Table of Contents
Part I: Introduction
Chapter 1: Online Utilization For Terrorist Self-Radicalization Purposes
Chapter 2: Countering Online Terrorist Recruitment Activities
Chapter 3: Rule-Of-Law And Respect For Human Rights Considerations
Part II: A Transnational Recruitment Problem Of Violent Online Extremist Terrorists
Chapter 4: How The Threat From Violent Extremism Has Evolved
Chapter 5: The Development Of How To Counter Violent Extremism
Chapter 6: Global Online Counter-Terrorism Strategy
Part III: Policy And Legislative Frameworks Responses To Threats Presented By Online Terrorists
Chapter 7: National Policies And Legislative Frameworks
Chapter 8: Legislation Specifically Targeting The Use Of The Internet To Recruit Terrorists
Chapter 9: Developing International /Universal Online Counter-Terrorist Recruitment Legal Instruments
Chapter 10: Enforcement Of Criminal Offences: Specifically Targeting The Use Of The Internet To Incite Terrorists
Chapter 11: Legal Restrictions and Challenges for Police and Law Enforcement Authorities
Part IV: Investigations And Intelligence-Gathering Of Terrorism-Related Online Activities
Chapter 12: Tools In The Commission Of Terrorist Offenses Involving The Internet
Chapter 13: Investigations Of Terrorist Cases Involving The Internet
Chapter 14: Forensic Data Preservation And Recovery
Chapter 15: Supporting The Authentication Of Digital Evidence
Chapter 16: Operational Cybercrime Units: Forensic Retrieval Of Computer-Based
Chapter 17: The Intelligence-Gathering And Investigative Phase Of Online Counter-Terrorism Operations
Chapter 18: Training In The Technical Aspects Of How Terrorists And Other Criminals Can Use The Internet
Part V: ISIS And The Dark Web
Chapter 19: How The Dark Web Has Become ISIS' Number One Recruiting and Engagement Platform
Chapter 20: How ISIS Is Using The Dark Web For Propaganda Purposes
Chapter 21: How To Access The Dark Web and Track ISIS
Chapter 22: How To Infiltrate ISIS On The Dark Or Deep Web
Chapter 23: How To Fight And Contain ISIS On The Dark Or Deep Web
Chapter 24: How The U.S.’ DoD Is Fighting ISIS On The Deep Web
Part VI: International Cooperation With Online Terrorism
Chapter 25: Instruments And Arrangements Against Online Terrorism
Chapter 26: Intelligence Sharing among Agencies and Internationally
Chapter 27: National Legislative Frameworks: Investigation And Prosecution Of Online Terrorism Cases
Chapter 28: Non-Legislative Measures: A Critical Factor In The Successful Investigation And Prosecution Of Online Terrorism-Related Offenses
Part VII: Prosecutions: The Universal Legal Framework Against Online Terrorism
Chapter 29: A Rule-Of-Law Approach To Criminal Prosecutions Of Extremely Violent Online Terrorists
Chapter 30: Role Of Prosecutors In Online Terrorism Cases
Chapter 31: The Charging Phase: Decisions Of Whether To Charge Online Terrorists
Chapter 32: The Trial Phase: Evidential Issues Related To The Use Of Intelligence-Based Evidence In Dealing With Online Terrorism
Part VIII: Private Sector Cooperation And Responsibility and the Future of Countering Online Radicalization
Chapter 33: Public-Private Partnerships’ and the Private Sector’s Role In Countering The Use Of The Internet For Terrorist Purposes
Chapter 34: Advanced Drone and Satellite Surveillance