Catherine A. Theohary & John Rollins, Terrorist Use of the Internet: Information Operations in Cyberspace (Cong. Res. Serv. R41674) (Mar. 8, 2011) (full-text).
This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas. This discussion covers terrorist information operations in cyberspace but does not discuss similar activities in other domains. The government response is also discussed in terms of information operations.