Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet129/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   125   126   127   128   129   130   131   132   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

121
 
References
Vamosi, R., 2008. Anonymous hackers take on the church of scientology. 24th January 
2008 CNET. [online], 
http://news.cnet.com/8301-10789_3-9857666-57.html
(accessed 
13.12.13).
Williams, D., 2009. Spymaster sees Israel as world cyberwar leader. 15th December 2009 
Reuters. [online], 
http://www.reuters.com/article/2009/12/15/us-security-israel-cyberwar-
fare-idUSTRE5BE30920091215
 (accessed 13.12.13).
World Internet Usage and Population Statistics, 2012. [online], 
http://www.internetworldstats.
com/stats.htm
(accessed 16.11.12).
Zetter, K., 2010. Blockbuster worm aimed for infrastructure, but no proof Iran nukes were 
target. 23rd September 2010 Wired. [online], 
http://www.wired.com/threatlevel/2010/09/
stuxnet/
 (accessed 02.02.14).


CHAPTER
123
10
Terrorist use of the 
internet
Bruno Halopeau
TERRORIST USE OF THE INTERNET
This chapter is not only an attempt to describe how terrorist groups use the Internet 
but it also provides information on how the internet could be used in the near future 
taking into account the latest technological developments. Numerous articles have 
already been written on the subject but they have treated it partially, focusing on the 
propaganda side or on the hacking and “technical” side. In this chapter, the propa-
ganda and the encryption techniques used by terrorists will be described.
PROPAGANDA—INDOCTRINATION—RECRUITMENT
The use of Internet by terrorists has been described for many years as a growing 
trend. In reality, this phenomenon is more limited than it seems to be. In the articles 
provided by news media and so-called experts, there has been an attempt to provide 
an estimate on the number of terrorist websites (
Weimann, 2008
). However these 
statistics do not mean anything on their own; they have to be compared with the total 
number of websites available on the web.
Terrorist organizations generally use the Internet for propaganda purposes. The 
worldwide web and steady developments of web 2.0 have given an opportunity to the 
public to easily access and publish information. High IT skills are no longer neces-
sary to publish and post information, photos and videos online and it is also a very 
cost effective method of communication.
Terrorist propaganda on the Internet is disseminated through several types of plat-
forms; video sharing websites such as YouTube; online Social Network services such 
as Facebook; and through traditional online forums and blogs.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   125   126   127   128   129   130   131   132   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish