Using the Internet to Plan for Terrorist Attacck

No Thumbnail Available
File version
Author(s)
Romyn, David
Kebbell, Mark
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

M. Khader, L.S. Neo, G. Ong, E.T. Mingyi and J. Chin

Date
2016
Size
File type(s)
Location
License
Abstract

In this chapter, we discuss how terrorists can use the Internet as a source of information to plan for terrorist attacks. Online anonymity services such as virtual private network (VPN) are discussed, along with advantages and disadvantages of using these services. We also discuss online bomb-making instructions and highlight ways in which these can be used to the advantage of law enforcement. Finally, the use of the Internet as a reconnaissance tool for target selection is discussed, with descriptions of current and past research in this field to identify key information that is available to terrorists, and how this information can be manipulated to reduce the likelihood or severity of a terrorist attack.

Journal Title
Conference Title
Book Title

Combating Violent Extremism and Radicalization in the Digital Era

Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Criminology not elsewhere classified

Persistent link to this record
Citation
Collections