Online Terrorist Propaganda, Recruitment, and Radicalization. ([2020])
- Record Type:
- Book
- Title:
- Online Terrorist Propaganda, Recruitment, and Radicalization. ([2020])
- Main Title:
- Online Terrorist Propaganda, Recruitment, and Radicalization
- Further Information:
- Note: Edited by John R. Vacca.
- Other Names:
- Vacca, John R
- Contents:
- Part I: Introduction Chapter 1: Online Utilization For Terrorist Self-Radicalization Purposes Chapter 2: Countering Online Terrorist Recruitment Activities Chapter 3: Rule-Of-Law And Respect For Human Rights Considerations Part II: A Transnational Recruitment Problem Of Violent Online Extremist Terrorists Chapter 4: How The Threat From Violent Extremism Has Evolved Chapter 5: The Development Of How To Counter Violent Extremism Chapter 6: Global Online Counter-Terrorism Strategy Part III: Policy And Legislative Frameworks Responses To Threats Presented By Online Terrorists Chapter 7: National Policies And Legislative Frameworks Chapter 8: Legislation Specifically Targeting The Use Of The Internet To Recruit Terrorists Chapter 9: Developing International /Universal Online Counter-Terrorist Recruitment Legal Instruments Chapter 10: Enforcement Of Criminal Offences: Specifically Targeting The Use Of The Internet To Incite Terrorists Chapter 11: Legal Restrictions and Challenges for Police and Law Enforcement Authorities Part IV: Investigations And Intelligence-Gathering Of Terrorism-Related Online Activities Chapter 12: Tools In The Commission Of Terrorist Offenses Involving The Internet Chapter 13: Investigations Of Terrorist Cases Involving The Internet Chapter 14: Forensic Data Preservation And Recovery Chapter 15: Supporting The Authentication Of Digital Evidence Chapter 16: Operational Cybercrime Units: Forensic Retrieval Of Computer-Based Chapter 17: ThePart I: Introduction Chapter 1: Online Utilization For Terrorist Self-Radicalization Purposes Chapter 2: Countering Online Terrorist Recruitment Activities Chapter 3: Rule-Of-Law And Respect For Human Rights Considerations Part II: A Transnational Recruitment Problem Of Violent Online Extremist Terrorists Chapter 4: How The Threat From Violent Extremism Has Evolved Chapter 5: The Development Of How To Counter Violent Extremism Chapter 6: Global Online Counter-Terrorism Strategy Part III: Policy And Legislative Frameworks Responses To Threats Presented By Online Terrorists Chapter 7: National Policies And Legislative Frameworks Chapter 8: Legislation Specifically Targeting The Use Of The Internet To Recruit Terrorists Chapter 9: Developing International /Universal Online Counter-Terrorist Recruitment Legal Instruments Chapter 10: Enforcement Of Criminal Offences: Specifically Targeting The Use Of The Internet To Incite Terrorists Chapter 11: Legal Restrictions and Challenges for Police and Law Enforcement Authorities Part IV: Investigations And Intelligence-Gathering Of Terrorism-Related Online Activities Chapter 12: Tools In The Commission Of Terrorist Offenses Involving The Internet Chapter 13: Investigations Of Terrorist Cases Involving The Internet Chapter 14: Forensic Data Preservation And Recovery Chapter 15: Supporting The Authentication Of Digital Evidence Chapter 16: Operational Cybercrime Units: Forensic Retrieval Of Computer-Based Chapter 17: The Intelligence-Gathering And Investigative Phase Of Online Counter-Terrorism Operations Chapter 18: Training In The Technical Aspects Of How Terrorists And Other Criminals Can Use The Internet Part V: ISIS And The Dark Web Chapter 19: How The Dark Web Has Become ISIS' Number One Recruiting and Engagement Platform Chapter 20: How ISIS Is Using The Dark Web For Propaganda Purposes Chapter 21: How To Access The Dark Web and Track ISIS Chapter 22: How To Infiltrate ISIS On The Dark Or Deep Web Chapter 23: How To Fight And Contain ISIS On The Dark Or Deep Web Chapter 24: How The U.S.’ DoD Is Fighting ISIS On The Deep Web Part VI: International Cooperation With Online Terrorism Chapter 25: Instruments And Arrangements Against Online Terrorism Chapter 26: Intelligence Sharing among Agencies and Internationally Chapter 27: National Legislative Frameworks: Investigation And Prosecution Of Online Terrorism Cases Chapter 28: Non-Legislative Measures: A Critical Factor In The Successful Investigation And Prosecution Of Online Terrorism-Related Offenses Part VII: Prosecutions: The Universal Legal Framework Against Online Terrorism Chapter 29: A Rule-Of-Law Approach To Criminal Prosecutions Of Extremely Violent Online Terrorists Chapter 30: Role Of Prosecutors In Online Terrorism Cases Chapter 31: The Charging Phase: Decisions Of Whether To Charge Online Terrorists Chapter 32: The Trial Phase: Evidential Issues Related To The Use Of Intelligence-Based Evidence In Dealing With Online Terrorism Part VIII: Private Sector Cooperation And Responsibility and the Future of Countering Online Radicalization Chapter 33: Public-Private Partnerships’ and the Private Sector’s Role In Countering The Use Of The Internet For Terrorist Purposes Chapter 34: Advanced Drone and Satellite Surveillance … (more)
- Publisher Details:
- Boca Raton, FL : CRC Press
- Publication Date:
- 2020
- Extent:
- 1 online resource (533 pages)
- Subjects:
- 363.325
Internet and terrorism
Terrorists -- Recruiting
Terrorists -- Recruiting -- Technological innovations
Terrorism -- Computer network resources
Radicalization -- Computer network resources
Social media -- Political aspects
Internet -- Political aspects
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism
POLITICAL SCIENCE -- Political Freedom & Security -- International Security
COMPUTERS -- Internet -- General
Internet and terrorism
Internet -- Political aspects
Social media -- Political aspects
Terrorists -- Recruiting
Electronic books - Languages:
- English
- ISBNs:
- 1315170256
9781351691345
1351691341
9781351691352
9781315170251 - Related ISBNs:
- 135169135X
9781351691369
1351691368 - Notes:
- Note: Online resource; title from PDF title page (EBSCO, viewed September 3, 2019)
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.445105
- Ingest File:
- 02_573.xml