Show simple item record

dc.contributor.authorRomyn, David
dc.contributor.authorKebbell, Mark
dc.contributor.editorM. Khader, L.S. Neo, G. Ong, E.T. Mingyi and J. Chin
dc.description.abstractIn this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.
dc.publisherIGI Global
dc.publisher.placeUnited States
dc.relation.ispartofbooktitleCombating Violent Extremism and Radicalization in the Digital Era
dc.subject.fieldofresearchCriminology not elsewhere classified
dc.titleUsing the Internet to Plan for Terrorist Attacck
dc.typeBook chapter
dc.type.descriptionB1 - Chapters
dc.type.codeB - Book Chapters
gro.facultyGriffith Health, School of Applied Psychology
gro.hasfulltextNo Full Text
gro.griffith.authorKebbell, Mark R.
gro.griffith.authorRomyn, David J.

Files in this item


There are no files associated with this item.

This item appears in the following Collection(s)

  • Book chapters
    Contains book chapters authored by Griffith authors.

Show simple item record