Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet212/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   208   209   210   211   212   213   214   215   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

207
 
LEA usage scenarios for social media
referenced using robust, “closed-source” intelligence sources such as the healthcare 
and criminal records of the individual making the threat, and the individual's prox-
imity to the location that the threat is being made against. This cross-referencing of 
intelligence then builds up a robust portfolio of knowledge that then can be used to 
assess the severity and validity of the threat being made, which in turn can be filtered 
down to operational officers in instances where further, on scene action is required.
A key concern that has been associated with applying data mined from social 
media in this way is that it is considered extremely challenging to separate genuine 
threats from the emotional outbursts and tongue-in-cheek musings of disgruntled 
individuals. This is where an understanding of different types of user behavior on 
social media is of significance. The cross-referencing of threat indicators from social 
media with robust closed-source intelligence sources is extremely valuable in aiding 
to distinguish likely and probable threats from the “noise” of social media. For fur-
ther validity, threat indication can also trigger additional analysis of an individual's 
social media presence, as individuals commonly use the same alias' and user-names 
across services, looking to identify any other potential indicators that the individual 
may be capable, and intent upon committing the crime to which they have been 
threatening across a range of social media platforms. For example, this process could 
entail the identification that an individual has photographs of themselves posing with 
weapons, thus providing further validity to the case that the individual is capable of 
carrying out the threat to which they have eluded.
SOCIAL MEDIA-BASED APPROACH IN A HOSTAGE SCENARIO
Hostage situations are defined as events whereby the actor(s) (i.e., the hostage taker(s)) 
are holding one of more persons captive against their will. The motives for these at-
tacks can be diverse, and vary from expressive motives such as voicing an opinion 
or religious view to instrumental motives such as for financial gain through ransom 
demands (
Alexander and Klein, 2009
). There are a number of possibilities for com-
munication and the use of social media during hostage situations with the victims
hostage takers, LEAs, media outlets and public bystanders all possessing the potential 
to comment and monitor the situation before, during, and after the event itself.
In addition, the hostage takers may monitor the outside situation and make iden-
tity checks on hostages using social media profiles and web searches such as that 
exemplified during the Mumbai attacks (
Oh et al., 2011
); they may also select their 
hostages via social media by monitoring movements or personal possessions. On rare 
occasions, hostages themselves may also be able to covertly contact family, friends 
or LEAs, real-time comments and updates can also be posted by news organiza-
tions and bystanders, LEAs are also able to use social media to communicate official 
information while they can also obtain background information on hostage takers' 
political, religious, and personal standpoints posted online to facilitate negotiation 
by understanding their motives. For example, two scenarios where LEAs could use 
social media are for the prevention of the spread of sensitive operational details and 
to understand the motives behind a given hostage situation.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   208   209   210   211   212   213   214   215   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish