Online Terrorist Propaganda, Recruitment, and Radicalization

Author:   John R. Vacca (TechWrite, Pomeroy, Ohio, USA)
Publisher:   Taylor & Francis Ltd
ISBN:  

9781138048263


Pages:   504
Publication Date:   09 August 2019
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $231.00 Quantity:  
Add to Cart

Share |

Online Terrorist Propaganda, Recruitment, and Radicalization


Add your own review!

Overview

Full Product Details

Author:   John R. Vacca (TechWrite, Pomeroy, Ohio, USA)
Publisher:   Taylor & Francis Ltd
Imprint:   CRC Press
Weight:   1.133kg
ISBN:  

9781138048263


ISBN 10:   1138048267
Pages:   504
Publication Date:   09 August 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Part I: Introduction Chapter 1: Online Utilization For Terrorist Self-Radicalization Purposes Chapter 2: Countering Online Terrorist Recruitment Activities Chapter 3: Rule-Of-Law And Respect For Human Rights Considerations Part II: A Transnational Recruitment Problem Of Violent Online Extremist Terrorists Chapter 4: How The Threat From Violent Extremism Has Evolved Chapter 5: The Development Of How To Counter Violent Extremism Chapter 6: Global Online Counter-Terrorism Strategy Part III: Policy And Legislative Frameworks Responses To Threats Presented By Online Terrorists Chapter 7: National Policies And Legislative Frameworks Chapter 8: Legislation Specifically Targeting The Use Of The Internet To Recruit Terrorists Chapter 9: Developing International /Universal Online Counter-Terrorist Recruitment Legal Instruments Chapter 10: Enforcement Of Criminal Offences: Specifically Targeting The Use Of The Internet To Incite Terrorists Chapter 11: Legal Restrictions and Challenges for Police and Law Enforcement Authorities Part IV: Investigations And Intelligence-Gathering Of Terrorism-Related Online Activities Chapter 12: Tools In The Commission Of Terrorist Offenses Involving The Internet Chapter 13: Investigations Of Terrorist Cases Involving The Internet Chapter 14: Forensic Data Preservation And Recovery Chapter 15: Supporting The Authentication Of Digital Evidence Chapter 16: Operational Cybercrime Units: Forensic Retrieval Of Computer-Based Chapter 17: The Intelligence-Gathering And Investigative Phase Of Online Counter-Terrorism Operations Chapter 18: Training In The Technical Aspects Of How Terrorists And Other Criminals Can Use The Internet Part V: ISIS And The Dark Web Chapter 19: How The Dark Web Has Become ISIS' Number One Recruiting and Engagement Platform Chapter 20: How ISIS Is Using The Dark Web For Propaganda Purposes Chapter 21: How To Access The Dark Web and Track ISIS Chapter 22: How To Infiltrate ISIS On The Dark Or Deep Web Chapter 23: How To Fight And Contain ISIS On The Dark Or Deep Web Chapter 24: How The U.S.’ DoD Is Fighting ISIS On The Deep Web Part VI: International Cooperation With Online Terrorism Chapter 25: Instruments And Arrangements Against Online Terrorism Chapter 26: Intelligence Sharing among Agencies and Internationally Chapter 27: National Legislative Frameworks: Investigation And Prosecution Of Online Terrorism Cases Chapter 28: Non-Legislative Measures: A Critical Factor In The Successful Investigation And Prosecution Of Online Terrorism-Related Offenses Part VII: Prosecutions: The Universal Legal Framework Against Online Terrorism Chapter 29: A Rule-Of-Law Approach To Criminal Prosecutions Of Extremely Violent Online Terrorists Chapter 30: Role Of Prosecutors In Online Terrorism Cases Chapter 31: The Charging Phase: Decisions Of Whether To Charge Online Terrorists Chapter 32: The Trial Phase: Evidential Issues Related To The Use Of Intelligence-Based Evidence In Dealing With Online Terrorism Part VIII: Private Sector Cooperation And Responsibility and the Future of Countering Online Radicalization Chapter 33: Public-Private Partnerships’ and the Private Sector’s Role In Countering The Use Of The Internet For Terrorist Purposes Chapter 34: Advanced Drone and Satellite Surveillance

Reviews

Author Information

"John R. Vacca is an information technology consultant, researcher, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, he has authored 81 books and more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. He is also a former configuration management specialist, computer specialist, and computer security official (CSO) for NASA’s space station program, Freedom, and the International Space Station Program from 1988 until his retirement from NASA in 1995. In addition, he is also an independent online book reviewer. Finally, he was one of the security consultants for the MGM movie titled ""AntiTrust,"" which was released in January 2001. A detailed copy of the author’s bio can be viewed at http://www.johnvacca.com."

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List