Australian Information Warfare and Security Conference
Document Type
Conference Proceeding
Publisher
School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Abstract
The use of the Internet by terrorists appears to diverge into two distinct modes neither of which is mutually exclusive. The first aligns to the view that terrorists will use the Internet as a platform to launch cyber attacks against critical infrastructure nodes as well as key government and private sector networks. This paper discusses the alternate mode that being the primary use of the Internet by terrorists will be to recruit, train, communicate and gain information about potential targets by conducting virtual reconnaissance. It will examine the nexus between the virtual world and the physical threat that is manifested as a result of the ideology being promoted. The requirement for law enforcement agencies to develop capabilities to track the activities of terrorists in cyberspace presents technological and human resource challenges.. Whilst the Far Right and Islamic Fundamentalist groups have seized upon the opportunity to network and promote their particular ideologies, they have until recently done so in relative isolation. This scenario is now in transition as Far Right groups are providing links and information on their websites about Islamic Fundamentalism.
DOI
10.4225/75/57a8132eaa0ce
Comments
7th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia, 4th - 5th December, 2006.