. . . "Jihadists use all the Internet???s features, including Web sites, message boards, e-mail, e-groups, blogs, online storage, BitTorrent, maps, instant messaging, Voice over IP and online remittance services." . . .