Robert Gottlieb on his career as an editor and publisher, and a life spent among many of America's greatest writers.
Last August, ISIS released a video showing the brutal beheading of journalist James Foley. With this act, ISIS came to the attention of much of the world. But the terrorist group that seemed to spring out of nowhere has its roots in Iraq and the U.S. invasion. Once a part of Al Qaeda, ISIS went on to sharply differentiate itself from central command. In a new book, “ISIS: State of Terror,” two experts on terrorism say ISIS’s tactics – including their use of violence and their manipulation of social media – is unprecedented and will permanently alter the way terrorist groups operate in the future. Co-authors Jessica Stern and J.M. Berger join Diane to discuss the history, evolution and reach of ISIS.
- Jessica Stern author, "ISIS: The State of Terror." She is a lecturer of terrorism at Harvard University and the author of "Denial: A Memoir of Terror" and "Terror in the Name of God: Why Religious Militants Kill."
- J.M. Berger author, "ISIS: The State of Terror." He is the author of "Jihad Joe: Americans Who Go to War in the Name of Islam" and editor of Intelwire.com.
Read A Featured Excerpt
Adapted from ISIS: The State Of Terror. Copyright © 2015 by Jessica Stern and J.M. Berger. Excerpted by permission of Ecco Books, a division of HarperCollins Publishers. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Most Recent Shows
Morning-after analysis of the first presidential debate between Hillary Clinton and Donald Trump. How the candidates compare on the issues and whether they sway any undecided voters.
The Pulitzer Prize-winning creator of "Bloom County" on the revival of his beloved comic strip after a 25-year hiatus and a new book about the origins of Bill The Cat.
Yahoo says information from 500 million users was stolen by hackers. This comes amid growing concern over intrusions into U.S. election systems. In an era of increasing state-sponsored cyber threats, protecting our personal data and the integrity of U.S. voting.