The Utilisation of the Deep Web for Military Counter Terrorist Operations
-д хадгалсан:
| -д хэвлэсэн: | International Conference on Cyber Warfare and Security (2017), p. 15-23 |
|---|---|
| Үндсэн зохиолч: | |
| Бусад зохиолчид: | , |
| Хэвлэсэн: |
Academic Conferences International Limited
|
| Нөхцлүүд: | |
| Онлайн хандалт: | Citation/Abstract Full Text Full Text - PDF |
| Шошгууд: |
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 1897672713 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 1897672713 | ||
| 045 | 2 | |b d20170101 |b d20171231 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Aschmann, Michael | |
| 245 | 1 | |a The Utilisation of the Deep Web for Military Counter Terrorist Operations | |
| 260 | |b Academic Conferences International Limited |c 2017 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the "Cyber Kill Chain" methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations. | |
| 653 | |a Cyberterrorism | ||
| 653 | |a Search engines | ||
| 653 | |a Dictionaries | ||
| 653 | |a Internet | ||
| 653 | |a Councils | ||
| 653 | |a Academic libraries | ||
| 653 | |a Magazines | ||
| 653 | |a Counterterrorism | ||
| 653 | |a Defense | ||
| 653 | |a Military operations | ||
| 653 | |a Crime | ||
| 653 | |a Privacy | ||
| 653 | |a Dark adaptation | ||
| 653 | |a Military air strikes | ||
| 653 | |a Terrorism | ||
| 653 | |a International relations | ||
| 653 | |a Social networks | ||
| 653 | |a Websites | ||
| 653 | |a Cybercrime | ||
| 653 | |a Colleges & universities | ||
| 653 | |a Threats | ||
| 653 | |a Citizens | ||
| 653 | |a Organized crime | ||
| 653 | |a Armed forces | ||
| 653 | |a National security | ||
| 653 | |a Terrorist organizations | ||
| 653 | |a Anonymity | ||
| 653 | |a Intelligence gathering | ||
| 653 | |a Intelligence | ||
| 653 | |a Boundaries | ||
| 653 | |a Covert | ||
| 653 | |a Communication | ||
| 653 | |a Terrorists | ||
| 700 | 1 | |a Leenen, Louise | |
| 700 | 1 | |a van Vuuren, Joey Jansen | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (2017), p. 15-23 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/1897672713/abstract/embedded/NVC8TPT9VN4WFQEG?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/1897672713/fulltext/embedded/NVC8TPT9VN4WFQEG?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/1897672713/fulltextPDF/embedded/NVC8TPT9VN4WFQEG?source=fedsrch |