Chapter 1:
1. Reuter, Christoph, “Secret Files Reveal the Structure of Islamic State,” Der Spiegel Online, April 18, 2015. http://www.spiegel.de/international/world/islamic-state-files-show-structure-of-islamist-terror-group-a-1029274.html
2. Johnson, Patrick B, “Countering ISIL’s Financing,” November 13, 2014. http://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT419/RAND_CT419.pdf
3. Irujo, José María, “Network of 250 Spanish butchers and phone shops funding jihadists in Syria,” El Pais, February 6, 2015, http://elpais.com/elpais/2015/02/02/inenglish/1422892172_955064.html
4. Moore, Jack, “Hawala: The Ancient Banking Practice Used to Finance Terror Groups,” Newsweek, February 24, 2015, http://www.newsweek.com/underground-european-hawala-network-financing-middle-eastern-terror-groups-307984?rx=us
5. U.S. Department of Defense, “Statement from Pentagon Press Secretary Peter Cook on Airstrike against ISISL Senior Leader,” Defense.Gov, September 16, 2016, http://www.defense.gov/News/News-Releases/News-Release-View/Article/946983/statement-from-pentagon-press-secretary-peter-cook-on-airstrike-against-isil-se
Chapter 2:
1. McKinsey Global Institute, “Big data: The next frontier for innovation, competition, and productivity,” http://www.mckinsey.com/~/media/McKinsey/Business%20Functions/Business%20Technology/Our%20Insights/Big%20data%20The%20next%20frontier%20for%20innovation/MGI_big_data_full_report.ashx
2. Arthur, Charles, “What’s a zettabyte? By 2015, the internet will know, says Cisco,” Guardian, June 2011, https://www.theguardian.com/technology/blog/2011/jun/29/zettabyte-data-internet-cisco
3. O’Connor, Clare. “How To Use Bitcoin To Shop At Amazon, Home Depot, CVS, and More,” Forbes, http://www.forbes.com/sites/clareoconnor/2014/02/17/how-to-use-bitcoin-to-shop-at-amazon-home-depot-cvs-and-more/#1f9ae9e86cd4, February 17, 2014
4. US v Ali Shukri Amin, “Criminal Complaint,” June 19, 2015
5. Greenberg, Andy, “Feds seize Silk Road 2 in major Dark Web drug bust,” Wired, https://www.wired.com/2014/11/feds-seize-silk-road-2/, November 06, 2014
6. Europol, “Global Action Against Dark Markets on Tor Network,” https://www.europol.europa.eu/content/global-action-against-dark-markets-tor-network, November 7, 2014
7. Vance, Cyrus, “Manhattan District Attorney’s Offices Applies Innovative Technology To Scan The ‘Dark Web’ In The Fight Against Human Trafficking,” Press Release, http://manhattanda.org/press-release/manhattan-district-attorney%E2%80%99s-office-applies-innovative-technology-scan-%E2%80%9Cdark-web%E2%80%9D-fig, February 09, 2016
Chapter 3:
1. Nance, Malcolm, Defeating ISIS: Who they are. How they fight. What they believe. Skyhorse Press, NY, NY, 2016
2. Alshech, Eli, Apelbaum, Jacob, “Behind the scenes of Virtual Jihad IV,” MEMRI report, March 03, 2010
3. Klatell, James, “Web’s ‘Jihadist James Bond’ Gets 10 Years,” July 5, 2007, http://www.cbsnews.com/news/webs-jihadist-james-bond-gets-10-years/
4. Clogherty, Jack, “Virtual Terrorism: Al Qaeda Video Calls for ‘Electronic Jihad,” ABC News, May 22, 2012, http://abcnews.go.com/Politics/cyber-terrorism-al-qaeda-video-calls-electronic-jihad/story?id=16407875
5. Cloherty, Jack, “Virtual Terrorism: Al Qaeda Video Calls for electronic jihad,” ABCNews, May 22, 2014, http://abcnews.go.com/Politics/cyber-terrorism-al-qaeda-video-calls-electronic-jihad/story?id=16407875
6. Magnusen, Stew. “Al-Qaeda may have plans to manipulate a hacking group,” National Defense Magazine, July 2012, http://www.nationaldefensemagazine.org/archive/2012/July/Pages/Al-QaidaMayHavePlanstoManipulateAnonymousHackingGroup.aspx
1. Bakunin, Mikhail. “Letters to a Frenchman on the Present Crisis,” https://www.marxists.org/reference/archive/bakunin/works/1870/letter-frenchman.htm, September 1870
2. Eunjung Cha, Ariana. “From a virtual shadow, messages of terror,” Washington Post, October 2, 2004, http://www.washingtonpost.com/wp-dyn/articles/A1570-2004Oct1.html
3. Eunjung Cha, Ariana. “From a virtual shadow, messages of terror,” Washington Post, October 2, 2004, http://www.washingtonpost.com/wp-dyn/articles/A1570-2004Oct1.html
4. Karadsheh, Jomana, Mahdi, Basim. “U.S. says terrorist in Jill Carroll kidnapping killed,” CNN, May 4, 2007, http://edition.cnn.com/2007/WORLD/meast/05/03/iraq.main/index.html
5. Abu Haniyeh, Hassan. “Daesh’s Organisational Struction,” Al Jazeera, December 4, 2014, http://studies.aljazeera.net/en/dossiers/decipheringdaeshoriginsimpactandfuture/2014/12/201412395930929444.html
6. Benson, Pam. “U.S.: Senior al Qaeda in Iraq leader held,” CNN.com, July 18, 2007, http://www.cnn.com/2007/WORLD/meast/07/18/iraq.capture/index.html?iref=topnews
7. Gleason, Carmen. “Security Forces, Citizens Decrease Violence in Iraq,” American Forces Press Service, http://archive.defense.gov/news/newsarticle.aspx?id=47965”, October 28, 2007
8. Kruzel, John. “Antiterrorism Successes Continue in Iraq Despite Foreign-Born Resistance,” American Forces Press Service, http://archive.defense.gov/news/newsarticle.aspx?id=46697, July 11, 2007
9. U.S. Department of Defense, “Statement from Pentagon Press Secretary Peter Cook on Airstrike against ISISL Senior Leader,” Defense.Gov, September 16, 2016, http://www.defense.gov/News/News-Releases/News-Release-View/Article/946983/statement-from-pentagon-press-secretary-peter-cook-on-airstrike-against-isil-se
10. Ryan, Missy. “Pentagon says Raqqa strike kills Islamic State information minister,” Washington Post, September 16, 2016, https://www.washingtonpost.com/news/checkpoint/wp/2016/09/16/u-s-strike-kills-another-senior-islamic-state-militant-official-says/
11. Whitehead, Craig. “Did it in ’06,” Twitter, September 16, 2016, https://twitter.com/CraigAWhiteside/status/776868890592751616
12. Abdulhaq, Ethar, “ISIS leaks: more about al-Absi, former mastermind, archive and biography,” April 18, 2016, https://en.zamanalwsl.net/news/15295.html
13. Enders, David, “Syria rebels say they killed leader of extremist group that kidnapped 2 journalists,” September 7, 2012, http://www.mcclatchydc.com/news/nation-world/world/article24736636.html
14. Mortada, Radwan, “Jihadis in Syria: The Cracks Start to Show,” October 3, 2012, http://english.al-akhbar.com/node/12796
15. Windrem, Robert, “ISIS says No. 2 leader Abu Muhammad al-Adnani is dead in Syria,” NBCNews, http://www.nbcnews.com/storyline/isis-terror/isis-says-no-2-leader-mohammad-al-adnani-dead-n640171, August 31, 2016
16. Reuters, “Who runs the militant group Islamic State?” http://www.reuters.com/article/us-mideast-crisis-is-penpix-idUSKCN0HT04J20141004, October 4, 2014
17. Callimachi, Rukmini, “How a Secretive Branch of ISIS built a Global Network of Killers,” New York Times, http://www.nytimes.com/2016/08/04/world/middleeast/isis-german-recruit-interview.html?_r=0, August 3, 2016
18. Callimachi, Rukmini, “How a Secretive Branch of ISIS built a Global Network of Killers,” New York Times, August 3, 2016, http://www.nytimes.com/2016/08/04/world/middleeast/isis-german-recruit-interview.html
Chapter 5:
1. Howell O’Neill, Patrick, “Creator of top jihadist online forum sentenced to 8 years in prison,” Daily Dot, http://www.dailydot.com/layer8/shumukh-al-islam-forum-arrest-sentenced/, April 7, 2016
2. France24, “France: maçon le jour, cyberjihadiste la nuit … prison confirmée pour un Tunisien,” May 04 2016
3. Zelin, Aaron, “New Statement from al-Fajr Media’s Technical Committee,” Jihadology, http://jihadology.net/2013/12/10/new-statement-from-al-fajr-medias-technical-committee-surprise-program-security-of-the-mujahid-for-safe-encrypted-communication/, December 10, 2013
4. Miller, Greg, Mekhennet, Souad, “Inside the surreal world of the Islamic State’s propaganda machine,” Washington Post, https://www.washingtonpost.com/world/national-security/inside-the-islamic-states-propaganda-machine/2015/11/20/051e997a-8ce6-11e5-acff-673ae92ddd2b_story.html, November 20, 2015
5. Threatwatch, “Admin of ISIS propaganda website has been hacked,” July 17, 2016, http://www.nextgov.com/cybersecurity/threatwatch/2016/07/user-accounts-compromised-spearphishing-data-dump/2692/
6. Hijrah to the Islamic State, pg 6
7. Hijrah to the Islamic State, pg 47
8. Department of Justice, “Pennsylvania resident charged with providing material support for ISIL,” https://www.justice.gov/opa/pr/pennsylvania-resident-charged-providing-material-support-isil, December 17, 2015
9. Krause, Kevin, “Mesquite man who pledged allegiance to ISIS sentenced to 4 years in prison,” May 25, 2016, http://crimeblog.dallasnews.com/2016/05/mesquite-man-who-lied-about-allegiance-to-isis-leader-given-4-years-in-prison.html/
10. Department of Justice, “Massachusetts man indicted on terrorism charges,” June 30, 2016, https://www.justice.gov/usao-ma/pr/massachusetts-man-indicted-terrorism-charges,
11. ADL, “Online activity provides insight into MA man arrested for ISIS plot,” ADL.org, July 13, 2015, http://blog.adl.org/extremism/alexander-ciccolo-ali-al-amriki-boston-ma-terror-isis
12. Cleary, Tom, “Alexander Ciccolo: 5 fast facts you need to know,” July 13, 2015, http://heavy.com/news/2015/07/alexander-ciccolo-ali-al-amriki-massachusetts-terrorism-suspect-son-boston-police-captain-isis-isil-arrested-charged-felon-photos-facebook/
13. ADL, “Online activity provides insight into MA man arrested for ISIS plot,” ADL.org, July 13, 2015, http://blog.adl.org/extremism/alexander-ciccolo-ali-al-amriki-boston-ma-terror-isis
14. Associated Press, “Boston police captain’s son indicted in ISIS-inspired plot,” July 1, 2016, http://nypost.com/2016/07/01/boston-police-captains-son-indicted-in-isis-inspired-plot/
15. Dickey, Christopher, “ISIS Terror killing in Paris streamed on Facebook live,” Daily Beast, June 14, 2016, http://www.thedailybeast.com/articles/2016/06/14/isis-terror-killing-in-paris-streamed-on-facebook-live.html
16. Pues, Viktoria, “The Islamic State on Tumblr-Recruiting Western Women,” International Institute for Counter-Terrorism, February 2016, https://www.ict.org.il/UserFiles/ICT-ISIS-on-Social-Media-Pues.pdf,
17. Crooks, Lauren, “Runaway British jihadi bride writes shocking suitcase checklist for schoolgirls wanting to join ISIS,” MirrorUK, http://www.mirror.co.uk/news/uk-news/runaway-british-jihadi-bride-writes-6179441, August 1, 2015
18. Yan, Holly, Elbagir, Nima “Authorities scramble to find teens before they join ISIS,” http://edition.cnn.com/2015/02/23/europe/uk-syria-missing-girls/index.html, February 23, 2015
19. Department of Justice, McNeil complaint, https://www.justice.gov/opa/file/792881/download
20. Mezzofiore, Gianluca, “ISIS boy executes ‘Israeli spy’: Toulouse killer Mohamed Merah’s step-brother appeared in Islamic State video,” March 11, 2015, http://www.ibtimes.co.uk/isis-boy-executes-israeli-spy-toulouse-killer-mohamed-merahs-step-brother-appeared-1491497
21. Prince, S.J. Heavy, “New ISIS video shows Russian FSB agent beheaded,” http://heavy.com/news/2015/12/new-isis-islamic-state-news-videos-pictures-fsb-federal-security-service-agent-spy-chechen-chechnya-russia-russian-moscow-vladimir-putin-raqqa-syria-full-uncensored-youtube-english-translation/, December 2, 2015
22. Tsetkova, Maria, “The double life of a Russian ‘spy’ beheaded by Islamic State,” Reuters, http://www.reuters.com/article/russia-syria-spy-idUSKBN0UC19U20151229, December 29, 2015
Chapter 6:
1. Teague Beckwith, Ryan, “Read the CIA Director’s Thoughts on the Paris Attacks,” Time Magazine online, http://time.com/4114870/paris-attacks-cia-john-brennan/ November 16, 2015
2. Dixon Kavanaugh, Shane, Shiloach, Gilad-Vocativ, “ISIS spreads violence and terror with ‘Foolproof’ App,” November 17, 2015
3. Tsotsis, Alexia, “Telegram Saw 8M Downloads after WhatsApp Got Acquired,” TechCrunch.com, https://techcrunch.com/2014/02/24/telegram-saw-8m-downloads-after-whatsapp-got-acquired/, February 24, 2014
4. Burns, Matt, “Encrypted Messaging App Telegram Hits 100M Monthly Active Users, 350K New users each day,” TechCrunch, https://techcrunch.com/2016/02/23/encrypted-messaging-app-telegram-hits-100m-monthly-active-users-350k-new-users-each-day/, February 23, 2016
5. Rotella, Sebastian, “ISIS via WhatsApp: ‘Blow Yourself Up, o Lion!’” https://www.propublica.org/article/isis-via-whatsapp-blow-yourself-up-o-lion, July 11, 2016
6. Sharafedin, Bozorghmehr, “Iran’s Revolutionary Guards target popular messaging app in widening crackdown,” Reuters, November 15, 2015
7. Rotella, Sebastian, “ISIS via WhatsApp: ‘Blow Yourself Up, o Lion!’” https://www.propublica.org/article/isis-via-whatsapp-blow-yourself-up-o-lion, July 11, 2016
8. Telegram, “Winter Contest Ends,” https://telegram.org/blog/winter-contest-ends, March 2, 2014
9. Telegram, “Crypto Contest Ends,” https://telegram.org/blog/cryptocontest-ends, February 11, 2015
10. Shiloach, Gilad, “ISIS Supporters Warn of Honey Traps on Telegram,” Vocativ, http://www.vocativ.com/322316/isis-supporters-warn-of-honey-traps-on-telegram/, May 25, 2016
11. Flisbäck, Ola, “Stalking anyone on Telegram,” https://oflisback.github.io/telegram-stalking/, December 16, 2015
12. Avraham, Zuk, “Telegram App Store Secret-Chat Messages in Plain-Text Database,” Zimperium, http://blog.zimperium.com/telegram-hack/ February 23, 2015
13. WhatsApp, “Looking ahead for WhatsApp,” https://blog.whatsapp.com/10000627/Looking-ahead-for-WhatsApp, August 26, 2016
14. WhatsApp Blog, “One Billion,” https://blog.whatsapp.com/616/One-billion, February 1, 2016
15. Barry, Colleen, “Islamic State told Moroccan Living in Italy to Attack Rome,” http://www.usnews.com/news/world/articles/2016-04-28/prosecutors-says-is-ordered-italian-resident-to-attack-rome, April 28, 2016
16. Blair, Scott, “Kickboxing champion Abderrahim Moutaharrik arrested ‘as part of ISIS terror cell using WhatsApp to plan Vatican attack’,” US UK News, http://www.newsusauk.com/news/305236-kickboxing-champion-abderrahim-moutaharrik-arrested-as-part-of-isis-terror-cell-using-whatsapp-to-plan-vatican-attack.html, April 29, 2016
17. Rotella, Sebastian, “ISIS via WhatsApp: ‘Blow Yourself Up, O Lion!’” ProPublica https://www.propublica.org/article/isis-via-whatsapp-blow-yourself-up-o-lion, July 11, 2016
18. Blount, Jeb, “Brazil court blocks Facebook funds over Whatsapp dispute: report,” Reuters, http://www.reuters.com/article/us-brazil-facebook-whatsapp-idUSKCN0ZH3EX, June 30, 2016
19. Varghese, Johnlee, “Bangladesh mulls blocking WhatsApp and Viber to prevent terror activities,” International Business Times, http://www.ibtimes.co.in/bangladesh-mulls-blocking-whatsapp-viber-prevent-terror-activities-654305#muD8eI6SjGKic65l.97, November 11, 2015
20. Zweerink, Maikel, “WhatsSpy Public,” https://gitlab.maikel.pro/maikeldus/WhatsSpy-Public/wikis/home,
21. Greenberg, Andy, Wired, https://www.wired.com/2014/07/free-encrypted-calling-finally-comes-to-the-iphone/, July 29, 2014
22. Tripathi, Rahul, “Dangerous Signal: This encrypted app is helping ISIS members in India to communicate,” Times of India, http://timesofindia.indiatimes.com/tech/tech-news/Dangerous-Signal-This-encrypted-app-is-helping-ISIS-members-in-India-to-communicate/articleshow/51773877.cms, April 11, 2016
23. Cordoba, Armando, “A secret app called Wickr has become ISIS one recruitment device,” NewsComAu, http://www.news.com.au/national/a-secret-app-called-wickr-has-become-isiss-number-one-recruitment-device/news-story/07857ae05909639df75df65dff960137, April 14, 2015,
24. Bentley Paul, “Revealed: How British jihadi brides are being groomed for ISIS by using a phone messaging app after brainwashing them on Twitter,” DailyMail, http://www.dailymail.co.uk/news/article-2966116/How-British-jihadi-brides-groomed-ISIS-using-phone-messaging-app-brainwashing-Twitter.html, February 23, 2015
25. Stewart, Cameron, “War on terror: Cracking growing dark code,” The Australian, http://www.theaustralian.com.au/news/inquirer/cracking-terrors-going-dark-encrypted-code/news-story/8bd82670c825a0a576ca3789a0b44e3a, November 28, 2015
26. Maley, Paul, “Jihadist Mohamed Elomar renews online assault,” The Australian, http://www.theaustralian.com.au/national-affairs/foreign-affairs/jihadist-mohamed-elomar-renews-online-assault/news-story/1a509fe74e6be2110bf272d23cbfcbd6, August 5, 2014
27. Price, Rob, “Germany’s most popular paid app is a secure messenger loved by millions-now it’s taking on the US,” Business Insider, June 18, 2015
28. Threema FAQ, “How long do messages stay in queue for delivery,” https://threema.ch/en/faq/message_storage
29. Bagchi, Indrani, “Terrorists used app to hide digital footprint,” Times of India, http://timesofindia.indiatimes.com/world/Terrorists-used-app-to-hide-digital-footprint/articleshow/53070343.cmsm July 6, 2016
30. Afaaq Electronic Foundation, “Threema GmbH,” https://justpaste.it/threema1, June 3, 2015
31. Sternstein, Aliya, “This ISIS Endorsed Encryption Contractor says it will now screen who is buying its services,” NextGov, http://www.nextgov.com/cybersecurity/2015/11/secure-messaging-contractor-endorsed-isis-will-now-screen-credit-cards/123839/, November 19, 2015
32. Engel, Richard, “The ISIS Prisoner: A Month in captivity in the Islamic State,” NBC News, http://www.nbcnews.com/storyline/isis-uncovered/isis-prisoner-month-captivity-islamic-state-n293656, January 25, 2015
33. Varghese, Johnlee, “Bangladesh mulls blocking WhatsApp and Viber to prevent terror activities,” International Business Times, http://www.ibtimes.co.in/bangladesh-mulls-blocking-whatsapp-viber-prevent-terror-activities-654305#muD8eI6SjGKic65l.97, November 11, 2015
34. Ioffe, Julia, “Mothers of ISIS,” Huffington Post, http://highline.huffingtonpost.com/articles/en/mothers-of-isis/, August 12, 2015,
35. Goodin, Dan, “Think Your Skype Messages get end-to-end encryption? Think Again,” ArsTechnica, http://arstechnica.com/security/2013/05/think-your-skype-messages-get-end-to-end-encryption-think-again/, May 20, 2013,
36. Rotella, Sebastian, “ISIS via WhatsApp: ‘Blow Yourself Up, O Lion!’” ProPublica, https://www.propublica.org/article/isis-via-whatsapp-blow-yourself-up-o-lion, July 11, 2016,
37. Serafini, Marta, “Fatima speaks, Behead in the name of Allah,” Corriere Della Sera, http://www.corriere.it/esteri/15_luglio_06/parla-fatima-jihadista-italiana-decapitiamo-nome-allah-612672f2-2421-11e5-a98d-32629d3b799b.shtml?refresh_ce-cp, July 7, 2015,
38. Roberts, Hannah, “Revealed, how Italy’s Lady Jihad convinced entire white Catholic family to convert and join ISIS in Syira,” DailyMail UK, http://www.dailymail.co.uk/news/article-3264534/Revealed-Italy-s-Lady-Jihad-convinced-entire-white-Catholic-family-convert-join-ISIS-Syria-Fanatical-daughter-guaranteed-mother-terrorists-washing-machine-leave-pet-kitten-behind.html, October 5, 2015
39. Conley Criminal Compaint, https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/Conley%20Criminal%20Complaint.pdf
40. Taher, Abul, “Filmed on Skype, the chilling exchange between reporter posting as a child and Islamic fighter from London,” DailyMailUK, http://www.dailymail.co.uk/news/article-3094448/Filmed-Skype-chilling-exchange-reporter-posing-child-Islamic-State-fighter-London-told-pick-going-picking-wife.html, May 23, 2015
41. Erelle, Anna, “In The Skin of a Jihadist,” http://www.rd.com/true-stories/survival/romancing-terrorist/
42. TrueCrypt, “TrueCrypt,” May 2014, Sourceforge.net, http://truecrypt.sourceforge.net/
43. Ratcliff, Evan, “The Strange Origins of Truecrypt, ISIS’s favored encryption too,” March 30, 2016, http://www.newyorker.com/news/news-desk/the-strange-origins-of-truecrypt-isiss-favored-encryption-tool
44. TOR, “What is the Tor Browser?,” https://www.torproject.org/projects/torbrowser.html.en
45. Finley, Klint, “Out in the Open: Inside the operating system Edward Snowden used to evade the NSA,” WIRED, http://www.wired.com/2014/04/tails/, April 14, 2014
46. Finley, Klint, “Out in the Open: Inside the operating system Edward Snowden used to evade the NSA,” WIRED, http://www.wired.com/2014/04/tails/, April 14, 2014
47. Al-Qaeda in Arabian Peninsula, Inspire #1, “How to use Asrar al-Mujahideen: Sending & Receiving Messages,” June 2010
48. Storm, Morten, “How I helped kill Al Qaeda’s terrorist mastermind ‘the Sheikh’: The nerve shredding story of an MI5 spy posing as a fanatic,” DailyMail, http://www.dailymail.co.uk/news/article-2665385/How-I-helped-kill-Al-Qaedas-terrorist-mastermind-The-target-The-worlds-wanted-man-The-dangers-Immense-This-nerve-shredding-story-MI5-spy-posing-fellow-fanatic.html, June 22, 2014,
49. Zahavi Gilad, “Online Jihadist Express Interest in Cyber Warfare and Cyber Security,” SenseCy, https://blog.sensecy.com/tag/tashfeer-al-jawwal/, February 24, 2014
50. Recorded Future, “How Al Qeda uses encryption post-Snowden (Part 2),” https://www.recordedfuture.com/al-qaeda-encryption-technology-part-2/, August 1, 2014
51. Zahavi Gilad, “Online Jihadist Express Interest in Cyber Warfare and Cyber Security,” SenseCy, https://blog.sensecy.com/tag/tashfeer-al-jawwal/, February 24, 2014
52. Trend Micro, “Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations,” May 03, 2016, http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/overlapping-technologies-cybercriminals-and-terrorist-organizations,
53. Zahavi, Gilad, “Online Jihadists Express Interest in Cyber Warfare and Cyber Security,” Sensecy, https://blog.sensecy.com/tag/tashfeer-al-jawwal/, February 24, 2014
54. Technical Center of Internet, Techno News, “Snowden scares even Al-Qaeda,” https://www.tcinet.ru/en/press-centre/technology-news/1113/, May 05, 2014
55. Zelin, Aaron, “New Statement from the Global Islamic Media Front: Warning about the use of the program ‘Asrar al-Ghuraba,’” Jihadology, http://jihadology.net/2013/12/04/new-statement-from-the-global-islamic-media-front-warning-about-the-use-of-the-program-asrar-al-ghuraba/, December 4, 2013
56. Meyer, Josh, “ISIS has Help Desk for Terrorists Staffed Around the Clock,” NBCNews, http://www.nbcnews.com/storyline/paris-terror-attacks/isis-has-help-desk-terrorists-staffed-around-clock-n464391, November 16, 2015
57. Bennet, Cory, “New ISIS ‘help desk’ to aid hiding from authorities,” The Hill, http://thehill.com/policy/cybersecurity/268940-new-isis-help-desk-unifies-encryption-support, February 10, 2016
58. Cyberkov, Twitter, “Anonymous is blackmailing us with DDoS.” https://twitter.com/CyberkovCEO/status/668156868838236161, November 21, 2015
59. RecordedFuture, “How Al-Qaeda Uses Encryption Post-Snowden (Part 2),” https://www.recordedfuture.com/al-qaeda-encryption-technology-part-2/, August 1, 2014
60. Recorded Future, “How Al Qeda uses encryption post-Snowden (Part 2),” https://www.recordedfuture.com/al-qaeda-encryption-technology-part-2/, August 1, 2014
61. Bennett, Cory, “Apple couldn’t comply with warrant because of encryption,” The Hill, http://thehill.com/policy/cybersecurity/252896-apple-rebuffed-warrant-because-of-encryption, September 8, 2015
Chapter 7:
1. Knutsen, Elise, “Insight: From Remote Mauritania, hacker fights for Islam worldwide,” Reuters, http://www.reuters.com/article/us-mauritania-hacker-insight-idUSBRE95R0D920130628, June 28, 2016,
2. Twitter profile, Teamr00t, https://twitter.com/teamr00t
3. Paganini, Pierluigi, “Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate,” SecurityAffairs, http://securityaffairs.co/wordpress/49170/terrorism/gsh-dox-ucc.html, July 8, 2016
4. Pastebin, “OPpetrol-Total Oil Company System Owned by AnonGhost,” http://pastebin.com/qP00xctu, June 19, 2013
5. Dean, Jon, “Pro-ISIS hackers ‘Caliphate Cyber Army’ release video revealing partnership of evil with cyber terrorists AnonGhost,” MirrorUK, http://www.mirror.co.uk/news/world-news/pro-isis-hackers-caliphate-cyber-7163124, January 12, 2016
6. Staff, MeetHackers.com, “Ghost Squad exposes ISIS Hackers-AnonGhost vs Ghost Squad,” http://www.meethackers.com/2016/07/ghost-squad-exposes-isis-hackers.html, July 17, 2016
7. “An interview with Hackers group Anonghost,” Surf the Cyber, http://sec4track.blogspot.com/2014/03/an-interview-with-hackers-group.html, March 2014
8. Telegram Channel, Cyber Caliphate Army, https://web.telegram.org/#/im?p=c1052567040_17139008826567720683
9. Watkinson, William, “ISIS Threatens founder Mark Zuckerberg and Twitter CEO Jack Dorsey in chilling video,” International Business Times, www.ibtimes.co.uk/isis-threatens-facebook-founder-mark-zuckerberg-twitter-ceo-jack-dorsey-chilling-video-1545849”, February 25, 2016
10. Gallagher, Sean, “As US drops ‘cyber bomb,’ ISIS retools its own cyber army,” ArsTechinca, http://arstechnica.com/information-technology/2016/04/as-us-drops-cyber-bombs-isis-retools-its-own-cyber-army/, April 28, 2016.
11. Pymnts, “ISIS google hacking attempt flops,” http://www.pymnts.com/news/retail/2016/isis-google-hacking-attempt-flops/, March 4, 2016
12. Aboudi, Sami, “Kuwait detains member of Islamic cyber army: newspapers,” Reuters, http://www.reuters.com/article/us-kuwait-security-cyberarmy-idUSKCN1111CT, August 26, 2016
13. Pawlyk, Oriana, “ISIS-linked hackers claim to release personal information of U.S. drone pilots,” AirForceTimes, https://www.airforcetimes.com/articles/isis-linked-hackers-claim-to-release-personal-information-of-us-drone-pilots, May 2, 2016
14. Lanier, Candice, “Pro-ISIS group posts list of names & addresses of Americans-Apparently targeted for attack,” ChristianPost, http://blogs.christianpost.com/the-good-fight/pro-isis-group-posts-list-of-names-addresses-of-americans-apparently-targeted-for-attacks-25398/, April 13, 2015
15. Peranick, Matt, “Extremist media group issues cyber threats,” EplaceInc, http://blog.eplaceinc.com/cyber/2015/06/09/extremist-media-group-issues-cyber-threats/, June 9, 2015,
16. Gallagher, Sean, “ As US drops ‘cyber bombs’ ISIS retools its own cyber army,” ArsTechnica, http://arstechnica.com/information-technology/2016/04/as-us-drops-cyber-bombs-isis-retools-its-own-cyber-army/, April 28, 2016
17. Hunt, Troy, “An analysis of the ISIS ‘hit list’ of hacked personal data,” August 12, 2015, https://www.troyhunt.com/an-analysis-of-isis-hit-list-of-hacked/
18. Bennet, Cory, “Hackers breach the Warsaw Stock Exchange,” The Hill, October, 14, 2014, http://thehill.com/policy/cybersecurity/221806-hackers-breach-the-warsaw-stock-exchange
19. CyInfo, “Al Qaeda’s Electronic Jihad,” February 2, 2015, https://blog.sensecy.com/2015/02/02/al-qaedas-electronic-jihad/
20. Liu, Eric, “Al Qaeda Electronic: A Sleeping Dog?” AEI Critical Threats, December 2015, www.criticalthreats.org/al-qaeda/liu-al-qaeda-electronic-december-2-2015
21. Ibid.
22. Ibid.
23. Ibid.
24. Ibid.
25. Ibid.
26. Deccan Chronicle Staff, “Indian Railways website allegedly hacked by Al Qaeda,” Deccan Chronicle, March 2, 2016, http://www.deccanchronicle.com/technology/in-other-news/020316/indian-railways-website-allegedly-hacked-by-al-qaeda.html
27. Hackers Writer, “WSCC website hacked by Al Qaeda Hacker Team & TKL,” Hackers News Bulletin, March 2013, http://www.hackersnewsbulletin.com/2013/03/wscc-website-hacked-by-al-qaeda-hacker-team-tkl.html
28. Praveen, “Al-Qaeda Hackers defaced website of town of Wanatah,” Geekyard, March 3, 2013, http://www.geekyard.com/safe/al-qaeda-hackers-defaced-website-of-town-of-wanatah/
29. Zahavi, Gilad, “Online Jihadists express interest in cyber warfare and cyber security,” SenseCy, February 24, 2014, https://blog.sensecy.com/tag/al-qaeda-electronic-army/
30. MEMRI, “Tunisian Cyber Army’ and ‘Al-Qaeda Electronic Army’ Reportedly Hack pentagon and State Department Websites,” March 11, 2013. http://cjlab.memri.org/uncategorized/tunisian-cyber-army-and-al-qaeda-electronic-army-reportedly-hack-pentagon-state-department-websites/
Chapter 8:
1. Kovacs, Eduard, “Hackers around the world: It’s no TriCk, He’s among the Best in the UK,” Softpedia, http://news.softpedia.com/news/Hackers-Around-the-World-It-s-No-TriCk-He-s-Among-the-Best-in-the-UK-253652.shtml, February 18, 2012
2. Ries, Brian, “The Mujahideen hackers who ‘Clean Facebook,’” DailyBeast, http://www.thedailybeast.com/articles/2011/01/27/the-mujahedeen-hackers-who-clean-facebook-and-the-facebook-privacy-breakthrough.html, January 27, 2011
3. Kovacs, Eduard, “Hackers around the world: It’s no TriCk, He’s among the Best in the UK,” Softpedia, http://news.softpedia.com/news/Hackers-Around-the-World-It-s-No-TriCk-He-s-Among-the-Best-in-the-UK-253652.shtml, February 18, 2012
4. Kovacs, Eduard, “Hackers around the world: It’s no TriCk, He’s among the Best in the UK,” Softpedia, http://news.softpedia.com/news/Hackers-Around-the-World-It-s-No-TriCk-He-s-Among-the-Best-in-the-UK-253652.shtml, February 18, 2012
5. Telegraph Staff, “Team Poison hacker who posted Tony Blair’s details is jailed,” TelegraphUK, http://www.telegraph.co.uk/technology/internet-security/9432459/Team-Poison-hacker-who-posted-Tony-Blairs-details-is-jailed.html, July 27, 2012
6. Pearce, Matt, “Outside Muhammad cartoon contest in Texas, 2 gunmen are killed and guard is shot,” May 3, 2015, http://www.latimes.com/nation/la-na-texas-shooting-20150503-story.html
7. BBCNews, “IS computer hacker Siful Haque Sujan killed in air strike,” http://www.bbc.com/news/uk-wales-35206038, December 31, 2015
8. LinkedIn Profile, “Siful Sujan,” https://www.linkedin.com/in/sifulsujan
9. Farmer, Ben, “Cardiff businessman turned ISIL cyber expert killed in airstrike,” TelegraphUK, http://www.telegraph.co.uk/news/worldnews/middleeast/12075144/Cardiff-businessman-turned-Isil-cyber-expert-killed-in-air-strike.html, December 30, 2015
10. Burman, Jake, “British-trained Islamic State computer hacker WIPED OUT in drone strike,” Sunday Express, http://www.express.co.uk/news/world/630468/Islamic-State-ISIS-Siful-Haque-Sujan-US-America-Pentagon-Drone-Strike-Britain-Cardiff, December 30, 2015
11. Moon, Terri, “Coalition kill 10 senior ISIL leaders in December,” DoD News, http://www.defense.gov/News/Article/Article/639489/coalition-killed-10-senior-isil-leaders-in-december, December 29, 2015
12. Mendelson, Tom, “ISIS hacking chief ran massive money-launder ing operation in Britain,” International Business Times, http://www.ibtimes.co.uk/isis-hacking-chief-ran-massive-money-laundering-operation-britain-1535768, January 3, 2016
13. Samuel, Henry, “Intelligence agencies access private Telegram messages of most notorious ISIL recruiter, prompting arrest of 10 teenagers in one month,” Telegraph UK, September 16, 2016, http://www.telegraph.co.uk/news/2016/09/16/french-intelligence-cracks-telegram-account-of-most-notorious-is/
14. BBC Europe, “Did Jihadist Rashid Kassim lure French youths to plot attacks?” September 15, 2016, http://www.bbc.com/news/world-europe-37340697
15. Triet, Kevin, “Un Roannais fait l’apologie du djihad sur Facebook,” Le Progress, January 21, 2016, http://www.leprogres.fr/loire/2016/01/21/un-roannais-fait-l-apologie-du-djihad-sur-facebook-nljs
16. Seelow, Soren, “Rashid Kassim, the guru of young apprentice terrorists,” LeMonde, September 16, 2016, http://www.lemonde.fr/societe/article/2016/09/16/rachid-kassim-le-gourou-des-enfants-terroristes_4998559_3224.html
17. BBC Europe, “Did Jihadist Rashid Kassim lure French youths to plot attacks?” September 15, 2016, http://www.bbc.com/news/world-europe-37340697
18. France24, “Paris police identify French IS group suspect ‘with key links to terror plots,’” September, 13, 2016, http://www.france24.com/en/20160912-france-rachid-kassim-terrorism-plots-islamic-state-group-paris-police
19. BBC Europe, “Did Jihadist Rashid Kassim lure French youths to plot attacks?” September 15, 2016, http://www.bbc.com/news/world-europe-37340697
20. Seelow, Soren, “Rashid Kassim, the guru of young apprentice terrorists,” LeMonde, September 16, 2016, http://www.lemonde.fr/societe/article/2016/09/16/rachid-kassim-le-gourou-des-enfants-terroristes_4998559_3224.html
21. Zennie, Michael, “The American computer wiz running brutally effective ISIS social media campaign,” DailyMailUK, http://www.dailymail.co.uk/news/article-2743737/The-American-computer-wiz-running-ISIS-brutally-effective-social-media-campaign-College-educated-son-Boston-doctor-FBI-Most-Wanted-list.html, September 4, 2014
22. Al Arabiya News Staff, “ISIS movie maker, documentary producer ‘killed’ in Iraq airstrike,” http://english.alarabiya.net/en/News/middle-east/2015/05/31/ISIS-movie-maker-and-documentary-producer-die-in-Iraqi-airstrike.html, May 31, 2015
23. Poole, Patrick, “American ISIS propagandist Ahmad Abousamra Reported killed in Iraq airstrike,” PJ Media, https://pjmedia.com/blog/american-isis-propagandist-ahmad-abousamra-reported-killed-in-iraq-airstrike, May 31, 2016
24. Hall, John, “Two US jihadis who made ISIS propaganda videos-including one on the FBI’s most wanted terrorist list-are killed in Iraqi air strike,” DailyMail, http://www.dailymail.co.uk/news/article-3105640/Two-jihadis-ISIS-propaganda-videos-including-one-FBI-s-wanted-terrorist-list-killed-Iraqi-air-strike.html, July 1, 2015
25. US v Mehanna, First Circuit, “Motion,” http://media.ca1.uscourts.gov/pdf.opinions/12-1461P-01A.pdf, November 13, 2013.
26. Bohannon, John, “Women Critical for Online Terrorist Networks,” ScienceMag, http://www.sciencemag.org/news/2016/06/women-critical-online-terrorist-networks, June 10, 2016
27. Winter, Charlie, “Women of the Islamic State: A Manifesto on women by the al-Khanssaa Brigade,” Quilliam, http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/women-of-the-islamic-state3.pdf, February 2015
28. Ibid.
29. Ibid.
30. Webb, Sam, “British ISIS widow Sally Jones threatens UK cities with bomb strikes over summer in a series of tweets,” Mirror.co, http://www.mirror.co.uk/news/uk-news/british-isis-widow-sally-jones-8049896, May 25, 2016
31. U.S. Department of State, Office of the Spokesperson (2015, September 29). Designations of Foreign Terrorist Fighters [Press release]. U.S. Department of State. Retrieved September 8, 2016, from http://www.state.gov/r/pa/prs/ps/2015/09/247433.htm
32. Joshi, P. (2016, August 28). Father says British child killer in Isis propaganda video is his son. International Business Times. Retrieved September 10, 2016, from http://www.ibtimes.co.uk/father-says-british-child-killer-isis-propaganda-video-his-son-1578469
33. Schmidt, M. & Pérez-Peña, R. (2015, December 4). “F.B.I. Treating San Bernardino Attack as Terrorism Case. New York Times. Retrieved September 7, 2016, from http://www.nytimes.com/2015/12/05/us/tashfeen-malik-islamic-state.html
34. Tucker, E. (2015, December 6). How ISIS is recruiting a growing following of young women. The Associated Press. Retrieved September 7, 2016, from http://www.pbs.org/newshour/rundown/how-isis-is-recruiting-a-growing-following-of-young-women/
35. Saltman, E., & Smith, M. (2015). “Till Martyrdom Do Us Part”: Gender and the ISIS Phenomenon (Rep.). Retrieved September 7, 2016, from http://www.strategicdialogue.org/wp-content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phenomenon.pdf
36. Saltman, E., & Smith, M. (2015). “Till Martyrdom Do Us Part”: Gender and the ISIS Phenomenon (Rep.). Retrieved September 7, 2016, from http://www.strategicdialogue.org/wp-content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phenomenon.pdf
37. Storey, K. (2016, April 22). The American Women of ISIS. Marie Claire. Retrieved September 7, 2016, from http://www.marieclaire.com/politics/a20011/western-women-who-join-isis/
38. Storey, K. (2016, April 22). The American Women of ISIS. Marie Claire. Retrieved September 7, 2016, from http://www.marieclaire.com/politics/a20011/western-women-who-join-isis/
39. Bennhold, K. (2015, August 17). Jihad and Girl Power: How ISIS Lured 3 London Girls. Retrieved September 7, 2016, from http://www.nytimes.com/2015/08/18/world/europe/jihad-and-girl-power-how-isis-lured-3-london-teenagers.html?_r=0
40. Wockner, C. (2016, May 9). Australian jihadi bride broker Shadi Jabar’s Telegram Posts. News Corp Australia Network. Retrieved September 10, 2016, from http://www.news.com.au/lifestyle/real-life/true-stories/australian-jihadi-bride-broker-shadi-jabars-telegram-posts/news-story/6989badd02486ce5e8df268945fb9ce8
41. Ibid.
42. Wockner, C. (2016, May 9). Australian jihadi bride broker Shadi Jabar’s Telegram Posts. News Corp Australia Network. Retrieved September 10, 2016, from http://www.news.com.au/lifestyle/real-life/true-stories/australian-jihadi-bride-broker-shadi-jabars-telegram-posts/news-story/6989badd02486ce5e8df268945fb9ce8
43. Ibid.
44. Wockner, C. (2016, May 9). Shadi Jabar: Australian who lured jihadi brides for ISIS. News Corp Australia Network. Retrieved September 10, 2016, from http://www.dailytelegraph.com.au/news/special-features/in-depth/shadi-jabar-the-australian-name-behind-islamic-states-bride-broker/news-story/71cf641c489a6d70b3c7a8d2ead47a24
45. Cook, P. (2016, May 5). Department of Defense Press Briefing by Pentagon Press Secretary Peter Cook in the Pentagon Briefing Room [Press Conference]. U.S. Department of Defense. Retrieved September 10, 2016, from http://www.defense.gov/News/Transcripts/Transcript-View/Article/752789/department-of-defense-press-briefing-by-pentagon-press-secretary-peter-cook-in
46. Ibid.
47. Ibid.
48. Calbert, S. & Grossman, A. (2015, April 3). Philadelphia Woman Keonna Thomas Charged With Attempting to Join ISIS. Retrieved September 8, 2016, from http://www.wsj.com/articles/philadelphia-woman-keonna-thomas-charged-with-attempting-to-join-isis-1428078216
49. United States of America v. Keonna Thomas (United States District Court for the Eastern District of Pennsylvania April 3, 2015).
50. Ibid.
51. Hall, E. (2015, April 17). “Gone Girl: An Interview With An American In ISIS,” BuzzFeed. Retrieved September 8, 2016, from https://www.buzzfeed.com/ellievhall/gone-girl-an-interview-with-an-american-in-isis
52. Ibid.
53. U.S. Department of State, Office of the Spokesperson. (2015, September 29). Designations of Foreign Terrorist Fighters [Press release]. U.S. Department of State. Retrieved September 8, 2016, from http://www.state.gov/r/pa/prs/ps/2015/09/247433.htm
54. Emilie König, Cette Bretonne fichée par les Etats-Unis (2015, September 30). Paris Match. Retrieved September 7, 2016, from http://www.parismatch.com/Actu/International/Emilie-Koenig-cette-Bretonne-fichee-par-les-Etats-Unis-837707
55. Piel, S. & Vincent, E. (2015, October 1). Emilie, Maxime, Peter, Boubaker … ces djihadistes français blacklistés aux Etats-Unis. Le Monde. Retrieved September 7, 2016, from http://www.lemonde.fr/international/article/2015/10/01/terrorisme-itineraire-et-profil-des-quatre-francais-inscrits-sur-la-liste-noire-des-etats-unis_4779081_3210.html
56. Hall, Ellie. (2014, September 11). “Inside The Chilling Online World of The Women Of ISIS,” BuzzFeed. Retrieved September 7, 2016, from https://www.buzzfeed.com/ellievhall/inside-the-online-world-of-the-women-of-isis
57. Freytas-Tamura, K. (2015, February 24). “Teenage Girl Leaves for ISIS, and Others Follow,” New York Times. Retrieved September 7, 2016, from September 7, 2016, from into life in SyriaIS http://www.nytimes.com/2015/02/25/world/from-studious-teenager-to-isis-recruiter.html
58. Hall, Ellie. (2014, September 11). “Inside The Chilling Online World of The Women Of ISIS,” BuzzFeed. Retrieved September 7, 2016, from https://www.buzzfeed.com/ellievhall/inside-the-online-world-of-the-women-of-isis
59. Dettmer, J. (2014, September 3). The Bride of ISIS Revealed. The Daily Beast. Retrieved September 7, 2016, from http://www.thedailybeast.com/articles/2014/09/03/the-bride-of-isis-revealed.html
60. Winter, Charlie, “Women of the Islamic State: A Manifesto on women by the al-Khanssaa Brigade,” Quilliam, http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/women-of-the-islamic-state3.pdf, February 2015
61. Umm Layth. Internet Archive. Retrieved September 7, 2016, from https://web.archive.org/web/20150224163437/http://fa-tubalilghuraba.tumblr.com/
62. Umm Layth. Internet Archive. Retrieved September 7, 2016, from https://web.archive.org/web/20150224163437/http://fa-tubalilghuraba.tumblr.com/
63. Shoichet, C., Bilginsoy, Z. & Yan, H. (2015, March 23). ‘Brainwashed’ foreign medical students went to Syria, Turkish lawmaker says. CNN. Retrieved September 8, 2016, from http://www.cnn.com/2015/03/23/middleeast/syria-isis-medical-students/
64. Sandford, D., Swann, S. & Hashim, M. (2015, July 17). UK medical student “recruited for IS” at university in Sudan. BBC. Retrieved September 8, 2016, from http://www.bbc.com/news/uk-33502534
65. Clifford, S. (2015, April 2). “Two Women in Queens Are Charged With a Bomb Plot,” New York Times, Retrieved September 8, 2016, from http://www.nytimes.com/2015/04/03/nyregion/two-queens-women-charged-in-bomb-plot
66. Ibid.
67. United States of America v. Noelle Velentzas and Asia Siddiqui (United States District Court for the Eastern District of New York April 1, 2015).
68. Ibid.
69. Ibid.
Chapter 9:
1. Cha, Ariana Eunjung, “From a virtual Shadow, Messages of Terror,” Washington Post, http://www.washingtonpost.com/wp-dyn/articles/A1570-2004Oct1.html, October 4, 2004
2. Healy, Jack, “Gunmen in Uniforms Kill 20 Police Officers in Iraq,” New York Times, http://www.nytimes.com/2012/03/06/world/middleeast/police-killed-in-iraq.html, March 5, 2012
3. BBC News, “Iraq Militants attack Tikrit prison, freeing 90 inmates,” http://www.bbc.com/news/world-middle-east-19750039, Sept 28, 2012
4. Miller, Greg, Mekhennet, Souad, “Inside the surreal world of the Islamic State’s propaganda machine,” Washington Post, https://www.washingtonpost.com/world/national-security/inside-the-islamic-states-propaganda-machine/2015/11/20/051e997a-8ce6-11e5-acff-673ae92ddd2b_story.html, November 20, 2015
5. Miller, Greg, Mekhennet, Souad, “Inside the surreal world of the Islamic State’s propaganda machine,” Washington Post, https://www.washingtonpost.com/world/national-security/inside-the-islamic-states-propaganda-machine/2015/11/20/051e997a-8ce6-11e5-acff-673ae92ddd2b_story.html, November 20, 2015
6. Callimachi, Rukmini, “How a secretive Branch of ISIS built a global network of killers,” New York Times, http://www.nytimes.com/2016/08/04/world/middleeast/isis-german-recruit-interview.html?_r=0, August 3, 2016
7. Miller, Greg, Mekhennet, Souad, “Inside the surreal world of the Islamic State’s propaganda machine,” Washington Post, https://www.washingtonpost.com/world/national-security/inside-the-islamic-states-propaganda-machine/2015/11/20/051e997a-8ce6-11e5-acff-673ae92ddd2b_story.html, November 20, 2015
8. Fruen, Lauren, “Blooming Scary, Florist’s shock at appearing in ISIS magazine,” September 7, 2016, https://www.thesun.co.uk/news/1741246/manchester-florist-shocked-to-be-pictured-in-isis-propaganda-magazine/
9. Kuwait news Agency, “Malaysian web-hosting company terminates server of Muntada al-Ansar,” http://www.kuna.net.kw/ArticlePrintPage.aspx?id=1476906&language=en, May 14, 2004
10. Eunjung Cha, Ariana, “From a virtual shadow, messages of terror,” Washington Post, October 2, 2004, http://www.washingtonpost.com/wp-dyn/articles/A1570-2004Oct1.html
11. Ibid.
12. Novinite, “Bulgarian Beheading Video On the Net,” http://www.novinite.com/articles/37501/Bulgarian+Beheading+Video+on+the+Net, July 28, 2004
13. Trowbridge, Alexander, “ISIS swiping hashtags as part of propaganda efforts,” CBSNews http://www.cbsnews.com/news/isis-hijacks-unrelated-hashtags-in-attempt-to-spread-message/, August 26, 2014
Chapter 10:
1. Trend Micro Report, “https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/overlapping-technologies-cybercriminals-and-terrorist-organizations?ClickID=anrstkrwlan5vz5stvrrsns5syksok0yrrl,” May 3, 2016
2. Wright Criminal Complaint, “US v David Wright,” https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/Wright%20Criminal%20Complaint.pdf, June 2, 2015
3. Islamic State, “Hijrah to the Islamic State,” pg 47
4. Smith, Chris, “Forget iPhone encryption, the FBI can’t legally touch the software ISIS uses,” BGR http://bgr.com/2016/03/31/isis-attack-paris-brussels-iphone-encryption/, March 31, 2016
5. Ioffe, Julia, “Mothers of ISIS,” Huffington Post, http://highline.huffingtonpost.com/articles/en/mothers-of-isis/, August 12, 2015
Chapter 11:
1. Dabiq #13, “The Rafidah: From Ibn Saba’ to the Dajjal”
2. Dabiq #7, cover
3. Dabiq 12, “Interview with Abu Muharib as-sumali”
4. Bloom, Mia, “The Changing Nature of Women in Extremism and Political Violence,” Location, http://f3magazine.unicri.it/?p=1093,
Chapter 12:
1. Blinken, Antony J., “New Frameworks for Countering Terrorism and Violent Extremism,” U.S. Department of State. U.S. Department of State, 16 Feb. 2016. Web. 10 Sept. 2016.
2. Williams, Katie Bo, “Legislation to combat ISIS propaganda faces pushback from Dems,” TheHill, http://thehill.com/policy/cybersecurity/277662-gop-bill-to-combat-isis-propaganda-faces-push back, April 26, 2016
3. Yadron, D., & Wong, J. C., “Silicon Valley appears open to helping US spy agencies after terrorism summit,” TheGuardianUK, 2016, January 08, https://www.theguardian.com/technology/2016/jan/08/technology-executives-white-house-isis-terrorism-meeting-silicon-valley-facebook-apple-twitter-microsoft
4. Acosta, J. (2016, February 25). “First on CNN: Government enlists tech giants to fight ISIS messaging.” Retrieved September 08, 2016, from http://www.cnn.com/2016/02/24/politics/justice-department-apple-fbi-isis-san-bernardino/
5. U.S. Department of State, “Ambassador Alberto Fernandez Appointed Coordinator of the Center for Strategic Counterterrorism Communications,” State.Gov, March 26, 2012, http://www.state.gov/r/pa/prs/ps/2012/03/186790.htm
6. Blinken, Antony J., “New Frameworks for Countering Terrorism and Violent Extremism.” U.S. Department of State. U.S. Department of State, 16 Feb. 2016. Web. 10 Sept. 2016.
7. Labott, Elise, “State Department releases graphic anti-ISIS video,” CNN.com, September 8, 2014, http://www.cnn.com/2014/09/05/world/state-department-anti-isis-video/
8. Yousef, Sarbaz, “Dozens of IT experts, media workers desert ISIS in Mosul,” AraNews, http://aranews.net/2016/04/dozens-experts-media-workers-desert-isis-mosul/, April 30, 2016
9. Yousef, Sarbaz, “France hit ISIS media center in Mosul,” AraNews, http://aranews.net/2016/01/france-hit-isis-communication-center-in-mosul/, January 16, 2016
10. Baron, Kevin, “US now launching cyberattacks against ISIS, defense secretary says,” Defense One, http://www.nextgov.com/defense/2016/03/us-now-launching-cyberattacks-against-isis-defense-secretary-says/126318/, March 1, 2016
11. Iyer, Kavita, “Using VPN in UAE could get you in prison & a fine upto $545,000,” TechWorm, http://www.techworm.net/2016/07/using-vpn-uae-get-prison-fine-upto-545000.html, July 28, 2016
12. BBC, “Radical preacher Anjem Choudhary jailed for five years,” September 6, 2016, http://www.bbc.com/news/uk-37284199
13. Wright, Simon, Dorman, Nick, Cortbus, Colin, “Twitter shuts down ISIS supporters and jihadists as MI5 launch anti-terror social media crackdown,” Mirror, http://www.mirror.co.uk/news/uk-news/twitter-shuts-down-isis-supporters-5038305, January 24, 2015
14. Ballenger, Grace, “US, UK Develop Strategies against ISIS Media Use,” The News Hub. The News Hub, 4 Aug. 2015. Web. 10 Sept. 2016.
15. Investigatory Powers Bill 2015–16 to 2016–17.” Parliament.uk. Parliament of the United Kingdom, n.d. Web. 10 Sept. 2016.
16. Shah, Saqib, “France Holds Counter-terrorism Talks with Twitter, Facebook,” Digitaltrends.com. Digital Trends, 04 Dec. 2015. Web. 10 Sept. 2016.
17. DiGiovanni, Janine, “Simple Ideas to Counter Terrorism in France,” Newsweek. N.p., 17 Mar. 2016. Web. 10 Sept. 2016.
18. Dodd, Vikram, “Europol web unit to hunt extremists behind ISIS social media propaganda,” Guardian UK, June 21, 2015, https://www.theguardian.com/world/2015/jun/21/europol-internet-unit-track-down-extremists-isis-social-media-propaganda
19. Twitter, “Combating Violent Extremism,” Twitter.com, February 6, 2016, https://blog.twitter.com/2016/combating-violent-extremism
20. Twitter, “Combating Violent Extremism,” Twitter.com, February 6, 2016, https://blog.twitter.com/2016/combating-violent-extremism
21. R. (2015, December 07). Social media sites quietly join fight against ISIS. Retrieved September 08, 2016, from http://nypost.com/2015/12/07/social-media-sites-quietly-join-fight-against-isis/
22. Detsch, J, “How Google aims to disrupt the Islamic State propaganda machine,” Christian Science Monitor. September 07, 2016, from http://www.csmonitor.com/World/Passcode/2016/0907/How-Google-aims-to-disrupt-the-Islamic-State-propaganda-machine
23. Jeong, S. (2016, June 15). Anti-ISIS Hacktivists Are Attacking the Internet Archive. Retrieved September 08, 2016, from http://motherboard.vice.com/read/anti-isis-hacktivists-are-attacking-the-internet-archive
24. J. (2015, July 7). Cyber Jihad 2.0 – Where We’re going Wrong. Retrieved September 8, 2016, from https://jesterscourt.cc/2015/07/07/cyber-jihad-2-0-where-were-going-wrong/
25. O’Gara, E. (2015, September 05). THINK-TANK RELEASES ANTI-RADICALISATION VIDEO TO COUNTER ISIS PROPAGANDA. Retrieved September 08, 2016, from http://europe.newsweek.com/think-tank-releases-anti-radicalisation-video-counter-isis-propaganda-331225
26. Berger, J., & Morgan, J. (2015, March). The ISIS Twitter Census. Retrieved September 8, 2016, from https://www.brookings.edu/wp-content/uploads/2016/06/isis_twitter_census_berger_morgan.pdf
27. Wagner, K. (2015, December 15). U.S. Enlists College Students to Fight ISIS Online. Retrieved September 08, 2016, from http://www.recode.net/2015/12/15/11621450/behind-the-u-s-governments-anti-isis-plan-on-facebook-and-youtube
28. Quinn, Ben, “Interpol website suffers ‘Anonymous cyber-attack,’” GuardianUK, http://www.diplomaticourier.com/2015/03/19/tor-and-the-bitcoin-an-exploration-into-law-enforcement-surveillance-capability-online/, February 28, 2012
29. Anonymous, YouTube Video, “Anonymous #OpCharlieHebdo,” https://www.youtube.com/watch?v=oqbwqmb8P00, January 10, 2015
30. Anonymous, Pastebin.com, “#OpISIS-Expose & Destroy by Anonymous Red Cult” http://pastebin.com/G663HnDa, February 9, 2015
31. Bryanschatz. (2015, November 24). “When they’re not attacking each other, hackers say they’re targeting ISIS.” Retrieved September 08, 2016, from http://www.motherjones.com/politics/2015/11/anonymous-hacking-isis-ghost-security
32. Griffin, A. (2015, December 28). “Anonymous war on Isis: Online activists claim to have foiled terror attack on Italy as part of “Operation Isis,” Retrieved September 08, 2016, from http://www.independent.co.uk/life-style/gadgets-and-tech/news/anonymous-war-on-isis-online-activists-claim-to-have-foiled-terror-attack-on-italy-as-part-of-a6788001.html
33. Mills, K. (2016, March 23). “Brussels attacks: Anonymous declares war on ISIS in chilling video vowing “we will find you” - Mirror Online. Retrieved September 08, 2016, from http://www.mirror.co.uk/news/world-news/brussels-attacks-anonymous-declares-isis--7615029
34. “Anonymous hacks pro-ISIS Twitter accounts, fills them with gay pride.” (2016, June 15). Retrieved September 08, 2016, from http://www.cbsnews.com/news/anonymous-hacks-pro-isis-twitter-accounts-fills-them-with-gay-pride/
35. Pascaline, Mary, “After Orlando Shooting, Anonymous Hacker Turns ISIS Twitter Accounts Pro-LGBT,” June 17, 2016, http://www.ibtimes.com/after-orlando-shooting-anonymous-hacker-turns-isis-twitter-accounts-pro-lgbt-2383317
36. Cameron, Dell, “Twitter says Anonymous list of alleged ISIS accounts is highly inaccurate,” The Daily Dot, http://www.dailydot.com/layer8/twitter-isnt-reading-anonymous-list-isis-accounts/, November 20, 2015
37. Russon, Mary-Ann, “Ghost Security Group: How Anonymous hackers grew up to help save the world from ISIS,” IBTimesUK, January, 23, 2016, http://www.ibtimes.co.uk/ghost-security-group-how-anonymous-hackers-grew-help-save-world-isis-1539618
38. Knibbs, Kate, “is this vigilante group fighting ISIS or just feeding the media a fat load of crap?” Gizmodo, February 3, 2016, http://gizmodo.com/is-this-vigilante-group-fighting-isis-or-just-feeding-t-1755489934
39. Knibbs, Kate, “is this vigilante group fighting ISIS or just feeding the media a fat load of crap?” Gizmodo, February 3, 2016, http://gizmodo.com/is-this-vigilante-group-fighting-isis-or-just-feeding-t-1755489934
40. Cuthbertson, Anthony, “Hackers replace dark web ISIS propaganda site with advert for Prozac,” http://www.ibtimes.co.uk/hackers-replace-dark-web-isis-propaganda-site-advert-prozac-1530385, November 25, 2015
41. Cottee, S. (2015, October 8). “The Cyber Activists Who Want to Shut Down ISIS.” Retrieved September 08, 2016, from http://www.theatlantic.com/international/archive/2015/10/anonymous-activists-isis-twitter/409312/
42. Ibid.
43. Ibid.
44. Pagliery, Jose, “Meet the vigilante who hacks jihadists,” CNN Money, http://money.cnn.com/2015/01/16/technology/security/jester-hacker-vigilante/index.html, January 16, 2015
45. Szoldra, P. (2015, November 17). This hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous. Retrieved September 8, 2016, from http://www.techinsider.io/anon-war-isis-jester-hacking-2015-11
46. Pagilery, J. (2015, January 16). “Meet the vigilante who hacks jihadists.” Retrieved September 08, 2016, from http://money.cnn.com/2015/01/16/technology/security/jester-hacker-vigilante/
47. Szoldra, P. (2015, November 17). “This hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous.” Retrieved September 8, 2016, from http://www.techinsider.io/anon-war-isis-jester-hacking-2015-11
48. O’Neill, Patrick, “Who’s laughing now? U.S. government seizes The Jester’s website,” TheDailyDot, August 2, 2013, http://www.dailydot.com/news/jester-jesterscourt-website-seized-ice-hacker/
49. Freed, Anthony, “More Talks with Anti-Jihadi Hacker The Jester,” Febraury 4, 2010, http://www.infosecisland.com/blogview/2805-More-Talks-with-Anti-Jihadi-Hacker-The-Jester.html
50. Szoldra, P. (2015, November 17). “This hacker has fought terrorists online since 2010, and he’s not impressed by Anonymous.” Retrieved September 8, 2016, from http://www.techinsider.io/anon-war-isis-jester-hacking-2015-11
51. Pagilery, J. (2015, January 16). “Meet the vigilante who hacks jihadists.” Retrieved September 08, 2016, from http://money.cnn.com/2015/01/16/technology/security/jester-hacker-vigilante/
52. Jester. (2015, July 7). “Cyber Jihad 2.0 – Where We’re going Wrong.” Retrieved September 8, 2016, from https://jesterscourt.cc/2015/07/07/cyber-jihad-2-0-where-were-going-wrong/
53. Freed, Anthony, “More Talks with Anti-Jihadi Hacker The Jester,” Febraury 4, 2010, http://www.infosecisland.com/blogview/2805-More-Talks-with-Anti-Jihadi-Hacker-The-Jester.html
54. Nakashima, Ellen, “Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies,” March 19, 2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464_pf.html
55. InfoSec Island Admin, “The SANS report: The Jester, A Lesson in Assymetric Warfare,” March 05, 2012, http://www.infosecisland.com/blogview/20599-The-SANS-Report-The-Jester-A-Lesson-in-Asymmetric-Warfare.html
56. Aaronson, Trevor, “Listen to an FBI ‘Honeypot’ On the Job.” April 21, 2016, https://theintercept.com/2016/04/21/listen-to-an-fbi-honeypot-on-the-job/
Chapter 13:
1. Stewart, Christopher, Maremont, Mark, “Twitter bars intelligence agencies from using analytics service,” Wall Street Journal, http://www.wsj.com/articles/twitter-bars-intelligence-agencies-from-using-analytics-service-1462751682, May 8, 2016
2. Crovitz, L. Gordon, “Twitter Picks Russia over the U.S.,” Wall Street Journal, http://www.wsj.com/articles/twitter-picks-russia-over-the-u-s-1463346268, May 15, 2016
3. Ibid.
4. Winston, Ali, Reveal, “Facebook reactions are a gift to advertisers and law enforcement alike,” https://www.revealnews.org/blog/facebook-reactions-are-a-gift-to-advertisers-and-law-enforcement-alike/, March 1, 2016, July 23, 2016
5. Fang, Lee, “The CIA is investing in firms that mine your tweets and Instagram photos,” Intercept, https://theintercept.com/2016/04/14/in-undisclosed-cia-investments-social-media-mining-looms-large/, April 14, 2016
6. Callimachi, Rukmini, “How a Secretive Branch of ISIS built a global work of Killers,” New York Times, http://www.nytimes.com/2016/08/04/world/middleeast/isis-german-recruit-interview.html,
7. Schmitt, Eric, “A Raid on ISIS Yields a Trove of Intelligence,” New York Times, http://www.nytimes.com/2015/06/09/world/middleeast/us-raid-in-syria-uncovers-details-on-isis-leadership-and-finances.html, June 8, 2005
8. Schmitt, Eric, “U.S. Secures Vast New Trove of Intelligence on ISIS,” New York Times, http://www.nytimes.com/2016/07/28/world/middleeast/us-intelligence-isis.html, July 27, 2016
9. Schmitt, Eric, “U.S. Secures Vast New Trove of Intelligence on ISIS,” New York Times, July 27, 2016, http://www.nytimes.com/2016/07/28/world/middleeast/us-intelligence-isis.html?_r=0
10. Nanjappa, Vicky, “How ISIS lays honey traps to recruit people,” OneIndia, http://www.oneindia.com/feature/how-isis-lays-honey-traps-to-recruit-people-1769698.html, June 8, 2015
11. Indorewala, Sharmeen Hakim, “ISIS honey trap offered to ‘marry’ Majeed on FB,” MumbaiMirror, May 30, 2015
12. TimeOfIndia, “I cleaned toilets while in ISIS, Kalyan youth Areeb Majeed tells NIA,” http://timesofindia.indiatimes.com/india/I-cleaned-toilets-while-in-ISIS-Kalyan-youth-Areeb-Majeed-tells-NIA/articleshow/45328623.cms, November 30, 2014
Chapter 14:
1. Kaplan, Fred, Dark Territory: The Secret History of Cyber War. Simon & Schuster, NY, NY, 2016, pp. 213–14