ResearchSpace

Terrorist use of the Internet: exploitation and support through ICT infrastructure

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Grobler, M
dc.date.accessioned 2012-04-17T13:48:28Z
dc.date.available 2012-04-17T13:48:28Z
dc.date.issued 2011-03
dc.identifier.citation Veerasamy, N and Grobler, M. Terrorist use of the Internet: exploitation and support through ICT infrastructure. 6th International Conference on Information Warfare and Security, George Washington University, Washington, DC, 17-18 March 2011 en_US
dc.identifier.isbn 97-1-906638-92-4
dc.identifier.uri http://academic-conferences.org/iciw/iciw2012/iciw11-proceedings.htm
dc.identifier.uri http://hdl.handle.net/10204/5781
dc.description 6th International Conference on Information Warfare and Security, George Washington University, Washington, DC, 17-18 March 2011 en_US
dc.description.abstract The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides an enormous amount of information, and enables relatively cheap and instant communication across the globe. As a result, the conventional view of many traditional terrorist groups shifted to embrace the use of technology within their functions. The goal of this paper is to represent the functions and methods that terrorists have come to rely on through the ICT infrastructure. The discussion sheds light on the technical and practical role that ICT infrastructure plays in the assistance of terrorism. The use of the Internet by terrorist groups has expanded from traditional Internet usage to more innovative usage of both traditional and new Internet functions. Global terrorist groups can now electronically target an enormous amount of potential recipients, recruitees and enemies. The aim of the paper is to show how the Internet can be used to enable terrorism, as well as provide technical examples of the support functionality and exploitation. This paper summarises the high-level functions, methods and examples for which terrorists utilise the Internet. This paper looks at the use of the Internet as both a uni-directional and bi-directional tool to support functionality like recruitment, propaganda, training, funding and operations. It also discusses specific methods like the dissemination of web literature, social-networking tools, anti-forensics and fund-raising schemes. Additional examples, such as cloaking and coding techniques, are also provided. In order to analyse how ICT infrastructure can be used in the support of terrorism, a mapping is given of communication direction to the traditional Internet use functions and methods, as well as to innovative Internet functions and methods. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences Limited en_US
dc.relation.ispartofseries Workflow;6320
dc.subject Anti-forensics en_US
dc.subject Internet en_US
dc.subject Terrorism en_US
dc.subject ICT en_US
dc.subject Propaganda en_US
dc.subject Social networking en_US
dc.title Terrorist use of the Internet: exploitation and support through ICT infrastructure en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Veerasamy, N., & Grobler, M. (2011). Terrorist use of the Internet: exploitation and support through ICT infrastructure. Academic Conferences Limited. http://hdl.handle.net/10204/5781 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, and M Grobler. "Terrorist use of the Internet: exploitation and support through ICT infrastructure." (2011): http://hdl.handle.net/10204/5781 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Grobler M, Terrorist use of the Internet: exploitation and support through ICT infrastructure; Academic Conferences Limited; 2011. http://hdl.handle.net/10204/5781 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AU - Grobler, M AB - The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides an enormous amount of information, and enables relatively cheap and instant communication across the globe. As a result, the conventional view of many traditional terrorist groups shifted to embrace the use of technology within their functions. The goal of this paper is to represent the functions and methods that terrorists have come to rely on through the ICT infrastructure. The discussion sheds light on the technical and practical role that ICT infrastructure plays in the assistance of terrorism. The use of the Internet by terrorist groups has expanded from traditional Internet usage to more innovative usage of both traditional and new Internet functions. Global terrorist groups can now electronically target an enormous amount of potential recipients, recruitees and enemies. The aim of the paper is to show how the Internet can be used to enable terrorism, as well as provide technical examples of the support functionality and exploitation. This paper summarises the high-level functions, methods and examples for which terrorists utilise the Internet. This paper looks at the use of the Internet as both a uni-directional and bi-directional tool to support functionality like recruitment, propaganda, training, funding and operations. It also discusses specific methods like the dissemination of web literature, social-networking tools, anti-forensics and fund-raising schemes. Additional examples, such as cloaking and coding techniques, are also provided. In order to analyse how ICT infrastructure can be used in the support of terrorism, a mapping is given of communication direction to the traditional Internet use functions and methods, as well as to innovative Internet functions and methods. DA - 2011-03 DB - ResearchSpace DP - CSIR KW - Anti-forensics KW - Internet KW - Terrorism KW - ICT KW - Propaganda KW - Social networking LK - https://researchspace.csir.co.za PY - 2011 SM - 97-1-906638-92-4 T1 - Terrorist use of the Internet: exploitation and support through ICT infrastructure TI - Terrorist use of the Internet: exploitation and support through ICT infrastructure UR - http://hdl.handle.net/10204/5781 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record