Australian Information Warfare and Security Conference

Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University, Perth, Western Australia

Comments

Originally published in the Proceedings of 7th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia, 4th - 5th December, 2006.

Abstract

The use of the Internet by terrorists appears to diverge into two distinct modes neither of which is mutually exclusive. The first aligns to the view that terrorists will use the Internet as a platform to launch cyber attacks against critical infrastructure nodes as well as key government and private sector networks. This paper discusses the alternate mode that being the primary use of the Internet by terrorists will be to recruit, train, communicate and gain information about potential targets by conducting virtual reconnaissance. It will examine the nexus between the virtual world and the physical threat that is manifested as a result of the ideology being promoted. The requirement for law enforcement agencies to develop capabilities to track the activities of terrorists in cyberspace presents technological and human resource challenges.. Whilst the Far Right and Islamic Fundamentalist groups have seized upon the opportunity to network and promote their particular ideologies, they have until recently done so in relative isolation. This scenario is now in transition as Far Right groups are providing links and information on their websites about Islamic Fundamentalism.

DOI

10.4225/75/57a8132eaa0ce

Share

 
COinS