dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Grobler, M
|
|
dc.date.accessioned |
2012-04-17T13:48:28Z |
|
dc.date.available |
2012-04-17T13:48:28Z |
|
dc.date.issued |
2011-03 |
|
dc.identifier.citation |
Veerasamy, N and Grobler, M. Terrorist use of the Internet: exploitation and support through ICT infrastructure. 6th International Conference on Information Warfare and Security, George Washington University, Washington, DC, 17-18 March 2011 |
en_US |
dc.identifier.isbn |
97-1-906638-92-4 |
|
dc.identifier.uri |
http://academic-conferences.org/iciw/iciw2012/iciw11-proceedings.htm
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/5781
|
|
dc.description |
6th International Conference on Information Warfare and Security, George Washington University, Washington, DC, 17-18 March 2011 |
en_US |
dc.description.abstract |
The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides an enormous amount of information, and enables relatively cheap and instant communication across the globe. As a result, the conventional view of many traditional terrorist groups shifted to embrace the use of technology within their functions. The goal of this paper is to represent the functions and methods that terrorists have come to rely on through the ICT infrastructure. The discussion sheds light on the technical and practical role that ICT infrastructure plays in the assistance of terrorism. The use of the Internet by terrorist groups has expanded from traditional Internet usage to more innovative usage of both traditional and new Internet functions. Global terrorist groups can now electronically target an enormous amount of potential recipients, recruitees and enemies. The aim of the paper is to show how the Internet can be used to enable terrorism, as well as provide technical examples of the support functionality and exploitation. This paper summarises the high-level functions, methods and examples for which terrorists utilise the Internet. This paper looks at the use of the Internet as both a uni-directional and bi-directional tool to support functionality like recruitment, propaganda, training, funding and operations. It also discusses specific methods like the dissemination of web literature, social-networking tools, anti-forensics and fund-raising schemes. Additional examples, such as cloaking and coding techniques, are also provided. In order to analyse how ICT infrastructure can be used in the support of terrorism, a mapping is given of communication direction to the traditional Internet use functions and methods, as well as to innovative Internet functions and methods. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences Limited |
en_US |
dc.relation.ispartofseries |
Workflow;6320 |
|
dc.subject |
Anti-forensics |
en_US |
dc.subject |
Internet |
en_US |
dc.subject |
Terrorism |
en_US |
dc.subject |
ICT |
en_US |
dc.subject |
Propaganda |
en_US |
dc.subject |
Social networking |
en_US |
dc.title |
Terrorist use of the Internet: exploitation and support through ICT infrastructure |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Veerasamy, N., & Grobler, M. (2011). Terrorist use of the Internet: exploitation and support through ICT infrastructure. Academic Conferences Limited. http://hdl.handle.net/10204/5781 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, and M Grobler. "Terrorist use of the Internet: exploitation and support through ICT infrastructure." (2011): http://hdl.handle.net/10204/5781 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Grobler M, Terrorist use of the Internet: exploitation and support through ICT infrastructure; Academic Conferences Limited; 2011. http://hdl.handle.net/10204/5781 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Grobler, M
AB - The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides an enormous amount of information, and enables relatively cheap and instant communication across the globe. As a result, the conventional view of many traditional terrorist groups shifted to embrace the use of technology within their functions. The goal of this paper is to represent the functions and methods that terrorists have come to rely on through the ICT infrastructure. The discussion sheds light on the technical and practical role that ICT infrastructure plays in the assistance of terrorism. The use of the Internet by terrorist groups has expanded from traditional Internet usage to more innovative usage of both traditional and new Internet functions. Global terrorist groups can now electronically target an enormous amount of potential recipients, recruitees and enemies. The aim of the paper is to show how the Internet can be used to enable terrorism, as well as provide technical examples of the support functionality and exploitation. This paper summarises the high-level functions, methods and examples for which terrorists utilise the Internet. This paper looks at the use of the Internet as both a uni-directional and bi-directional tool to support functionality like recruitment, propaganda, training, funding and operations. It also discusses specific methods like the dissemination of web literature, social-networking tools, anti-forensics and fund-raising schemes. Additional examples, such as cloaking and coding techniques, are also provided. In order to analyse how ICT infrastructure can be used in the support of terrorism, a mapping is given of communication direction to the traditional Internet use functions and methods, as well as to innovative Internet functions and methods.
DA - 2011-03
DB - ResearchSpace
DP - CSIR
KW - Anti-forensics
KW - Internet
KW - Terrorism
KW - ICT
KW - Propaganda
KW - Social networking
LK - https://researchspace.csir.co.za
PY - 2011
SM - 97-1-906638-92-4
T1 - Terrorist use of the Internet: exploitation and support through ICT infrastructure
TI - Terrorist use of the Internet: exploitation and support through ICT infrastructure
UR - http://hdl.handle.net/10204/5781
ER -
|
en_ZA |