The Utilisation of the Deep Web for Military Counter Terrorist Operations

-д хадгалсан:
Номзүйн дэлгэрэнгүй
-д хэвлэсэн:International Conference on Cyber Warfare and Security (2017), p. 15-23
Үндсэн зохиолч: Aschmann, Michael
Бусад зохиолчид: Leenen, Louise, van Vuuren, Joey Jansen
Хэвлэсэн:
Academic Conferences International Limited
Нөхцлүүд:
Онлайн хандалт:Citation/Abstract
Full Text
Full Text - PDF
Шошгууд: Шошго нэмэх
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!

MARC

LEADER 00000nab a2200000uu 4500
001 1897672713
003 UK-CbPIL
035 |a 1897672713 
045 2 |b d20170101  |b d20171231 
084 |a 142229  |2 nlm 
100 1 |a Aschmann, Michael 
245 1 |a The Utilisation of the Deep Web for Military Counter Terrorist Operations 
260 |b Academic Conferences International Limited  |c 2017 
513 |a Conference Proceedings 
520 3 |a The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the "Cyber Kill Chain" methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations. 
653 |a Cyberterrorism 
653 |a Search engines 
653 |a Dictionaries 
653 |a Internet 
653 |a Councils 
653 |a Academic libraries 
653 |a Magazines 
653 |a Counterterrorism 
653 |a Defense 
653 |a Military operations 
653 |a Crime 
653 |a Privacy 
653 |a Dark adaptation 
653 |a Military air strikes 
653 |a Terrorism 
653 |a International relations 
653 |a Social networks 
653 |a Websites 
653 |a Cybercrime 
653 |a Colleges & universities 
653 |a Threats 
653 |a Citizens 
653 |a Organized crime 
653 |a Armed forces 
653 |a National security 
653 |a Terrorist organizations 
653 |a Anonymity 
653 |a Intelligence gathering 
653 |a Intelligence 
653 |a Boundaries 
653 |a Covert 
653 |a Communication 
653 |a Terrorists 
700 1 |a Leenen, Louise 
700 1 |a van Vuuren, Joey Jansen 
773 0 |t International Conference on Cyber Warfare and Security  |g (2017), p. 15-23 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/1897672713/abstract/embedded/NVC8TPT9VN4WFQEG?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/1897672713/fulltext/embedded/NVC8TPT9VN4WFQEG?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/1897672713/fulltextPDF/embedded/NVC8TPT9VN4WFQEG?source=fedsrch