{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Introduction\r",
      "startTime": 0,
      "endTime": 170
    },
    {
      "title": "Erez's Background and Career Journey\r",
      "startTime": 170,
      "endTime": 371
    },
    {
      "title": "Role and Risks of a Fixer\r",
      "startTime": 371,
      "endTime": 439
    },
    {
      "title": "Evolution of Terrorist Messaging\r",
      "startTime": 439,
      "endTime": 481
    },
    {
      "title": "ISIS and the Use of Soft Power\r",
      "startTime": 481,
      "endTime": 829
    },
    {
      "title": "Social Media Platforms and Terrorism\r",
      "startTime": 829,
      "endTime": 1027
    },
    {
      "title": "AI and Terrorist Recruitment\r",
      "startTime": 1027,
      "endTime": 1170
    },
    {
      "title": "Gaming Platforms and Terrorist Infiltration\r",
      "startTime": 1170,
      "endTime": 1290
    },
    {
      "title": "Efforts to Combat Terrorist Influence\r",
      "startTime": 1290,
      "endTime": 1505
    },
    {
      "title": "Al Qaeda's Strategy and Influence\r",
      "startTime": 1505,
      "endTime": 2531
    },
    {
      "title": "Russia's Role in Terrorism\r",
      "startTime": 2531,
      "endTime": 3014
    },
    {
      "title": "Domestic Terrorist Threats\r",
      "startTime": 3014,
      "endTime": 3239
    },
    {
      "title": "Conclusion and Final Thoughts",
      "startTime": 3239,
      "endTime": 0
    }
  ]
}