Cyber Crime and Cyber Terrorism


RADICALIZATION PROCESS ON THE INTERNET



Download 5,67 Mb.
Pdf ko'rish
bet132/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   128   129   130   131   132   133   134   135   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

RADICALIZATION PROCESS ON THE INTERNET
Internet users or terrorist sympathizers are initially attracted to the terrorist environ-
ment through video sharing websites such as YouTube where videos showing terror-
ist attacks are displayed. The YouTube accounts refer to a URL of a terrorist forum 
where people can click to access the forum, and they can join the forum by sending 
an email to its administrators.
When the “junior member” joins the forum, they will be tested to fulfill basic 
tasks. They will be then assessed, and based on good results, will be granted a higher 
rank such as “member,” “confirmed member,” “senior member,” etc. At the same 
time they will also be granted more privileges, for example they could be given the 
task to administrate new comers on the forum. After a certain time one of the top 
administrators will ask the “senior member” to meet physically in order to further as-
sess and validate that person as a good candidate. Following this crucial meeting the 
“new recruit” is introduced to a very small network of much radicalized individuals 
via VoIP such as Skype or Paltalk. This is where the candidate is entrusted with sensi-
tive information, including where attacks are planned or targets designated.
PARTICULAR CASE: LONE WOLF
By definition Lone Wolves are the most difficult individuals to detect since they act 
alone and do not use the Internet to communicate with peers. However, they use the 
Internet to prepare their attacks and also to advertise their claims in videos or emails 
for instance. They also use the Internet to interact with persons/groups which are hav-
ing similar ideologies and sometimes express their discontent on Social Networks.
Lone Wolves can be investigated by detect browsing deviation and also the on-
line purchase of products such as explosives, precursors in the view of building IED 
(Improvised Explosive Device) or weapons.
Also, some cases reported that the “insider” threat should not be neglected. Usually 
these are highly skilled or knowledgeable people who have access to an environment 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   128   129   130   131   132   133   134   135   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish