 149, 152, 154, 165, 167–68, 170–71; SCADA systems and, 157–59; state sponsorship of, 168–73; Sunni-Shiite conflict and, 102–3; terrorists’ growing interest in, 164–67. See also hacking
 
dark web, 66, 66n1, 190–91
data mining, 24, 28, 223, 226
debates, virtual. See online debates
denial-of-service (DoS) attacks, 159, 161
deep web. See dark web
Denning, Dorothy, xvi, 150–51
Department of Homeland Security (DHS), 11, 64, 133, 162; public-private partnerships and, 248–52
Department of State, 1, 8, 9, 11, 90, 168–69, 184, 205, 238
Devon, Josh, 141–42
distributed denial-of-service (DDoS) attacks, 155, 156, 159–61, 166, 171
Dolphinarium bombing, Tel Aviv (2001), 54
Domestic Security Enhancement Act of 2003 (“PATRIOT II”), 224–25
Dropbox, 236
drug trafficking, 35, 115
Dynadot server, 238
 
EBSCO Information Services, 46–47
Egypt, 110, 136n2, 197; fatwas originating from, 110, 116, 120; Hamas and, 99; perception of al-Qaeda in, 202, 211; reaction to War on Terror in, 202, 211; terrorist organizations in, 22
electromagnetic pulses, 155
“Electronic Islamic Army,” 160
e-marketing, 77–91; benefits of, 78–79; Hamas’ use of, 80–91
Emde, Christian, 72
encryption technologies, 22, 33, 72, 224, 226–27; attempts to unlock, 224, 226–27
Estonia, cyberattack on, 155–56
Etzioni, Amitai, 230
 
Facebook, xii, 127, 131–37, 238; counterterrorism and, 188, 215, 227; de-encryption and, 227; encryption and, 227; Fatah and, 56; government surveillance and, 236–37; Hamas and, 88, 91; Hezbollah and, 134–35; monitoring of, 183; neutrality of, 140n3; public-private partnerships and, 250; regulation of, 236–37, 250; security certificates and, 172; social media marketing and, 78; used by “lone wolves,” 67, 178; used for planning terrorist attacks, 45; used for recruitment, 27, 45, 74, 128; used to distribute terrorist messages, xii, 4, 11, 18, 20–21, 32, 38–39, 43, 45, 64, 126–37, 140, 145, 160, 193
Fahd, Shaykh Naser bin Hamad al-, 105, 122–23
al-Fallujah forum, 32, 38, 100
al-Faloja forum, 58, 60, 132, 141–42
Farahat, Maryam, 59
Faraj, Muhammad abd-al-Salam, 201
Fatah, 23, 56, 84, 90, 99; Mecca Agreement and, 99n1
Al-Fateh (Hamas online children’s magazine), 53–54, 82, 87
fatwas, 10, 58, 109–23; against Christians, 115–18, 239; cyberterrorism and, 120; definition of, 110; legitimate actions and, 118–20; legitimate targets of, 115–19; Osama bin Laden and, 112–13; against Rushdie, 109, 111; “sexual jihad” fatwas, 114–15; suicide attacks and, 103n2, 104, 120–22; used to promote jihad, 58, 112–16; weapons of mass destruction (WMD) and, 105, 122–23
Federal Bureau of Investigation (FBI), 7, 26; cyberterrorism and, 161–62, 165, 170; Gadahn, Adam Yahiye, and, 205; Internet monitoring by, 176, 222–24; Loewen and, 208; public-private partnerships and, 251–52; Rahman and, 111; sting operations, 208; Tsarnaev brothers and, 26, 66
Feiz Mohammad, 26
Fisher, Ali, 138–39
flagging, 241
Flickr, xii, 127, 136, 145
Foreign Intelligence Surveillance Act (FISA) of 1978, 225, 225n3, 227; FISA Amendments Act (2008), 227
Fort Hood shooting (2009), 27, 64, 198–99, 206
forums. See online forums
France, 244; counterterrorism in, 184; Hamas’ website and, 82; terrorist attacks targeting, 5, 65, 166, 184
Frankfurt airport killings (2011), 125, 207
Franklin, Benjamin, 221
Freedman, Lawrence, 194, 198–99
freedom of expression, 229–31, 244–45, 254; terrorist online propaganda and, 25
freedom of information, 7, 229
Fuller, Graham, 199
fund-raising, 24, 34–36, 98; foreign funding of terrorist groups, 89–90; identity theft and, 184; use of Internet for, 6, 18, 19, 40, 142, 145; zakat and, 218
Furrow, Buford, 65
 
Gadahn, Adam Yahiye, 69–70, 97, 204–7
games, online. See computer games
Gartenstein-Ross, David, 203, 205
Gaya, Said, 209
Gaza, 23, 45, 137; Hamas in, 29, 33, 99n1; terrorist attacks originating from, 25, 45, 59, 99
Germany: counterterrorism in, 184; Frankfurt airport killings (2011), 125, 207; Munich Olympic Games (1972), 16; offensive websites and, 244; terrorist attacks targeting, 5, 16, 65, 207
Ghamdi, Na’if al-, 102
Givens, Austen D., 248
Global Islamic Media Front (GIMF), 40, 42, 54, 100
Golani, Abu Mohammed al-, 135–36
Goodall, H. L., 197
Google, 9, 46, 248; cyberattacks on, 165; de-encryption and, 227; government surveillance and, 226, 236; public-private partnerships and, 250–52
Google Earth, 4, 11, 29–30, 34, 88
Green, Melanie C., 195
Grossman, Laura, 203, 205
Guardian (London): cyberattacks against, 169; NSA spy scandal and, 228–29
 
HackerWatch, 154n2
hacking, 151, 164–73; fatwas regarding, 120; public-private partnerships and, 248–49; state sponsorship of, 171–73, 248; Sunni-Shiite conflict and, 102–3; used as counterterrorist strategy, 183–85, 223–24, 228–29; used as terrorist strategy, 134, 138, 152, 154, 162–71. See also cyberterrorism
hacktivism, 151–52, 167
Halverson, Jeffery, 197
Hamas, 23, 35, 80–91, 98–100; chatrooms and, 33; conflict with al-Qaeda, 98–100; cyberterror and, 172; e-marketing and, 80–91; foreign backing of, 89–90; fundraising activities of, 35, 89–90; global websites of, 81–82, 89, 238; Google Earth and, 29; Iranian sponsorship of, 169, 172; Izz ad-Din al-Qassam Brigades, 59–60, 80, 87, 143, 144; Mecca Agreement and, 99n1; recruitment of children by, 53–54, 82; suicide attacks and, 59, 104–5, 111; women and, 59; YouTube and, 88, 91, 144
Hamilton, Lee, 2, 177
Haniya, Ismail, 59–60, 99
Harakat ul-Mujahideen, 35
Harman, Jane, 163, 187
Hasan, Nidal, 27, 65–66, 69–70, 198–99, 206–7
Hassan, Umayma, 57–58
Hassin, Nizar Hasan Saliman, 88
Heffelfinger, Christopher, 167–68
Helfont, Samuel, 107
al-Hesbah forum, 38, 44, 57–61, 102
Hezbollah, 23, 97–98, 100–101, 165; computer games and, 55; cyberterror and, 165, 172; fundraising activities of, 35; Iranian sponsorship of, 169, 172; online debates and, 97–98, 100–101; social media and, 134–35, 139–40; Sunni-Shiite conflict and, 97–98, 102, 114
Hizb-ul Mujahideen, 22
Hoffman, Bruce, xi–xiii, 2, 176
Homeland Security Project, 2, 177
Hotmail, 72, 227
Huffington Post, cyberattacks against, 163
Hussain, Syed Farhan, 72
 
I2P Network, 33
identity theft, 35, 152, 184, 213
al-Ikhlas forum, 38, 60
India, 29, 58–59; Mumbai terrorist attacks (2008), 29, 34, 48
Indonesia, 42, 202, 211; Bali bombings (2002), 35, 103, 168, 197; Hamas’ website and, 82
information warfare, 185–86
Innocence of Muslims (film), 166n6
Inspire magazine, 26, 30, 32–33, 70–74, 139, 143; as inspiration for terrorist attacks, 68, 72–73
Instagram, xii, 43, 127, 145, 183, 238
interactive forums. See online forums
international collaboration, 243–47
Internet connectivity, 36
Internet marketing. See e-marketing
Iqbal, Zahid, 72
Iran: cyberterrorism and, 152, 169, 171–73; fatwas issued from, 109, 111; Hamas’ website and, 82; as sponsor of terrorism, 82, 90, 168–69, 169n7, 171–73; Stuxnet attack on, 162, 171
Iranian Cyber Army (ICA), 171–72
Iraq, xi–xii, 23, 94–96; cyberwarfare in, 223; fatwas against Americans in, 116; Islamic State (IS) in, 3, 32, 55, 96–97; al-Qaeda in, 32, 41, 94–95, 100–101; as sponsor of terrorism, 168–69, 169n7; suicide bombings in, 58–59, 103; Sunni-Shiite conflict in, 101, 103; US war in, 26, 56, 116, 137, 197–98, 200
Ireland, 23
ISI. See Islamic State (IS)
ISIL. See Islamic State (IS)
ISIS. See Islamic State (IS)
Islam: in counterterrorist narratives, 216–17, 219; fatwas regarding, 110, 112–14, 116–17; Internet and, 37, 113; jihad and, 20n2, 114, 120, 130, 181; jihadi narrative and, 197–200, 208–10; “radical” Islam, 26, 32, 69, 113, 123, 209; radicalization of terrorists and, 203, 209; sharia law, 103, 105, 114, 116, 122; suicide attacks and, 103–5, 120; Sunni-Shiite conflict within, 97, 101–3, 107; War on Terror perceived as war on Islam, 199–200, 202, 207, 211; women and, 58–59
Islamic Jihad, 23, 35, 105, 131, 169, 238
Islamic Movement of Uzbekistan, 22
Islamic State (IS), xi–xii, 2–3, 32, 55, 61, 96–97; debates within, 96–97
Islamic State of Iraq (ISI). See Islamic State (IS)
Islamic State of Iraq and the Levant (ISIL). See Islamic State (IS)
Islamic State of Iraq and al-Sham (ISIS). See Islamic State (IS)
Israel: counterterrorism in, 184; cyberattacks against, 120, 134, 172; debates among terrorist groups and, 97–99; Dolphinarium bombing, Tel Aviv (2001), 54; fatwas against, 113, 116–17, 120; Hamas’ website and, 81–85; Israeli-Palestinian conflict, 83–85, 84n1, 200; jihadi narrative and, 197, 199–200; prisoner exchanges and, 100; suicide attacks on, 58–59, 84, 99, 103–4; terrorist attacks on, 16, 29, 33, 54, 116, 134–35; use of cyberterattacks by, 162; in video games, 55
Israeli-Palestinian conflict, 83–85, 84n1, 200
Italy, 5, 65, 184
Izz ad-Din al-Qassam Brigades, 59–60, 80, 82, 87, 143, 144; Izz ad-Din al-Qassam Cyber Fighters, 160, 166. See also Hamas
 
Jabhat al-Nusra. See al-Nusra Front
Jacobson, Michael, 212–13
Jama’at al-Jihad, 110
Jamal, Razzaq al-, 133
Japan: American bombing of, 106; terrorist organizations in, 22
Jemaah Islamiyah, 35
Jenkins, Brian, 15, 40–41
jihad, xii, 114, 120, 130, 181; definition of, 20n2, jihadi media, 36–38; neojihadism, 196–201, 201–2, 206, 211; al-Qaeda and, 42
jihadi narratives, 196–201
Jihadist Use of Social Media—How to Prevent Terrorism and Preserve Innovation (2011), 20–21
“Jihad Jane.” See LaRose, Colleen
Johnson, Jeh, 64
Joint Cyber Reserve Unit, 185
Jongman, Albert, 8–9
Jordan, 202; suicide bombings in, 58–59
JPMorgan Chase, cyberattacks against, 163, 166
Jund Ansar Allah, 100
 
Kahane Lives movement, 23
Kandahari, Abu Shihab al-, 105
Kaplan, Eben, 19
Kaplow, Louis, 232
Kashmir, 105; terrorist organizations in, 22
Katz, Mark, 2, 97
Katz, Rita, 141–42
Kean, Tom, 2, 177
Kenya. See Westgate mall attack, Nairobi (2013)
Khalid, Saad, 209
Khan, Samir, 27, 70
“Khattab 76,” 44
Khobar attack (2004), 98–99
Khomeini, Ruhollah, 109, 111
King, Meg, 163
Kohler, Jeff, 153n1
Kohlmann, Evan, 4, 20, 43–44, 129
Kumar, Nirmalya, 85–86
Kurdish Workers’ Party, 23
 
Lal, Vinay, 17
Langford, Duncan, 175
LaRose, Colleen, 67, 143, 207–8
Lashkar-e-Taiba, 22, 35, 48, 68
Lebanon, 23, 56, 97, 101
Lentini, Peter, 201
Liberation Tigers of Tamil Eelam, 22, 144
Libya: cyberterrorism and, 152; as sponsor of terrorism, 168–69, 169n7; terrorist organizations in, 22
LinkedIn Groups, 127, 236; government surveillance and, 236
Loewen, Terry, 208–9
London subway bombing (2005), 35
lone wolf terrorism, xiii, 4–5, 11, 63–75; definition of, 64–65; al-Qaeda and, 69–73; recruitment of lone wolf terrorists, 20, 53, 73–75, 201; use of Internet by lone wolf terrorists, 11, 67–69
Lyon, David, 230
 
Madrid train bombing (2004), 35
Magic Lantern (surveillance program), 224, 230
Maimon, Mosheh ben, 234
Malaysia, 42, 87
Malik, Kenan, 111
Mandiant Corporation, 185
Mantel, Barbara, 240
Maqdisi, Abu Muhammad al-, 117–20
Maqdisi, Abu al-Noor al-, 100
Masri, Abu Jihad al-, 69
Masri, Abu Obeida al-, 160
McCants, William, 3
McConnell, Michael, 162
McDonald’s, fatwas against, 119
Mecca Agreement, 99n1
Metzger, Tom, 65
Middle East Media Research Institute (MEMRI), 10, 122, 238–40
Mir, Hamad, 164
mobile phones, 22, 32, 34, 139, 229
Mohajroon forum, 101
Mohammed, Khalid Sheikh, 206
Mojahedin-e Khalq, 23
Morocco, perception of al-Qaeda in, 211
Moro Islamic Liberation Front, 22
Moscow subway bombing (2010), 143
Moveon.org, 186–87
M.U.D. (Monitoring, Using, and Disrupting) model, 188–90
Mueller, John, 1
Mueller, Robert S., 154, 161, 165, 170
Muhajir, Amu-Hamzah al-, 94
Muhammad, Abdulhakim Mujahid, 65
Mukhdhab, Yaman, 165–66
Mumbai terrorist attacks (2008), 29, 34, 48
Munich Olympic Games, 16
Muqrin, Abu Hajir al-, 30
Muslim Brotherhood, 29, 59, 104, 107, 120, 210
“Muslim Mali,” 28, 56–57
Mustafa, Abu Ibrahim, 115–16
MySpace, 11, 38, 42–43, 67, 128, 134, 208
 
Nakba, 82
narratives, 193–219; core violent radical “master” narrative, 197–99; counternarratives, 188, 210–19; neojihadism, 196, 201–2, 206, 211; radicalization and, 203–4; reception of, 202–10; “Say No to Terror” Campaign, 215–19; used for counterterrorism, 187
narrowcasting, 11, 27, 53–61, 129; targeting of children, 53–57; targeting of women, 57–61
Nasrallah, Hassan, 55, 100–102, 135
National Commission on Terrorist Attacks Against the United States (9/11 Commission), 2, 18–19, 107, 177
National Cyber Security Alliance (NCSA), 249–50
National Security Agency (NSA), 7, 49, 176, 225–29; Edward Snowden and, 30, 223, 226–28; public approval of, 233–34, 237; public-private partnerships and, 250; surveillance program of, 223, 225–29, 233, 235, 237;
neojihadism, 196, 201–2, 206, 211
Netanyahu, Benjamin, 172
Netherlands, 5, 65, 184; hosting of terrorist websites in, 238
netwar, 4, 150, 229
“New Jihad Encyclopedia,” 106
New York Times: coverage of terrorism in, 30, 48–49; cyberattacks on, 163, 185; NSA spy scandal and, 226
Nidal, Umm, 59–60
9/11 Commission. See National Commission on Terrorist Attacks Against the United States
noise (in communication theory), 8, 11, 178–88, 190–92, 212; mechanical and technological noise, 179, 183–85, 191; in M.U.D. model, 190–91; psychological and social noise, 179, 185–88, 191; use in counterterrorism, 180–88, 191–92
North Korea: cyberterrorism and, 152; as sponsor of terrorism, 168–69, 169n7
Norway shootings (2011), 64, 67
Nukhbat al-I’lam al-Jihadi, 130
al-Nusra Front, xi, 97, 114; use of social media, 43, 135–36, 139–40
al-Nusra Media Battalion, 31
Nye, Joseph, 180–81
 
Obama, Barack, 63, 142, 228–31, 234; fictional attack on, 138, 163; NSA spying scandal and, 228–30, 233, 237
Oklahoma City bombing (1995), 64
online debates, 93–108; counterterrorism and, 106–8; between Hamas and al-Qaeda, 98–100; within Hezbollah, 97–98; between Hezbollah and other groups, 100–101; within al-Qaeda, 94–97; Shiite-Sunni conflict and, 101–3; suicide attacks and, 95, 103–5; weapons of mass destruction (WMDs) and, 105–6
online fatwas. See fatwas
online forums, 4, 18, 27, 38–39, 41, 132; counterterrorism and, 145, 176, 183, 189–90, 215; debates on, 96–97, 100–101; Hamas’ use of, 80, 82, 85, 87; hosting of, 238, 240; lone wolf terrorism and, 67, 178; al-Qaeda’s use of, 41–42, 141; social media and, 129, 131–33, 137, 141–42; training on, 31–32, 160, 166; weapons of mass destruction (WMDs) and, 105–6; women and, 58–59, 208
online indoctrination, 24, 28
online magazines, 30–31, 87. See also Inspire magazine
online marketing. See e-marketing
online training. See virtual training
 
PAIS International, 46–47
Pakistan, 59, 71, 134, 164, 205–6; Hamas’ website and, 81; Internet connectivity in, 36; perception of al-Qaeda in, 202, 211; al-Qaeda in, 2, 27, 41; terrorist organizations in, 22, 24, 35
Palestine, 42, 56, 59, 99, 104, 111; debates among terrorist groups and, 98, 100; Hamas’ website and, 81–84; Israeli-Palestinian conflict, 54, 83–85, 84n1, 200; jihadi narrative and, 200; terrorist organizations in, 23
Pantucci, Raffaelo, 67–68
PATRIOT Act. See USA PATRIOT Act
PATRIOT II. See Domestic Security Enhancement Act of 2003
Paz, Reuven, 94–95, 104–5
Pearl, Daniel, 24
permanent denial-of-service (PDoS) attacks, 159
Peru, 23
Philippines, 22
phishing, 35, 248
Pimentel, Jose, 68–69, 70, 72, 130
Podesta, John, 229
political Internet campaigns, 186–87
Porter, Michael, 79
Post, Jerrold, 27
privacy, 230–31, 233
propaganda, 23–25, 37, 128, 192, 246; botnets and, 156; counterpropaganda, 185–86; narratives and, 193, 196, 199; al-Qaeda and, 39–40, 66, 69–70, 73; social media used for, 133, 135, 138–39, 141–42, 145; used for recruitment, 27–28
Prucha, Nico, 138–39
psychological operations (PSYOP), 185–86
psychological warfare, 23–24, 135, 181, 192
public-private partnerships (PPPs), 247–52
 
al-Qaeda, 1–2, 5–6, 38–45, 94–97, 98–100, 211; changing tactics of, 5–6, 30, 32, 38, 69, 128; computer games produced by, 54–56; conflict with Hamas, 98–100; conflict with Hezbollah, 100–102; core narrative of, 196–98, 200, 210, 211; counterterrorist activities against, 107, 183–84, 225–26; cyberterror and, 164–65, 167; data mining and, 28–29; fatwas and, 114, 115; Gadahn, Adam Yahiye, and, 204–5; global presence of, 2, 22–23, 41; Hasan and, 206–7; identity theft and, 184; Inspire magazine, 26, 30, 32–33, 68, 70–74, 139, 143; internal debates of, 94–97; Islamic State (IS) and, 96–97; lone wolf terrorism and, 66, 69–73; NSA controversy and, 225–26; online training and, 30–31; psychological warfare and, 24; public perception of, 202, 211; recruitment and, 27, 38, 44, 70, 118, 197; recruitment of children by, 28; September 11, 2001, terrorist attacks and, 16–17, 19, 24, 33; Sunni-Shiite divide and, 102; use of Internet by, 9–10, 19, 28, 38–42, 167; use of social media, xii, 38, 42–45, 135–36, 139; website hosting of, 238–39
al-Qaeda Electronic Army, 167
Al-Qaeda in Iraq, 3, 41, 94–97
Al-Qaeda in the Arabian Peninsula (AQAP), xii, 32, 41, 70, 72, 74, 95, 208
Al-Qaeda in the Islamic Maghreb (AQIM), xii, 22, 28, 32, 41, 43, 44, 56, 101, 115, 139
Qa’idat al Jihad, 94, 100, 104–5
Qaradawi, Yusuf al-, 104, 116–117, 121–22
al-Qassam Brigades, 59, 87, 143–44
Qatada, Abu, 113–14
Quilliam Foundation, 113, 212–13
Qutb, Sayyin, 197, 202
 
radicalization, 2, 26, 68, 181, 196–97, 203, 205; of children and youth, 5, 57, 85, 132, 209; computer games and, 54; counter-radicalization, 176–77, 182, 187, 210, 213–14; of “homegrown” terrorists, 203, 205–6; of lone wolf terrorists, xiii, 5, 11, 64, 68, 75, 207; narratives and, 193, 196–97, 199–200, 210; self-radicalization, 2, 26, 64, 75, 125, 197; social media and, 19, 125, 128, 132, 142–43, 207; use of Internet for, 6, 10–11, 18–19, 23, 26, 37, 67, 85, 130, 177, 201
Raffie, Dina al-, 199–200
Rahman, Fazul, 112
Rahman, Omar Abdel, 110–11
Rahum, Omar, 133
Raisman, Adam, 97
Raiyshi, Reem, 99
RAND Corporation, 10, 40–42, 65, 74
Ranstorp, Magnus, 201
Rantisi, Abd al-Aziz al-, 82, 104, 121–22
recruitment, 10, 24, 26–28, 73–75; of children, 28, 56–57, 61, 128–29, 148; counterterrorism and, 184–85, 210, 246; cyberterrorism and, 149, 152, 154, 165, 167–68, 170–71; funnel stage of, 75, 203; inspired by al-Awlaki, 20; of lone wolf terrorists, 64, 73–75; narratives and, 196–97, 199; by al-Qaeda, 38, 44, 70, 118, 197; self-recruitment, 44; use of Internet for, 18–19, 38, 73–75, 128, 145, 201; use of social media for, 6, 27, 44, 132, 141, 145; of women, 57–59, 61, 148
Regions Financial Corporation, cyberattacks against, 166
Rhetoric (Aristotle), 212
Ridge, Tom, 247
Riyadh Conference on the Use of the Internet to Counter the Appeal of Extremist Violence (2011), 187–88
Riyashi, Rim al-, 59
Ronfeldt, David, 4, 229
Rudolph, Eric, 65
Rumsfeld, Donald, 28–29, 211
Rushdie, Salman: fatwa against, 109, 111
Russell, James, 210
Russia, 5, 64, 244; counterterrorism in, 184; cyberattacks originating from, 155; Hamas’ website and, 81, 84, 87; Moscow subway bombing (2010), 143
 
Sadat, Anwar, 110
Saeed, Khaled, 136n2
Saffar, Hassan al-, 102
Sageman, Marc, 67
Salafi Group for Call and Combat, 115–16
Salem, Mohammad bin Ahmad al-, 37
Salem, Zaynab Abu, 54
Samudra, Imam, 35–36, 168
Sara, Khalil Abu, 45
Satanic Verses, The (Rushdie), 109, 111
Saudi Arabia, 23, 94, 216; in counterterrorist narratives, 216–17; cyberattacks on, 162, 169; fatwas originating in, 103, 105, 114, 116, 122; Khobar attack (2004), 98–99; al-Qaeda and, 94, 112; support for Hamas, 89–90; in terrorist narratives, 197
“Say No to Terror” Campaign, 215–19
SCADA (supervisory control and data acquisition) systems, 157–59, 166
Schmid, Alex P., 8–9, 200
Schmidt, Eric, 170
Second Life, 128
self-policing, 234, 238–40; Clean IT Project (2012) proposal, 240–43
self-radicalization, 2, 26, 64, 75, 125, 197
self-recruitment, 44
Sendero Luminoso, 23
September 11, 2001, terrorist attacks: communication and, 16–17; counterterrorist measures enacted after, 222–26, 230–31; data security and, 29; planning of, 19, 33; as psychological warfare, 24
“sexual jihad” fatwas, 114–15
Seyam, Saed, 99
al-Shabaab, xii, 22, 43, 138
Sham, Ariv al-, 45
Shamukh al-Islam forum, 38, 41, 44
Shanqiti, Abu al-Mundhir al-, 117–18
sharia law, 110–11, 209, 211; suicide attacks and, 95, 103. See also fatwas
Shavell, Steven, 232
Sheik, Abd al-Aziz Bin Abdallah al-, 103
Shiite-Sunni conflict, xii, 97, 101–3, 107; fatwas and, 110
Shuyabi, Hammoud al-Uqla al-, 116
SITE Intelligence Group, 10, 31
Sit-Maryam, Mustafa. See Suri, Abu Musab al-
Slater, Michael, 194–95
Smith, Paul Russell, 78
SMS (Short Message Service) text communications, 22
Snowden, Edward, 223, 226–28
social media, xii–xiii, 19, 22, 38, 125–46; cyberattacks against, 138, 163; definition of, 126–28; Facebook, 131–37; free speech issues, 140, 145; ownership of, 238; al-Qaeda’s use of, xii, 39, 42–45; terrorists’ use of, xii, 128–31; Twitter, 137–41; used for counternarratives, 215; used for fund-raising, 34; used for recruitment, 6, 27, 44, 128–29, 132, 141, 145; YouTube, 141–45. See also Facebook; MySpace; YouTube
Somalia, 2, 22, 43
South Korea, cyberattacks against, 163
Spain, 23, 65; Madrid train bombing (2004), 35
Sri Lanka, 22, 58–59, 144
State Department. See Department of State
Stevenson, Robert, 244–45
Stewart, Mark G., 1
strategic communication planning, 180–83
Stuxnet computer worm, 162, 171
Sudan, 22, 152; as sponsor of terrorism, 168–69, 169n7
suicide bombings, 54, 98, 103–5, 120–publications on, 46–48; Bali 22, 204; contrasted with bombings (2002), 35, 103, 168, 197; cyberterrorism, 153, 171; counter-Boston Marathon bombing, 26; fatwas and, 122; counterterrorism cyberattack on Estonia (2007), 155; and, 188, 190; fatwas and, 109, 113, Dolphinarium bombing, Tel Aviv 115, 119–23; online debate over, 95, (2001), 54; Fort Hood shooting 103–5, 103n2, 120–22, 206; Twitter (2009), 27, 64, 198–99, 206; and, 139; in video games, 28; women Frankfurt airport killings (2011), 125, and, 58–59, 99
Sunni-Shiite conflict, xii, 97, 101–3, 107; fatwas and, 110
Suntrust Bank, cyberattacks against, 166
Suri, Abu Musab al-, 42, 69, 73, 102, 106; surveillance, 221–27, 230–33; attempts to reform, 227, 234, 235–36; carried out by NSA, 223, 225–29, 233, 235, 237; civil liberties and, 224, 230–32; leading to convictions, 225; principles guiding regulation of, 236–37
Syria, xi–xii, 23, 96–98, 114–15, 13536, 139; al-Qaeda in, 2, 96–97; cyberterrorism and, 152, 169–70; Hezbollah in, 97–98, 135; Islamic State (IS) in, 3, 96–97; as sponsor of terrorism, 168–69, 169n7
Syrian Electronic Army, 138, 163, 169–70
 
Taha, Ahmed Refai, 112
Tahawy, Abdallah el-, 112
Tailored Access Operations (TAO), 228–29
Taliban, xii, 115, 140–41
Tamil Tigers. See Liberation Tigers of Tamil Eelam
Tartusi, Abu Baseer al-, 95, 122
Tehreek-e-Taliban Pakistan group, 143
Teich, Sara, 65
Terror on the Internet: The New Arena, the New Challenges (Weimann), xi, xii, 52, 253
terrorism, definition of, 8–9, 245–46
terrorist attacks, 2; academic publications on, 46–48; Bali bombings (2002), 35, 103, 168, 197; Boston Marathon bombing, 26; cyberattack on Estonia (2007), 155; Dolphinarium bombing, Tel Aviv (2001), 54; Fort Hood shooting (2009), 27, 64, 198–99, 206; Frankfurt airport killings (2011), 125, 207; inspired by al-Awlaki, 20; Khobar attack (2004), 98–99; London subway bombing (2005), 35; lone wolf terrorism and, 64–65; Madrid train bombing (2004), 35; media interest in, 48–50; Moscow subway bombing (2010), 143; Mumbai terrorist attacks (2008), 29, 34, 48; Munich Olympic Games (1972), 16; Norway shootings (2011), 64, 67; Oklahoma City bombing (1995), 64; September 11 attacks (2001), 16–17, 24, 33; suicide bombings, 59; used as communication, 15–17; Westgate mall attack, Nairobi (2013), 138; Woolwich attack (2013), 66; World Trade Center bombing (1993), 111
terrorist “chatter,” 10, 148, 165, 200
terrorist websites, xiii, 4, 9–10, 18, 22, 38, 78–91, 165; brand migration, 86–87; channel structure modifications, 90–91; counterterrorist actions against, 145, 176, 183–85, 187, 189–90; debates on, 94–96, 98–101, 105–6; emergence of, 18, 36; fatwas and, 111–13, 116–19, 122; games on, 28; global spread of, xiii, 22–23, 81–82; Hamas’ use of, 53–54, 80–91; Hezbollah’s use of, 35; hosting of, 87, 128, 238–40, 244–45; lone wolf terrorism and, 68–69; monitoring of, 8, 126, 148, 176, 183, 189; narratives and, 193, 200; online indoctrination and, 26; organizational support, 88; outsourcing, 87–88; positioning and differentiation, 85; potential users of, 80–85; al-Qaeda’s use of, 24, 33, 38–42, 136; recruitment of children and, 53–54, 57; resource allotment, 89–90; resourcing, 85–86; self-policing by hosts, 238–43; social media and, 127, 128, 132, 138, 141–44, 207; Sunni-Shiite conflict and, 102–3; terrorists’ use of e-marketing, 78, 80–91; used for fund-raising, 35; used for propaganda, 25, 40; used for recruitment, 26–27; women and, 57–60. See also social media
Terror on the Internet Project, 8–11
“theater of terror,” 16–17
Time magazine, cyberattacks against, 169
Timms, Stephen, 67, 143
“Toronto 18,” 209–10
Tor Project, 33, 172
transportation, 195–96
Transportation Security Administration (TSA), 235–36; public-private partnerships and, 250–52
Truman, Harry S., 106
Tsarnaev, Dzhokhar and Tamerlan, 26, 33, 73. See also Boston Marathon bombing (2013)
Tunisian Cyber Army, 167
Túpac Amaru, 23
Turkey, 23, 58–59, 188; Hamas’ website and, 82, 84
Twitter, xii, 11, 38, 127, 137–41, 238; counterterrorism and, 215; cyberattacks against, 138, 163, 169, 171; government surveillance and, 236–37, 250; hacking of Twitter accounts, 163, 169, 171; public-private partnerships and, 250; social media marketing and, 78; terrorists’ use of, xii, 11, 18, 39, 42–45, 88, 101, 126, 136–41, 145; used for recruiting, 27, 74
 
Uka, Arid, 125–26, 227
Umarov, Doku, 143
Unabomber, 64
United Nations (UN), 7, 111, 135, 245; United Nations Action to Counter Terrorism, 6–7; United Nations Counter-Terrorism Implementation Task Force, 35, 187–88; United Nations Office on Drugs and Crime (UNODC), 25, 245–46; United Nations Security Council, 3, 107, 118–19, 246–47
United Kingdom, 3, 5, 135, 165; counterterrorism in, 184–85, 210, 212–13; “homegrown” terrorists in, 203; hosting of terrorist websites in, 238; jihadi narrative and, 197, 202, 204; London subway bombing (2005), 35; lone wolf terrorism in, 65, 69, 70; Muslims in, 202–3; Woolwich attack (2013), 66
United States: Boston Marathon bombing, 26; cyberattacks against, 172–73; fatwas against, 116; Fort Hood shooting (2009), 27, 64, 198–99, 206; “homegrown” terrorists in, 203–9; hostility to Islam of, 202; hosting of terrorists’ websites in, 87, 238–40, 244–45; international perception of, 2, 211; jihadi narrative and, 197, 202; lone wolf terrorism in, 65; Muslims in, 202, 207–8; need for international collaboration, 243–44; Oklahoma City bombing (1995), 64; September 11 attacks (2001), 16–17, 24, 33; use of cyberterattacks, 162, 171; use of social media in, 127; US war in Iraq, 26, 56, 116, 137, 197–98, 200; weapons of mass destruction and, 106; World Trade Center bombing (1993), 111
US Agency for International Development (USAID), public-private partnerships and, 251–52
USA PATRIOT Act, 222, 224–25, 235
Usman, Ummu, 59
Uzbekistan, 22, 59
 
Vatis, Michael, 152
Verizon, public-private partnerships and, 251–52
Verton, Dan, 5, 28, 164
video games. See computer games
video-sharing sites, 176; AqsaTube, 88, 144; terrorists’ use of, 19, 22, 88; Vimeo, 43, 127; YouTube, 141–45. See also YouTube
Vilks, Lars, 67, 208
Vimeo, 43, 127
virtual training, 10, 24, 30–33
Viscusi, W. Kip, 232
Voice of America, cyberattacks against, 172
 
Wade, Lindsey, 231–32
War on Terror, 1–3; international collaboration, 243–47; NSA controversy and, 225–29; perceived as war on Islam, 199–200, 202, 207, 211; USA PATRIOT Act, 222, 224–25, 235. See also counterterrorism
Washington Post: coverage of terrorism in, 48–49; cyberattacks on, 169; NSA spy scandal and, 226, 228, 233
weapons of mass destruction (WMDs), 105–6, 122–23
Web 2.0, 42, 175. See also Facebook; MySpace; social media; Twitter; YouTube
web marketing. See e-marketing
websites. See terrorist websites
Weimann, Gabriel, xi–xiii, 48n9, 85
Westby, Jody, 176
Westgate mall attack, Nairobi (2013), 138
WhatsApp, xii, 238
Wikileaks disclosures, 30
Wilkinson, Paul, 15
women, 57–61; lone wolf terrorism and, 67; online fatwas and, 114–15, 117; online recruitment of, 57–59, 61, 148; as suicide bombers, 58–59, 99; as targets of terrorist attacks, 60, 74
Woolf, Virginia, 231
Woolwich attack (2013), 66
World Trade Center bombing (1993), 16, 111
 
Yahoo!, 240; censorship of offensive material on, 244; cyberattacks against, 160; de-encryption and, 227; government surveillance and, 236; public-private partnerships and, 250
Yassin, Sheik Ahmed, 81, 82
Yazid, Mustafa Abu, 60
Yemen: counterterrorism in, 184; terrorist organizations in, 2, 23, 41
youth. See children and youth
YouTube, xii, 127, 141–45; AqsaTube, 88, 144; counterterrorism and, 45, 188, 215, 219; Hamas’ use of, 88, 91, 144; monitoring of content on, 145; al-Qaeda and, 38–39, 45; regulation of, 237; social media marketing and, 78; used by “lone wolves,” 67–69; used for recruiting, 74, 208; used to distribute terrorist messages, 4, 11, 18, 20–21, 32, 38–39, 43, 45, 59, 125–26, 129, 132, 141–45, 160, 167, 238; and “YouTube Invasion,” 142
 
Zanna, Mark, 195
Zarqawi, Abu Musab al-, 94–95
Zawahiri, Ayman al-, 3, 45, 96–97, 112, 197, 210; appeals for money from, 35; Hamas and, 99–100; hunt for, 44; jihadist attacks on, 97; on weapons of mass destruction (WMD), 105, 123; Umayma Hassan and, 57–58
Zeckhauser, Richard, 232
Zelin, Aaron, 37, 39
Zimmerman, Roy, 29
Zubaydah, Abu, 33