Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet138/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   134   135   136   137   138   139   140   141   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

131
 
Conclusion
FULL VPN
As communication and exchange between members of a terrorist cell or organization 
is crucial, some existing devices can be leveraged to better enforce anonymity. For 
instance by having a full VPN service across the members and having all communi-
cations going through this VPN central point.
Nowadays devices such as NAS (Network Attached Storage) are now providing 
a number of additional services which are easy to install on top of providing stor-
age. We can imagine having such a NAS installed in a safe or unsuspected location 
or in a nursing place with a broadband ADSL access. If sufficient trust is placed by 
a terrorist organization on the NAS device, this device can be configured to enable 
VPN only communications, and through this channel provide additional dedicated 
VoIP (Voice over IP) telephony, email servers, web server, video server, file sharing/
storage, any other kind of application needed by the cell and/or group to function and 
prepare an attack.
This has the advantage of being accessible not only by laptops and workstations 
but also by smartphones that are all now supporting VPN functionalities. This allows 
the cell/group members to use the different services without having to actually do 
a real phone call or exchange of information outside the VPN and thus they remain 
undetectable.
From this perspective, it is quite difficult to identify that a particular VPN connec-
tion is used by a terrorist group/cell. In a case where it is identified, it would then be 
difficult to access the content of the exchange over the encryption implementation via 
electronic surveillance. Lastly, if the end-points are used solely for VPN communica-
tions, it adds a difficulty in identifying the people who are connecting to the NAS.
Unless, one or several of those members make some mistakes that can lead to 
identify them via electronic surveillance; Law Enforcement have to use more tradi-
tional investigation methods to identify the terrorist group.
CONCLUSION
As of today and seen in this chapter, terrorist organizations use the Internet mainly 
for spreading their ideas and communicating. However, as technology develops, the 
availability of a variety of offerings in the underground market, and the decreasing 
skills required to perform cyber-attacks will certainly attract those groups to leverage 
their traditional attacks into cyber ones.
We have seen that a CyberTerrorist-like attack is already possible but not yet in 
the reach of terrorist organizations which remains at the level of state-sponsored 
teams or capabilities. Though still very expansive and requiring a lot of expertise and 
resources, this will undoubtedly be in the reach of terrorists in a few years.
Also seen in this chapter, criminals are early adopters of new technologies not 
only to exploit those technologies to their advantages but also to keep ahead of law 
enforcement and regulations. Nevertheless, terrorist groups are more careful and will 
rather seek proven technologies or mimic existing one by developing their own.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   134   135   136   137   138   139   140   141   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish