Acknowledgements |
|
xi | |
Foreword |
|
xiii | |
|
1 One man's terrorist is another man's Facebook friend |
|
|
1 | (33) |
|
1.1 Background to the development of social media |
|
|
3 | (4) |
|
1.1.1 Development of social media |
|
|
3 | (4) |
|
1.2 What is terrorism? An evolving concept or just a word |
|
|
7 | (25) |
|
|
8 | (1) |
|
|
8 | (1) |
|
1.2.2.1 Lessons from history |
|
|
9 | (3) |
|
1.2.2.2 Finding a consensus as to the modern definition of terrorism |
|
|
12 | (2) |
|
1.2.2.3 Distinction: a path to definition? |
|
|
14 | (1) |
|
1.2.2.3 Guerrilla warfare or terrorism? |
|
|
15 | (1) |
|
1.2.2.4 Criminal activity |
|
|
16 | (1) |
|
1.2.2.4 Narco-terrorism -- same product, or just a different brand? |
|
|
17 | (3) |
|
1.2.3 Towards a framework |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
1.2.4.2 International instruments |
|
|
22 | (1) |
|
1.2.4.2.1 Ruggie Principles and multilateralism |
|
|
22 | (2) |
|
1.2.4.2.2 United Nations General Assembly global counter-terrorism strategy |
|
|
24 | (1) |
|
1.2.4.2.3 The World Summit outcome |
|
|
24 | (2) |
|
1.2.4.3 National legislation |
|
|
26 | (1) |
|
1.2.4.3.1 Terrorism Act 2000 |
|
|
26 | (2) |
|
1.2.4.4 The American context |
|
|
28 | (1) |
|
1.2.4.5 Definitions adopted in other jurisdictions |
|
|
29 | (1) |
|
1.2.5 What is not terrorism? |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (2) |
|
2 Terrorism's love affair with social media |
|
|
34 | (31) |
|
2.1 Terrorism and the media tour de force |
|
|
37 | (7) |
|
2.1.1 Campaign 1: beta media |
|
|
38 | (3) |
|
|
41 | (1) |
|
2.1.2.1 Adoption of social media |
|
|
41 | (3) |
|
|
44 | (3) |
|
2.2.1 Philosophical arguments in favour of freedom of expression |
|
|
44 | (1) |
|
2.2.2 Legal protection of freedom of expression |
|
|
45 | (1) |
|
2.2.2.1 The Johannesburg Principles |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
2.3 Terror groups' use of social media |
|
|
47 | (18) |
|
2.3.1 Growth of terrorist organisations online presence |
|
|
48 | (1) |
|
2.3.2 Mobilisation of online battalions |
|
|
49 | (1) |
|
2.3.3 Strategies deployed |
|
|
50 | (2) |
|
2.3.4 Image is everything |
|
|
52 | (6) |
|
2.3.5 Refer, recruit, reward |
|
|
58 | (2) |
|
2.3.6 Jihadi whispers: is it official yet? |
|
|
60 | (1) |
|
|
61 | (2) |
|
2.3.7 The command and control network |
|
|
63 | (1) |
|
2.3.8 Will social media replace the forums? |
|
|
64 | (1) |
|
3 Freedom of the newsfeed |
|
|
65 | (28) |
|
3.1 Freedom of the newsfeed |
|
|
66 | (11) |
|
3.1.1 Takedown requests made by the state |
|
|
67 | (1) |
|
3.1.1.1 Restrictions on freedom of expression |
|
|
67 | (1) |
|
3.1.2 The margin of appreciation |
|
|
68 | (2) |
|
3.1.3 Legislation restricting freedom of expression |
|
|
70 | (2) |
|
3.1.4 Offensive content and hate speech |
|
|
72 | (3) |
|
|
75 | (2) |
|
|
77 | (9) |
|
|
77 | (1) |
|
3.2.2 Locating social media sites within an existing statutory framework |
|
|
78 | (3) |
|
|
81 | (1) |
|
3.2.4 Filtering and content blocking |
|
|
82 | (4) |
|
|
86 | (7) |
|
|
86 | (2) |
|
|
88 | (2) |
|
3.3.3 A question of trust? |
|
|
90 | (3) |
|
4 The spy who liked my tweet: counter-intelligence and the terrorists' reaction to Snowden |
|
|
93 | (53) |
|
|
96 | (12) |
|
4.1.1 The importance of privacy |
|
|
96 | (1) |
|
|
97 | (3) |
|
4.1.3 The value of privacy |
|
|
100 | (2) |
|
4.1.4 Checks and balances on the right to privacy |
|
|
102 | (1) |
|
|
102 | (2) |
|
4.1.6 The private sector's role in privacy protection |
|
|
104 | (4) |
|
4.2 Surveillance: a potted history |
|
|
108 | (19) |
|
4.2.1 The origins of modern surveillance |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (2) |
|
4.2.4 What I talk about, when I talk about surveillance |
|
|
114 | (1) |
|
|
115 | (1) |
|
4.2.4.1.1 Targeted warrants |
|
|
115 | (1) |
|
4.2.4.2 Communications data |
|
|
116 | (2) |
|
|
118 | (2) |
|
4.2.5 A wider playing field |
|
|
120 | (1) |
|
|
120 | (2) |
|
4.2.7 Powers outside RIPA |
|
|
122 | (1) |
|
4.2.8 The future of surveillance |
|
|
123 | (3) |
|
|
126 | (1) |
|
4.3 Cat and mouse: the terrorists' response |
|
|
127 | (11) |
|
4.3.1 #Carelesstalkcostslives |
|
|
127 | (1) |
|
4.3.2 Of politics and policies: the Ladybird guide to online jihad |
|
|
128 | (5) |
|
4.3.3 Dear Deidre: Jihadi agony aunts |
|
|
133 | (1) |
|
4.3.4 There's an app for that |
|
|
134 | (4) |
|
|
138 | (8) |
|
|
146 | (19) |
|
5.1 Official counter-narratives |
|
|
147 | (9) |
|
5.1.1 `Official' postings |
|
|
147 | (3) |
|
|
150 | (4) |
|
5.1.2.1 Are counter narratives successful? |
|
|
154 | (2) |
|
5.2 Responses from the social media community |
|
|
156 | (6) |
|
|
156 | (1) |
|
5.2.2 Public outrage/grief |
|
|
157 | (2) |
|
5.2.3 The ethics of posting graphic content and blackouts |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (3) |
|
|
162 | (1) |
|
|
162 | (3) |
|
6 National security and the `fourth estate' in a brave new social media world |
|
|
165 | (28) |
|
|
6.1 The media landscape: a multi-jurisdictional perspective on the purpose of the media as the fourth estate' |
|
|
165 | (4) |
|
6.2 Reporting on terrorism: legal principles and frameworks |
|
|
169 | (14) |
|
6.2.1 The role of the state in protecting `public order' |
|
|
170 | (2) |
|
6.2.2 The international legal framework |
|
|
172 | (4) |
|
6.2.3 A view from the UK Part 1: David Miranda, Glenn Greenwald, Edward Snowden and the Terrorism Act 2000 |
|
|
176 | (4) |
|
6.2.4 A view from the UK Part 2: The Terrorism Act 2006 |
|
|
180 | (3) |
|
6.3 The demise of the traditional fourth estate' and the emergence of citizen journalism |
|
|
183 | (9) |
|
6.3.1 The `fourth estate' and the reporting of terrorist activity |
|
|
183 | (3) |
|
6.3.2 The demise of the traditional media and the rise of citizen journalism: a brave new world |
|
|
186 | (6) |
|
|
192 | (1) |
Index |
|
193 | |