Sabotage Child Exploitation Use of Technology in Crime ISIS Military Operations Weaponization Online Terrorism State-Sponsored Crime Kidnapping Threats Human Trafficking State-Sponsored Terrorism Investigation Techniques Incitement Influencers Online Platforms Explosions Terror Financing Evidence Collection Content Moderation Swatting Extremism Incitement to Violence Radicalization Legislation Ciberterrorismo High-Profile Cases Online Propaganda Hybrid Warfare Use of Social Media by Terrorists
Investigators are tracing leads to identify who sent identical IS-referencing bomb threats that authorities deemed non-credible.