Could a few malicious actors use everyday online tools such as Twitter and Facebook—with no hacking involved—to carry out terrorist activity?