Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses

Front Cover
M.N. Ogun
IOS Press, Oct 8, 2015 - Political Science - 224 pages
ICT plays a crucial role in the pursuit of modernization in the countries of Slovenia, Croatia, Albania and Bulgaria, which form the South Eastern European (SEE) region., The quest for Euro-Atlantic integration and the undeniable necessity for direct foreign investment have encouraged the SEE countries to invest in the development of cyber technology, and it has become the dominant area for social, economic and political interaction within the region. This has had both positive and negative consequences. This book presents the proceedings of the NATO Advanced Training Course (ATC), held in Ohrid, former Yugoslav Republic of Macedonia, in December 2014. The ATC addressed serious concerns about terrorist use of cyber technology in South Eastern Europe, which not only has the potential to destabilize regional efforts to create a platform for increased development by creating a breeding ground for the training of extremists and the launching of cyber attacks, but also represents a direct and indirect threat to the security and stability of other NATO partner countries. The book will be of interest to all those involved in countering the threat posed by terrorist use of the Internet worldwide.
 

Contents

NEW CHALLENGES AND RESPONSES The Use of Internet Technology by Cyber Terrorists Cyber Criminals The 2014 Report
1
NEW CHALLENGES AND RESPONSES Steganography in Support of the Global Terrorism
15
NEW CHALLENGES AND RESPONSES Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats Strategic Challenge...
29
NEW CHALLENGES AND RESPONSES Virtual Currencies and Terrorist Financing Basics for AntiTerrorist Professionals
45
NEW CHALLENGES AND RESPONSES The Use Of Cyber Space For Terrorist Purposes With Special Reference To The Financing Terrorist Activity
57
NEW CHALLENGES AND RESPONSES Conforming to al Qaedas single narrative an analysis of al Shabaabs Tweets during the Westgate terrorist a...
73
NEW CHALLENGES AND RESPONSES From AlQaeda To The Islamic State ISIS Jihadi Groups Engage in Cyber Jihad Beginning with 1980s Pro...
86
NEW CHALLENGES AND RESPONSES How Human Issues Impact Confronting Cyber Terrorism
102
NEW CHALLENGES AND RESPONSES Tackling Terrorists Use of the Internet Propaganda Dispersion the Threat of Radicalization
129
NEW CHALLENGES AND RESPONSES Southeast EuropeanSEE States International Legal Rights And Obligations In The Cyberspace
149
NEW CHALLENGES AND RESPONSES Cultural Aspects of Information Sharing and Collaboration
161
NEW CHALLENGES AND RESPONSES CyberAttacking a Country What Terrorists Havent Done So Far and they could do
173
NEW CHALLENGES AND RESPONSES The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace
183
NEW CHALLENGES AND RESPONSES Assessing and Responding to the Cyberterrorism Threat
200
NEW CHALLENGES AND RESPONSES Subject Index
211
NEW CHALLENGES AND RESPONSES Author Index
213

NEW CHALLENGES AND RESPONSES Human Factor Dual Role in Modern Cyberspace Social Engineering
116

Other editions - View all

Common terms and phrases

Bibliographic information