Affiliation:
1. Griffith University, Australia
Abstract
In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.
Reference36 articles.
1. MOR: Monitoring and Measurements through the Onion Router
2. Confronting the one-man wolf pack: Adapting law enforcement and prosecution responses to the threat of lone wolf terrorism.;B.Barnes;Boston University Law Review. Boston University. School of Law,2012
3. Why the Internet Is Not Increasing Terrorism
4. Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet
5. California Department of Forestry and Fire Protection (CAL FIRE). (2012). A practical test of the ‘Ember Bomb’ as described in Inspire, Issue 9. California State Threat Assessment Center.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting Markers of Radicalisation in Social Media Posts;International Journal of Cyber Warfare and Terrorism;2021-04